|
Replace Vendor Assurances With Measurable Answers |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Présentation : This morning on the floor of RSA Conference BreakingPoint unveiled the BreakingPoint Resiliency Score , a new approach to objectively measure the resiliency of network and security equipment, putting an end to data sheet speculation. We've all been there, of course, reading a product data sheet that provides data on performance and security of a piece of network or data center equipment. But, we have all reached the point where we basically ignore much of this data. The reason isn't that the information is fictitious, it is simply not based on real-world scenarios. BreakingPoint is all about real-world simulation, as anyone who reads this blog regularly knows. The BreakingPoint Resiliency Score takes this ability to simulate real-world applications, real-time security strikes and maximum load to provide an objective, repeatable and scientifically measured certification of the performance, security and stability of any network or network device. The press release that went out this morning had a great quote from BreakingPoint CTO Dennis Cox. It summarizes why this is important for all of us Certification for performance and security is nothing new in fact, we have come to expect it for everything from our phones to our automobiles. Yet network equipment, which supports our businesses and governments, has no standardized certification for performance and security. Instead we rely on statements made in product marketing literature, which are based on best-case scenarios, not real-world truths. Organizations want measurable answers, not assurances, when it comes to cybersecurity. The BreakingPoint Resiliency Score cuts through all the speculation and confusion and uses a scientific methodology that provides a deterministic and repeatable certification of any vendor claim. If you are at RSA Conference stop by booth 1356 and we would gladly show you how Resiliency Score works.
Les derniers articles du site "BreakingPoint Labs Blog" :
- Data Sheets Lie and How To Truly Measure the Performance and Security of a Network Device - Webcast and Research Paper Mobile Network Traffic Optimization - IPv6 Everywhere You Turn - Dig pcap File For Fun and Productivity - Resiliency. Don't Leave Home Without It - From the Floor at RSA 2010 Real-World Mobile Network Traffic Validation - Replace Vendor Assurances With Measurable Answers - Testing and Validation of Network Security Devices - Application Protocol Fuzzing - Proxies
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|