Monday, November 7, 2005

Spirent Enhances ThreatEx Network Security Test Tool

Spirent Communications has enhanced its "ThreatEx", a network test tool capable of replicating sophisticated digital attacks. Spirent's ThreatEx simulates network attacks by creating data packets that mimic the behaviour of viruses and worms, and can be used to evaluate Firewalls and Intrusion Detection and Intrusion Prevention Systems (IDS/IPS).

For companies that have limited resources, Spirent's Global Services team can use ThreatEx to perform security audits and supplements internal capabilities with test methodology expertise so that customers can focus on their core business.

Spirent has also created a ThreatEx Knowledge Base -- a web-based subscription service that hosts a dynamically updated library of known attacks. This enables organisations to keep their tests current, thus minimizing risk and maximizing ROI.

In addition to the cache of existing ThreatEx attacks that include Denial of Service, port scanning, port corruption, buffer overflows, packet floods, redirection, tunneling and fragmentation attacks, Spirent has added the following capabilities to the ThreatEx arsenal in the latest release:

  • Attacks specific for VoIP testing - SIP, Skinny and H.323

  • Protocol Fuzzing - enables users to "fuzz" any protocol created by ThreatEx for corner case tests and extensive negative traffic permutation

  • 150 protocol shells for ThreatEx Designer - allows any threat to be created via a point and click environment

  • Expanded performance assessment - in addition to SNMP traps, ThreatEx now includes session latency, service assessment and exploit ratio

  • In addition, to simulate real-life traffic with negative traffic, ThreatEx can be combined with Spirent's Avalanche to reveal how network performance degenerates when under attack.

See also