spirent.com
Posts Tagged "security"

Read about the importance of having proper security assessment platforms that can provide proactive, in-depth and timely actionable insights into the health of enterprise network security posture

Read full post 0 Comments

Anyone building a scalable, robust application should consider a microservice architecture, that’s what it means to be “cloud native”. App performance is now joined at the hip with network infrastructure performance, the two are becoming more intertwined than ever. Blog discusses tips for a successful transition to cloud-native applications.

Read full post 0 Comments

In the real world, how do most people create a test case? In most instances, they open the tester GUI, configure the test, debug the test, run the test, print the report, and are done. The question when we drill deeper is “Is this the most effective way for us to be performing our testing?” Let’s drill down into the problems this technique creates for organizations. Generally, many test engineers are given a test set which may include a full DUT or specific test ports on a shared DUT. The configuration of specific attributes of these ports such as routing/IP information, firewall rules, ALCs typically do not change unless they are specifically being tested. In the classic model, the user keeps rebuilding attributes of the test over and over again potentially building the same test hundreds of times.

Read full post 0 Comments

Network testing solutions are critical to the security of enterprise-scale infrastructures. Comprehensive testing of online infrastructure in a network environment including applications running before or after deployment should be required for hardened protection against breaches, hacks, and attacks on the network under load with real, reliable and repeatable traffic.

Read full post 0 Comments

Test your network. Patch your systems. Get third-party validation. Empower you and your organization to be proactive in your security. Nothing can prevent a data breach except for maybe cutting your network cables so the next best thing is to make yourself and your network a very hard target for the attacker.

Read full post 0 Comments

Recently, the media has been abuzz with Shellshock (also known as Bashdoor) vulnerability. This comes in an array of vulnerabilities that are being discovered daily. It should come as no surprise that products today still ship with software bugs, and vulnerability discoveries like these are not going to stop in the future. So what can be done to provide protection or at the least minimize the impact of such vulnerabilities?

Read full post 0 Comments

The biggest navigation conference of the year, The Institute of Navigation’s GNSS+, came to a close last week, September 8-12. Why the “+”? To recognise that Global Navigation Satellite Systems (GNSS), although an autonomous technology, is rarely enough to assure the performance, resilience or trust that is needed for the huge range of today’s position, navigation and timing applications.

Read full post 0 Comments

As Nemertes Research, voke’s ITO (Infrastructure Test Optimization), and Gartner research notes, and numerous other sources observe, implementation of IT initiatives such as data center network design, consolidation, and virtualization represent significant infrastructure and budget commitments that carry considerable risk.

Read full post 0 Comments

A diverse array of component devices and applications in a unified architecture may cause network failure.

While individual devices and applications may work as planned, the complexity of an entire network, however, with configurations and associated firmware out of synch, can create a critical potential vulnerability that must be tested for defects that can bring down your network.

Read full post 0 Comments

Confidentiality, integrity, and availability (CIA) is a model designed to guide policies for information security within an organization. In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of ready access to the information by authorized people. The model is sometimes known as the CIA triad.

Read full post 0 Comments

Simply put, the network failure threshold is the point at which your network breaks under real-world applications and user bandwidth. So is it better to know that before or after you launch your IT initiative?

To put it another way, from Nemertes Research’s perspective (from their classic issue paper Strategic IT Initiatives need Strategic Testing): “Without proper testing, such strategic initiative can fail with serious unforeseen consequences, including significant hard dollar and opportunity costs.” They also observed the gains expected from an IT initiative can be minimized or erased if the testing is not implemented before an initiative goes live.

Read full post 0 Comments

As is the case with all marketing collateral, a company puts the best face on the product they want you to buy. In network equipment, part of that includes stating the capabilities of device, backed up by testing against particular requirements. While the device will likely perform exactly as described in the environment established by the vendor, how it performs in your network with your devices and your requirements is an entirely different proposition. “Results may vary.” Indeed.

Read full post 0 Comments

The crucial nature of testing the success of any data center initiative is widely recognized, but all testing is not created equal. Proper testing is required and is a critical element of ensuring this success. The set of industry best-practices described below were identified and defined after numerous data center testing engagements, across lines of business and around the globe, by Spirent’s team of Professional Services engineers.

Read full post 0 Comments

According to Network Computing and the Meta Group, the hourly cost of an hour of downtime ranges from $90 thousand for media to $6.48 million for a brokerage service, with telecom hitting in the middle at $2 million.* You don’t have to look far to find dramatic examples of the consequences of inadequate testing, or perhaps no testing at all.

Read full post 0 Comments

I wanted to personally thank everyone who came out to Interop this past week and made the show such a great success. Although, I didn’t win big at the Blackjack table, Spirent’s Avalanche NEXT was a big winner, being selected for the Best of Interop in the Performance category. The judges for this award were Mike Fratto, Principal Analyst, Enterprise Network Systems, Current Analysis and Ethan Banks, Founder, Packet Pushers Interactive, LLC.

Read full post 0 Comments

A new class of attacks – kinetic attacks – was recently demonstrated at RSA 2014. This self-described “frying the machine” is part of a family of attacks aimed at causing physical damage to the system. This kind of attack targets a worm which rewrites the APC controller, setting the CPU performance to full power, and turns off the system fans causing the computer to literally catch on fire! Previous kinetic attacks such as ‘Stuxnet’ targeted nuclear power plants.

Read full post 0 Comments

I just came back from a great week at RSA. It was exciting to see how many customers stopped by our booth to inquire about the Cybersecurity Framework recently released by the National Institute of Standards and Technology (NIST). The Framework’s objective is to improve the security posture of public and private organizations that manage critical infrastructures. Companies stopping by our booth were interested in finding out how Spirent test solutions could help them meet the Framework’s requirements.

Read full post 0 Comments
By Spirent On September 6, 2012
Security
Security, ROI

In this brave new world, an unprotected enterprise won’t last a day, but what does an effective security solution cost? When it comes to security, ROI is calculated by comparing how much you spend to how much you can avoid losing, much like spending money on the legal department to reduce your liability. A good maximum budget for protection is thirty to forty percent of the anticipated cost of the loss, but the cost of a security solution typically falls well below the maximum.

Read full post 0 Comments
By Spirent On February 16, 2012
Security
Firewall, Security

“Structuring a real world test” Spirent and Crossbeam were recently part of a major collaboration to define and document a test methodology that could accurately assess the performance of a firewall on the demanding Gi(3G) or SGi(4G-LTE) interface of a mobile operator's network.  Working to design this test were EANTC (the European Advanced Networking Test Center, internationally recognized for its test expertise), Heavy Reading (a provider of deep analysis of telecom trends), S...

Read full post 0 Comments

You don’t need me to tell you that realistically testing a Unified Threat Manager (UTM) can be a nightmare. The convergence that is happening on so many fronts offers a utopian future of lower OPEX and streamlined services, all great for the bottom line. But under the hood, the dirty little secret is a more-than-compensating increase in complexity, and security solutions are not exempt. A UTM squeezes multiple security functions, including content filtering, spam filtering, intrusion dete...

Read full post 0 Comments
× Spirent.com uses cookies to enhance and streamline your experience. By continuing to browse our site, you are agreeing to the use of cookies.