Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?


Network Security

BreakingPoint FireStorm ONE Enables Massive-Scale Security Testing On-the-Go

Portable Appliance Enables Massive-Scale Performance and Security Testing Anywhere, Anytime

Portable Appliance Enables Massive-Scale Performance and Security Testing Anywhere, Anytime

BreakingPoint Systems today announced the availability of FireStorm ONE, a portable and compact solution designed to enable organizations to perform massive-scale performance and security testing anywhere at any time.

The single-rack unit device is capable of creating 40 Gbps of blended stateful application traffic and live attacks, and 30 million concurrent TCP sessions—numbers the company says replicate the online behavior of every person in New York City and Los Angeles, combined.

BreakingPoint SystemsIdeal for mobile proof-of-concept labs, cyber war exercises, optimizing 3G/LTE/4G networks, testing next-generation firewalls and more, FireStorm ONE enables organizations to predict and prevent the impact of attacks and changes in network traffic.

The FireStorm ONE helps meet the performance and portability needs of equipment vendors, enterprises, and government and military organizations who can use the FireStorm ONE to:

• Establish scalable and transportable proof-of-concept labs for customer evaluations using their unique traffic scenarios.

• Reduce time-to-test to minimize costs and accelerate development of network and data center devices.

• Optimize and harden mobility network equipment to deliver next-generation devices.

Advertisement. Scroll to continue reading.

• Evaluate network equipment to choose the right device for their unique networks.

• Right-size data centers and virtualized infrastructures for peak performance and capacity use.

• Continuously validate performance and security to avoid IT risk as their networks change.

• Train and certify cyber warriors to predict and prevent attack.

• Perform on-the-go cyber security research and simulations to keep ahead of the latest threats.

• Deploy global compact cyber ranges in order to harden critical communication infrastructures.

With a single appliance and one interface, the one rack unit can create:

• 40 Gbps of blended stateful application traffic and live attacks.

• 30 million concurrent TCP sessions.

• 1 million TCP sessions per second.

• 8 Gbps of SSL encryption with any cipher.

• 12 million mobile users, 8,000 eNodeBs and 3 million concurrent GTP tunnels.

FireStorm ONE has access to a threat library of more than 34,000 attacks, with frequent updates published by the company’s team of in-house security researchers. Additionally, the device can also provide live malware and mobile malware for testing of anti-virus gateways and other behavioral analysis and contextual security devices.

FireStorm ONE scales to essentially unlimited performance levels with multiple devices using a single user interface, one configuration, and integrated reporting.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

Our networks have become atomized which, for starters, means they’re highly dispersed. Not just in terms of the infrastructure – legacy, on-premises, hybrid, multi-cloud,...