Analytics
2/27/2013
11:56 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Spirent Adds Support For Malware Testing With Realistic Threat Assessment

Spirent Studio, Spirent Avalanche test malware handling capabilities of network security devices

SUNNYVALE, Calif.--(BUSINESS WIRE)--Spirent Communications, a leader in testing networks, services and devices, today announced the release of malware testing capabilities on Spirent Studio. With the addition of malware testing, Spirent offers its customers a comprehensive solution to test a range of security issues, including fuzzing, encryption, VPN, signature-based attacks and DDoS threats. Combined with Spirent Avalanche, Studio delivers multi-10 Gbps capacity, security, and performance testing for network and web application infrastructure.

The growth in the BYOD trend changes the mix of traffic on the network and may significantly increase the chances of being attacked by malware, thereby impacting network security and performance. The BYOD trend may result in IT having to cope with users attaching devices with non-standard operating systems, out-of-date patches, missing or unsupported protocols and little or no security software. Notwithstanding all the challenges, IT must still ensure secure and properly functioning enterprise networks and services.

Spirent's approach to testing malware includes replicating malware binaries being sent through firewalls and IPS/IDS devices as payload over HTTP and FTP transports. It also includes replicating the behavior of infected end devices. This latter step is essential to detecting and eliminating advanced persistent threats that may have embedded themselves inside a protected network.

"Spirent already offers the widest breadth of security testing capabilities based upon the most realistic events and threats, and this new addition means that our customers can easily include malware in their testing methodologies, giving them protection against the tide of new threats that appear every day," said Ankur Chadda, Product Marketing Manager at Spirent. "There are tens of millions of pieces of malware out in the world, and smart companies are taking this threat seriously by adhering to best practices and utilizing the very latest in malware testing."

Stop by Spirent's booth #2525 during RSA 2013 in San Francisco, February 26 to February 28 to learn more about security testing. For additional information about Spirent's Malware testing capabilities visit, http://www.spirent.com/Networks-and-Applications/App_Aware_Security.

About Spirent Communications plc

Spirent Communications plc. (LSE: SPT), a global leader in test & measurement offers an extensive portfolio of solutions to test data centers, cloud computing environments, high speed Ethernet networks and services, 3G/4G wireless networks and devices, network security, and global navigation satellite systems. For more information visit http://www.spirent.com/about-us/News_Room/About_Spirent_Communications_plc.aspx

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.ZSWG2ZEP.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.