Analytics
2/27/2013
11:56 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Spirent Adds Support For Malware Testing With Realistic Threat Assessment

Spirent Studio, Spirent Avalanche test malware handling capabilities of network security devices

SUNNYVALE, Calif.--(BUSINESS WIRE)--Spirent Communications, a leader in testing networks, services and devices, today announced the release of malware testing capabilities on Spirent Studio. With the addition of malware testing, Spirent offers its customers a comprehensive solution to test a range of security issues, including fuzzing, encryption, VPN, signature-based attacks and DDoS threats. Combined with Spirent Avalanche, Studio delivers multi-10 Gbps capacity, security, and performance testing for network and web application infrastructure.

The growth in the BYOD trend changes the mix of traffic on the network and may significantly increase the chances of being attacked by malware, thereby impacting network security and performance. The BYOD trend may result in IT having to cope with users attaching devices with non-standard operating systems, out-of-date patches, missing or unsupported protocols and little or no security software. Notwithstanding all the challenges, IT must still ensure secure and properly functioning enterprise networks and services.

Spirent's approach to testing malware includes replicating malware binaries being sent through firewalls and IPS/IDS devices as payload over HTTP and FTP transports. It also includes replicating the behavior of infected end devices. This latter step is essential to detecting and eliminating advanced persistent threats that may have embedded themselves inside a protected network.

"Spirent already offers the widest breadth of security testing capabilities based upon the most realistic events and threats, and this new addition means that our customers can easily include malware in their testing methodologies, giving them protection against the tide of new threats that appear every day," said Ankur Chadda, Product Marketing Manager at Spirent. "There are tens of millions of pieces of malware out in the world, and smart companies are taking this threat seriously by adhering to best practices and utilizing the very latest in malware testing."

Stop by Spirent's booth #2525 during RSA 2013 in San Francisco, February 26 to February 28 to learn more about security testing. For additional information about Spirent's Malware testing capabilities visit, http://www.spirent.com/Networks-and-Applications/App_Aware_Security.

About Spirent Communications plc

Spirent Communications plc. (LSE: SPT), a global leader in test & measurement offers an extensive portfolio of solutions to test data centers, cloud computing environments, high speed Ethernet networks and services, 3G/4G wireless networks and devices, network security, and global navigation satellite systems. For more information visit http://www.spirent.com/about-us/News_Room/About_Spirent_Communications_plc.aspx

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.ZSWG2ZEP.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio