Analytics
2/27/2013
11:56 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Spirent Adds Support For Malware Testing With Realistic Threat Assessment

Spirent Studio, Spirent Avalanche test malware handling capabilities of network security devices

SUNNYVALE, Calif.--(BUSINESS WIRE)--Spirent Communications, a leader in testing networks, services and devices, today announced the release of malware testing capabilities on Spirent Studio. With the addition of malware testing, Spirent offers its customers a comprehensive solution to test a range of security issues, including fuzzing, encryption, VPN, signature-based attacks and DDoS threats. Combined with Spirent Avalanche, Studio delivers multi-10 Gbps capacity, security, and performance testing for network and web application infrastructure.

The growth in the BYOD trend changes the mix of traffic on the network and may significantly increase the chances of being attacked by malware, thereby impacting network security and performance. The BYOD trend may result in IT having to cope with users attaching devices with non-standard operating systems, out-of-date patches, missing or unsupported protocols and little or no security software. Notwithstanding all the challenges, IT must still ensure secure and properly functioning enterprise networks and services.

Spirent's approach to testing malware includes replicating malware binaries being sent through firewalls and IPS/IDS devices as payload over HTTP and FTP transports. It also includes replicating the behavior of infected end devices. This latter step is essential to detecting and eliminating advanced persistent threats that may have embedded themselves inside a protected network.

"Spirent already offers the widest breadth of security testing capabilities based upon the most realistic events and threats, and this new addition means that our customers can easily include malware in their testing methodologies, giving them protection against the tide of new threats that appear every day," said Ankur Chadda, Product Marketing Manager at Spirent. "There are tens of millions of pieces of malware out in the world, and smart companies are taking this threat seriously by adhering to best practices and utilizing the very latest in malware testing."

Stop by Spirent's booth #2525 during RSA 2013 in San Francisco, February 26 to February 28 to learn more about security testing. For additional information about Spirent's Malware testing capabilities visit, http://www.spirent.com/Networks-and-Applications/App_Aware_Security.

About Spirent Communications plc

Spirent Communications plc. (LSE: SPT), a global leader in test & measurement offers an extensive portfolio of solutions to test data centers, cloud computing environments, high speed Ethernet networks and services, 3G/4G wireless networks and devices, network security, and global navigation satellite systems. For more information visit http://www.spirent.com/about-us/News_Room/About_Spirent_Communications_plc.aspx

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.ZSWG2ZEP.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0761
Published: 2014-08-27
The DNP3 driver in CG Automation ePAQ-9410 Substation Gateway allows remote attackers to cause a denial of service (infinite loop or process crash) via a crafted TCP packet.

CVE-2014-0762
Published: 2014-08-27
The DNP3 driver in CG Automation ePAQ-9410 Substation Gateway allows physically proximate attackers to cause a denial of service (infinite loop or process crash) via crafted input over a serial line.

CVE-2014-2380
Published: 2014-08-27
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows remote attackers to obtain sensitive information by reading a credential file.

CVE-2014-2381
Published: 2014-08-27
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows local users to obtain sensitive information by reading a credential file.

CVE-2014-3344
Published: 2014-08-27
Multiple cross-site scripting (XSS) vulnerabilities in the web framework in Cisco Transport Gateway for Smart Call Home (aka TG-SCH or Transport Gateway Installation Software) 4.0 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq31129, CSCuq3...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.