Analytics
2/27/2013
11:56 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Spirent Adds Support For Malware Testing With Realistic Threat Assessment

Spirent Studio, Spirent Avalanche test malware handling capabilities of network security devices

SUNNYVALE, Calif.--(BUSINESS WIRE)--Spirent Communications, a leader in testing networks, services and devices, today announced the release of malware testing capabilities on Spirent Studio. With the addition of malware testing, Spirent offers its customers a comprehensive solution to test a range of security issues, including fuzzing, encryption, VPN, signature-based attacks and DDoS threats. Combined with Spirent Avalanche, Studio delivers multi-10 Gbps capacity, security, and performance testing for network and web application infrastructure.

The growth in the BYOD trend changes the mix of traffic on the network and may significantly increase the chances of being attacked by malware, thereby impacting network security and performance. The BYOD trend may result in IT having to cope with users attaching devices with non-standard operating systems, out-of-date patches, missing or unsupported protocols and little or no security software. Notwithstanding all the challenges, IT must still ensure secure and properly functioning enterprise networks and services.

Spirent's approach to testing malware includes replicating malware binaries being sent through firewalls and IPS/IDS devices as payload over HTTP and FTP transports. It also includes replicating the behavior of infected end devices. This latter step is essential to detecting and eliminating advanced persistent threats that may have embedded themselves inside a protected network.

"Spirent already offers the widest breadth of security testing capabilities based upon the most realistic events and threats, and this new addition means that our customers can easily include malware in their testing methodologies, giving them protection against the tide of new threats that appear every day," said Ankur Chadda, Product Marketing Manager at Spirent. "There are tens of millions of pieces of malware out in the world, and smart companies are taking this threat seriously by adhering to best practices and utilizing the very latest in malware testing."

Stop by Spirent's booth #2525 during RSA 2013 in San Francisco, February 26 to February 28 to learn more about security testing. For additional information about Spirent's Malware testing capabilities visit, http://www.spirent.com/Networks-and-Applications/App_Aware_Security.

About Spirent Communications plc

Spirent Communications plc. (LSE: SPT), a global leader in test & measurement offers an extensive portfolio of solutions to test data centers, cloud computing environments, high speed Ethernet networks and services, 3G/4G wireless networks and devices, network security, and global navigation satellite systems. For more information visit http://www.spirent.com/about-us/News_Room/About_Spirent_Communications_plc.aspx

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.ZSWG2ZEP.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0547
Published: 2015-07-04
The D2CenterstageService.getComments service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0548
Published: 2015-07-04
The D2DownloadService.getDownloadUrls service method in EMC Documentum D2 4.1 and 4.2 before 4.2 P16 and 4.5 before P03 allows remote authenticated users to conduct Documentum Query Language (DQL) injection attacks and bypass intended read-access restrictions via unspecified vectors.

CVE-2015-0551
Published: 2015-07-04
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop 6.7SP1 before P31, 6.7SP2 before P23, and 6.8 before P01; Documentum Administrator 6.7SP1 before P31, 6.7SP2 before P23, 7.0 before P18, 7.1 before P15, and 7.2 before P01; Documentum Digital Assets Manager 6.5SP6 before P2...

CVE-2015-1966
Published: 2015-07-04
Multiple cross-site scripting (XSS) vulnerabilities in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before FP17, 6.2.1 before FP9, and 6.2.2 before FP15, as used in Security Access Manager for Mobile and other products, allow remote attackers to inject arbitrary web script or HTML via a crafte...

CVE-2015-4196
Published: 2015-07-04
Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report