Analytics
2/27/2013
11:56 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Spirent Adds Support For Malware Testing With Realistic Threat Assessment

Spirent Studio, Spirent Avalanche test malware handling capabilities of network security devices

SUNNYVALE, Calif.--(BUSINESS WIRE)--Spirent Communications, a leader in testing networks, services and devices, today announced the release of malware testing capabilities on Spirent Studio. With the addition of malware testing, Spirent offers its customers a comprehensive solution to test a range of security issues, including fuzzing, encryption, VPN, signature-based attacks and DDoS threats. Combined with Spirent Avalanche, Studio delivers multi-10 Gbps capacity, security, and performance testing for network and web application infrastructure.

The growth in the BYOD trend changes the mix of traffic on the network and may significantly increase the chances of being attacked by malware, thereby impacting network security and performance. The BYOD trend may result in IT having to cope with users attaching devices with non-standard operating systems, out-of-date patches, missing or unsupported protocols and little or no security software. Notwithstanding all the challenges, IT must still ensure secure and properly functioning enterprise networks and services.

Spirent's approach to testing malware includes replicating malware binaries being sent through firewalls and IPS/IDS devices as payload over HTTP and FTP transports. It also includes replicating the behavior of infected end devices. This latter step is essential to detecting and eliminating advanced persistent threats that may have embedded themselves inside a protected network.

"Spirent already offers the widest breadth of security testing capabilities based upon the most realistic events and threats, and this new addition means that our customers can easily include malware in their testing methodologies, giving them protection against the tide of new threats that appear every day," said Ankur Chadda, Product Marketing Manager at Spirent. "There are tens of millions of pieces of malware out in the world, and smart companies are taking this threat seriously by adhering to best practices and utilizing the very latest in malware testing."

Stop by Spirent's booth #2525 during RSA 2013 in San Francisco, February 26 to February 28 to learn more about security testing. For additional information about Spirent's Malware testing capabilities visit, http://www.spirent.com/Networks-and-Applications/App_Aware_Security.

About Spirent Communications plc

Spirent Communications plc. (LSE: SPT), a global leader in test & measurement offers an extensive portfolio of solutions to test data centers, cloud computing environments, high speed Ethernet networks and services, 3G/4G wireless networks and devices, network security, and global navigation satellite systems. For more information visit http://www.spirent.com/about-us/News_Room/About_Spirent_Communications_plc.aspx

- See more at: http://www.rsaconference.com/events/2013/usa/for-media/sponsor-news.htm#sthash.ZSWG2ZEP.dpuf

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.