Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:01 PM
Dark Reading
Dark Reading
Products and Releases

BreakingPoint Introduces Bing-like Security Strike Search Engine

Search engine helps users find and select security vulnerabilities

AUSTIN, Texas " Dec. 17, 2009 " BreakingPoint Systems, provider of the de facto standard for cybersimulation, recently saw its massive library of security strikes grow past the 4,300 mark. In order for BreakingPoint Elite users to more quickly search and identify the right security strikes for testing, BreakingPoint today introduced a powerful security strike search engine.

Watch the BreakingPoint Elite security strike search engine in action in the online demo video with BreakingPoint CTO Dennis Cox.

BreakingPoint Introduces Security Strike Search Engine and Dynamic Strike Management

With a massive library that exceeds 4,300 security strikes, BreakingPoint customers needed a more powerful way to find the relevant strikes for specific tests. Today, BreakingPoint introduced the test industry's first security strike search engine, which allows users to quickly find applicable strikes. The new strike manager also allows users to build and save intelligent security strike lists. These lists, based on individual criteria, automatically update with future strikes that meet the same parameters. The security strike search engine will also find any strikes created with BreakingPoint's Custom Strike Toolkit, a powerful tool providing the ability to write custom security strikes to run on BreakingPoint's hardware.

BreakingPoint CTO and Co-founder Dennis Cox Discusses Security-Testing Capabilities

"Surpassing 4,300 security strikes put BreakingPoint users in a unique position: They have the strikes they need for realistic testing, but sorting through the library to find the right strikes could be cumbersome. Taking a cue from Microsoft's Bing, we built a security strike search engine that allows our users to sort through all the information and find only the security strikes they need to build a realistic testing scenario. Using full-text search parameters, users receive accurate search results, helping to identify the strikes applicable to the test they want to run. Users can then go beyond simple search and build a security strike list based on their search criteria. This list then auto populates when BreakingPoint introduces new strikes that meet the original search parameters. This level of test automation is certainly required when you have a library of strikes such as ours. It also leaves people with no excuse not to test network and data center equipment properly prior to deployment."

BreakingPoint Elite users can experience this powerful new search tool, plus 30 additional features, by downloading the latest update.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.