Spirent Communications, a leading provider of test, measurement, assurance, and analytics solutions for next-generation devices and enterprise networks, announced that at Black Hat USA in Las Vegas (August 7-8) it will demonstrate a number of new capabilities in its CyberFlood Data Breach Assessment solution and preview new use cases for security assessment in 5G networks.
The new Reconnaissance Mode feature in CyberFlood Data Breach Assessment mirrors the activity of an actual hacker to identify the processes, services and applications that comprise an enterprise network security zone and then automatically creates specific and accurate assessments based on that information.
The new feature will be demonstrated for the first time at Black Hat (booth #2404), where Spirent will also preview new CyberFlood use cases for security assessment in 5G networks.
CyberFlood is a powerful, automated solution that generates realistic application traffic and security threats within live or production networks, providing organizations with a continual security assessment of their enterprise network infrastructures.
Unlike assessment solutions that simulate attacks, CyberFlood uses actual attack components, true hacker activity, and malware executables accessed through continually updated threat intelligence services to validate an organization’s vulnerability to cybercrime.
At Black Hat, Spirent will also showcase:
- The unique ability of CyberFlood to assess and recommend policy, rule, and heuristics changes to security or network infrastructure in real-time recommendations based on vulnerabilities, misconfigurations, and other security weaknesses discovered during ongoing CyberFlood network assessment;
- The advantages of the NetSecOPEN test suite incorporation into CyberFlood, allowing organizations to easily use the full breadth of NetSecOPEN’s open network security and performance test standard methodologies to assess their security systems;
- The on-premises version of Spirent’s upcoming SecurityLabs vulnerability assessment and management platform, which provides up-to-the-minute security assessments of an organization’s entire attack surface – without the need for specialized testing personnel – by automatically managing, monitoring, and evaluating ongoing vulnerability and penetration testing; and
- Smart City hack demonstrations of the vulnerability of Supervisory Control and Data Acquisition (SCADA) infrastructure or Industrial Control Systems (ICS) to attackers, who could infiltrate and hijack these critical systems while operators in a control room remain unaware of any threat.