网络安全

Enterprise Application and Cyber Security Efficacy Assessments: A Unified Approach

作者:

Blog - Enterprise Application and Cyber Security Efficacy Assessments: A Unified Approach

The idea of create once, use many is not new in the world of IT.

The idea of create once, use many is not new in the world of IT. There is no reason to re-invent the wheel – right? Then why is it not being practiced more diligently? Is it because the consumers of various technology services do not like saving time, resources and cost or have they not been offered such an option?

gears

In hardware and software development, reusability has been a natural and primary method of choice for increasing efficiency and it has been applied for decades now. Regardless of application and platform, we see many examples of it in both hardware and software. Although it appears that reusability has been more formalized in hardware, it has been more of an opportunistic approach in software development.

However, the state of software reusability may be uplifting by the recent trends in software application development. Micro-services, coupled with containers, are shifting the software development paradigm towards delivering applications through modularized services. These services can not only be reused, but also repurposed based on the new objectives at hand. The driving force behind the push forward for this hardware and software trend is simply the agility, efficiency, predictability and repeatability in service deployment that consumers demand.

All of this holds true when validating application performance and assessing security postures within a network infrastructure. Today’s technology options offer a multitude of solutions in relation to customer security infrastructure deployment and policy enforcements assessment. Customers may opt for an on-premise solution due to security mandates which consist of high-performance physical appliance or flexible virtual appliance. Alternatively, customers may opt for elasticity and a pay-as-you-go solution in the public cloud. The range of deployment possibilities may vary depending not only on the type of customer, but on the level of demand put on those customers as well. It may even vary at different time cycles due to conformance, right-sizing or service migration from physical to cloud services.

For an enterprise customer, it becomes crucial to gain agility, flexibility and repeatability across these deployment platforms with a unified test framework. This eliminates the need for additional time, resources and cost associated with rebuilding and reconfiguration. The engine behind this framework should not only deliver assessments via emulated traffic with realism (not simulated traffic or basic pcap replay), but should also be continuously updated with current malware, attack, and application content. It would be with such a unified validation approach that enterprise customers facing a range of deployment models can minimize the need for additional time, resources and expenses when doing on-going security and performance assessments, ultimately ensuring consistent user quality of experience.

Spirent CyberFlood provides a single controller architecture that can perform L4 – L7 performance and scalability, as well as cyber security assessments. It does this while also managing those test configurations across resources (queues) of physical appliances, virtual appliances and public cloud (AWS or Azure). CyberFlood generates test traffic based on realism of stateful scenarios and updates continuously with latest application, malware and attacks through TestCloud.

Cyberflood

Please visit us at www.spirent.com to learn more about how Spirent CyberFlood can help in validating enterprise network infrastructure security and performance.

喜欢我们的内容吗?

在这里订阅我们的博客

博客订阅

Reza Saadat
Reza Saadat

高级技术营销工程师,应用与安全部

Reza Saadat是思博伦应用与安全部的高级技术营销工程师,在计算机和数据通信技术方面拥有超过25年经验。在思博伦,Reza与产品管理、工程和销售团队合作,为网络设备制造商、企业和运营商推出最新的尖端应用和安全测试解决方案。他全面深入的行业、市场及软件开发知识以及协作设计与开发能力促成了众多硬件和软件解决方案的诞生——这些解决方案已在IBM、思科等各大公司得到了成功发布。