Académique Documents
Professionnel Documents
Culture Documents
AUSTIN, Texas – May 4, 2010 – BreakingPoint today introduced the world’s first
Cyber Tomography Machine (CTM), a product designed for an interconnected world
that is inundated with escalating network traffic and cyber attacks from a growing
list of enemies. A CTM is the only product that allows organizations to pinpoint
previously impossible-to-detect vulnerabilities and stress fractures in network
components such as routers, switches, firewalls, servers and data centers before
they are exposed and wreak havoc in critical network infrastructures.
Mr. Wilson continued, “The shift is already happening. New legislation is making its
way through the state and federal levels, requiring resiliency certification of IT
equipment. Global organizations are demanding a deterministic and ever-current
means to measure the security and performance of their next-generation networks.
It is this need that BreakingPoint is uniquely positioned to meet with Cyber
Tomography. Our ability to simulate real-world applications, real-time security
attacks, millions of users and gigabit speeds eliminates the voodoo and rhetoric
from cybersecurity, replacing it with actionable intelligence to harden cyber
infrastructure.”
About BreakingPoint
BreakingPoint pioneered the first and only Cyber Tomography Machine (CTM) to
expose previously impossible-to-detect stress fractures within cyber infrastructure
components before they are exploited to compromise customer data, corporate
assets, brand reputation and even national security. BreakingPoint is the standard
by which the world’s governments, enterprises and service providers determine the
resiliency and security of their cyber infrastructure. For more information, visit
www.breakingpoint.com.
Contact:
Kyle Flaherty
BreakingPoint Systems
(512) 821-6059
kflaherty@breakingpoint.com
###
i
Technolytics Institute, Focusing on Protecting Critical Infrastructure Cyber Protection (McMurray, Pa.: 2009),
2, 3
ii
The New York Times, “Cyberattack on Google Said to Hit Password System,” http://nyti.ms/b6ujbW, April 19,
2010
iii
Eric Savitz, “1 Trillion Net Connected Devices by 2013, Cisco Says,” Barron’s, March 24, 2010
iv
Federal Bureau of Investigation, 2009 Internet Crime Report (Washington, D.C.: 2010), 6
v
Federal Bureau of Investigation, 2009 Internet Crime Report (Washington, D.C.: 2010), 5
vi
Lloyd’s, “Cyber Liability,” http://bit.ly/bPTAH5, Jan. 7, 2010
vii
Grant Gross, “Senators Question Cyber Command’s Role,” Computerworld, April 15, 2010