No more typing reviews! Try our Samantha, our new voice AI agent.

Defensics Protocol Fuzzing vs Ixia BreakingPoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Defensics Protocol Fuzzing
Average Rating
8.6
Number of Reviews
4
Ranking in other categories
Fuzz Testing Tools (4th)
Ixia BreakingPoint
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
8
Ranking in other categories
Static Application Security Testing (SAST) (31st)
 

Mindshare comparison

While both are Quality Assurance solutions, they serve different purposes. Defensics Protocol Fuzzing is designed for Fuzz Testing Tools and holds a mindshare of 16.0%, down 25.3% compared to last year.
Ixia BreakingPoint, on the other hand, focuses on Static Application Security Testing (SAST), holds 0.7% mindshare, up 0.2% since last year.
Fuzz Testing Tools Mindshare Distribution
ProductMindshare (%)
Defensics Protocol Fuzzing16.0%
PortSwigger Burp Suite Professional33.6%
GitLab29.2%
Other21.200000000000003%
Fuzz Testing Tools
Static Application Security Testing (SAST) Mindshare Distribution
ProductMindshare (%)
Ixia BreakingPoint0.7%
SonarQube15.3%
Checkmarx One9.7%
Other74.3%
Static Application Security Testing (SAST)
 

Featured Reviews

SK
Senior Technical Lead at HCL Technologies
Product security tests for switches and router sections
Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install. What I see in the documentation isn't that. Even if something doesn't malfunction, sometimes it is hard to install and execute. The product needs video documentation. This would help a lot more.
Prakarn Wungpichayssuk - PeerSpot reviewer
ManBusiness Directorager at CSG SOLUTION
Useful simulated attack database, high availability, but integration could improve
We are using Ixia BreakingPoint for security testing by generating traffic The most valuable feature of Ixia BreakingPoint is the ransomware and malware database for simulated attacks. The integration could improve in Ixia BreakingPoint. The vendor should provide a portal for webinars. I have…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Whatever the test suit they give, it is intelligent; it will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure, and because of that, we can eliminate a lot of unwanted test cases so we can execute the tests and complete them very quickly."
"The stability of this product is great; we tested it under multiple constraints and even on cloud services it is absolutely stable."
"The product is related to US usage with TLS contact fees, i.e. how more data center connections will help lower networking costs."
"ROI was 100%. Since there are no product suites available that provide the level of testing available with Codenomicon, the development, quality and security assurance departments know that the investment was correct."
"We have found multiple issues in our embedded system network protocols, related to buffer overflow. We have reduced some of these issues."
"Whatever the test suit they give, it is intelligent. It will understand the protocol and it will generate the test cases based on the protocol: protocol, message sequence, protocol, message structure... Because of that, we can eliminate a lot of unwanted test cases, so we can execute the tests and complete them very quickly."
"Simple and straightforward GUI."
"There is a virtual version of the product which is scaled to 100s of virtual testing blades."
"We use Ixia BreakingPoint for Layer 7 traffic generation. That's what we like."
"I like that we can test cloud applications."
"The most valuable feature of Ixia BreakingPoint is the ransomware and malware database for simulated attacks."
"It is a scalable solution."
"The most valuable feature is Layer 7 traffic generation such as Facebook, Netflix, WhatsApp."
"The DDoS testing module is useful and quick to use."
"The solution has many protocols and options, making it very flexible."
 

Cons

"You can't implement proprietary ciphering algorithms, nor can you modify protocol models if you need to test customized public protocols."
"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
"It requires understanding the Defensics protocol."
"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side. They cover only the client-side application... They do not have diagnostic tools for the target side. Rather, they have them but they are very minimal and not very helpful."
"Sometimes, when we are testing embedded devices, when we trigger the test cases, the target will crash immediately. It is very difficult for us to identify the root cause of the crash because they do not provide sophisticated tools on the target side."
"Codenomicon Defensics should be more advanced for the testing sector. It should be somewhat easy and flexible to install."
"It does not support the complete protocol stack. There are some IoT protocols that are not supported and new protocols that are not supported."
"The flash GUI has room for improvement."
"The SSL simulation is realistic but some kinds of tests work imperfectly."
"The production traffic simulations are not realistic enough for some types of DDoS attacks."
"I would appreciate some preconfigured network neighborhoods, which are predefined settings for testing networks."
"Currently BPS VE's REST API was just developed (some specific functionalities are implemented) and can be improved for better control over the tool using scripts, which help in test automation."
"The quality of the traffic generation could be improved with Ixia BreakingPoint, i.e. to get closer to being accurate in what a real user will do."
"The price could be better."
"The integration could improve in Ixia BreakingPoint."
 

Pricing and Cost Advice

"Licensing is a bit expensive."
"There is no differentiation in licenses for Breaking Point. For one license, you will get all the features. There is no complexity in that."
"The price is high. We pay for the license monthly."
"The price of the solution is expensive."
"The solution is expensive."
"We have a one year subscription license for $25,000 US Dollars."
"or us, the pricing is somewhere around $12,000 a year. I'm unsure as to what new licenses now cost."
report
Use our free recommendation engine to learn which Fuzz Testing Tools solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
11%
Financial Services Firm
9%
Retailer
6%
Manufacturing Company
16%
Construction Company
9%
Financial Services Firm
9%
Computer Software Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business7
Large Enterprise3
 

Also Known As

Codenomicon Defensics
No data available
 

Overview

 

Sample Customers

Coriant, CERT-FI, Next Generation Networks
Corsa Technology
Find out what your peers are saying about Defensics Protocol Fuzzing vs. PortSwigger Burp Suite Professional and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.