2018-08-02T11:48:00Z

What is your primary use case for Ixia BreakingPoint?

Julia Miller - PeerSpot reviewer
  • 0
  • 46
PeerSpot user
6

6 Answers

Prakarn Wungpichayssuk - PeerSpot reviewer
Reseller
Top 10
2023-05-08T11:57:00Z
May 8, 2023

We are using Ixia BreakingPoint for security testing by generating traffic.

Search for a product comparison
Ruslan Melnyk - PeerSpot reviewer
Real User
Top 10
2023-03-22T09:32:05Z
Mar 22, 2023

We use it for building and backend use cases. We also have a verification firewall and visibility use cases.

EK
Real User
2019-11-13T05:28:00Z
Nov 13, 2019

We use the solution to simulate traffic within the cyber range. We also use it for legacy protocols.

it_user719259 - PeerSpot reviewer
Real User
2019-06-23T09:40:00Z
Jun 23, 2019

We use Ixia BreakingPoint as a security tester oriented to test other network security solutions. Validation is needed in case of major changes in your network security infrastructure. It might be a change in your HW, major change in architecture or if you just want to be sure, that new feature will not have an effect on the performance of your security solution. We use it for IDS, anti-malware, anti-DDoS, anti-ransomware, etc. You can use it also for testing the impact of an attack on your valid application traffic and infrastructure. Ixia BreakingPoint provides us with advanced network security features.

LF
Real User
2019-05-30T08:12:00Z
May 30, 2019

Our primary use for Ixia BreakingPoint is stress testing. We are curently evaluating SDWAN solution. Ixia BP generate traffic and is simulating around 200 users. We didn't want to hire hundreds of people to simulate user web access. ;-) We bought the BreakingPoint to take care of it.

PK
Reseller
2018-08-02T11:48:00Z
Aug 2, 2018

It is for network and security testing. It is not used for applications network and security solutions.

Find out what your peers are saying about Keysight Technologies, Spirent, OWASP and others in Application Security Testing (AST). Updated: March 2024.
765,386 professionals have used our research since 2012.
Application Security Testing (AST)
Application Security Testing (AST) solutions are used to identify and fix security vulnerabilities in software applications. They can be used at all stages of the software development lifecycle, from development to testing to deployment.
Download Application Security Testing (AST) ReportRead more