Create an Account
username: password:
 
  MemeStreams Logo

Testing and Validation of Network Security Devices — BreakingPoint

search

Security Reads
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Security Reads's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
Testing and Validation of Network Security Devices — BreakingPoint
Topic: Miscellaneous 9:31 pm EST, Mar 10, 2010

2010-03-01
Testing and Validation of Network Security Devices

While catching up on security news and blogs the other day, I came across a blog post from ICSA Labs entitled "Why a Test Lab Needs to be Wary of Commercial Exploit Packet Captures" and thought that it would be a good conversation starter to inform our readers about how BreakingPoint approaches developing test cases for security device testing, our methodology behind why we develop our test cases the way we do, and the thought processes and conclusions behind those decisions.

Pretty good overview of how BreakingPoint devices work.

Testing and Validation of Network Security Devices — BreakingPoint



 
 
Powered By Industrial Memetics
RSS2.0