Spirent announced today that Crossbeam Systems, the leading provider of next-generation security platforms for high-performance networks, has selected Spirent’s cyber network security solution to validate the performance of its latest X-Series network security platform. Crossbeam is using Spirent during a series of live multi-city technical briefings that allow security professionals to better understand how to simplify and scale security infrastructure while protecting networks, even under the worst case scenarios.

According to Identity Theft Resource Center, in 2010 there were 662 breaches that exposed more than 16 million records. And that’s just the reported breaches. The reported increase in the number of cyber-attacks highlights the devastating effects they can have on revenue due to stolen assets, damage control, lost productivity and reduced brand confidence. With the migration to cloud computing, security becomes even more important as organizations rely on external providers for data segregation, data privacy, privileged user access, availability and recovery.

“Our demonstrations are designed to show how multiple best-of-breed security partner applications can be consolidated and performance-optimized while running on the X-Series to protect even the most high-traffic, high-risk enterprise environments,” said Peter Doggart, director of product marketing, Crossbeam Systems. “Spirent’s solution enables us to quickly and easily create a variety of scenarios and profiles and then replicate security threats under realistic conditions, allowing our customers to understand how our platform will protect them, even in the most tenuous situations.”

Crossbeam is using Spirent Avalanche™ to generate traffic over the Crossbeam X60 platform to simulate real-world threat activity and security attacks. With the most realistic user emulation available, Spirent Avalanche delivers comprehensive network security testing, including secure network communication and vulnerability assessment with real attacks and user authentication.

“The spectrum of attack is no longer limited to the gateway of the physical facilities but extends to threats between and across physical servers and virtual machines,” said Jeff Schmitz, vice president, Networks & Applications group at Spirent. “To validate the network elements, the test bed must reproduce the complexity and scale of a real network, down to the virtual machine level. If a test system can’t deliver this level of realism, the end users can’t have the assurance that the system will perform in a real network.”