spirent-logo

Spirent Highlights Expanded Security Focus at RSA 2017

Brand

spirent-logo

Spirent Communications, the world leader in testing solutions, today announced that the company will be demonstrating its expanded focus on security at the upcoming RSA Conference 2017 with a preview version of its CyberFlood performance and security validation software. Spirent positioning security technologist Guy Buesnel will be presenting a session on the evolution of deliberate threats to global navigation satellite systems (GNSS).

“With our expanded focus on security, Spirent is addressing the growing need in government, industry, health care and financial services for effective products and services to assess, validate and monitor the performance and security of their networks and applications,” said John Weinschenk, general manager of applications and security at Spirent. “We look forward to demonstrating at the RSA Conference how our industry leading product and service offerings can meet today’s need for performance and security effectiveness under a wide range of real-world threat and attack scenarios.”

Spirent will be showcasing industry leading CyberFlood software and many of its upcoming ease of use features and real-world threat and attack emulation capabilities. The new features will include a flexible advanced testing component for customized testing needs and extended fuzzing techniques that enable users to find more issues faster and understand them better than any competing product in the industry. Attendees will also be able to learn more about the scanning, penetration testing, monitoring and source code analysis security services available from Spirent SecurityLabs for networks, wireless infrastructures, websites, mobile applications and embedded devices.

Focusing on deliberate attacks against global navigation satellite systems at the application layer and through RF channels, Guy Buesnel will introduce session attendees to the vulnerabilities of satellite navigation and timing systems and how they have been exploited. Based on his experience in protecting GNSS receivers from emerging threats for nearly two decades, Guy’s session will address the evolution of deliberate GNSS threats and present the latest evidence of deliberate jammer use from a network of detector devices.

“There are compelling parallels between the manner in which IP threats have developed on the internet and the evolution of both jamming and spoofing attacks against GNSS,” said Buesnel. “Once people understand that the evolution of GNSS threats not only has clear parallels with the way in which IP threats have evolved, but also that GNSS share many of the features of a connected network, they will see that many of the lessons learned by the information security community apply equally well to the GNSS community.”

Leave a Reply

three × 1 =