Ixia BreakingPoint Overview

Ixia BreakingPoint is the #19 ranked solution in our list of AST tools. It is most often compared to Spirent CyberFlood: Ixia BreakingPoint vs Spirent CyberFlood

What is Ixia BreakingPoint?

By simulating real-world legitimate traffic, distributed denial of service (DDoS), exploits, malware, and fuzzing, BreakingPoint validates an organization’s security infrastructure, reduces the risk of network degradation by almost 80%, and increases attack readiness by nearly 70%.

Buyer's Guide

Download the Application Security Testing (AST) Buyer's Guide including reviews and more. Updated: April 2021

Ixia BreakingPoint Customers

Corsa Technology

Ixia BreakingPoint Video

Pricing Advice

What users are saying about Ixia BreakingPoint pricing:
  • "We have a one year subscription license for $25,000 US Dollars."
  • "or us, the pricing is somewhere around $12,000 a year. I'm unsure as to what new licenses now cost."

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Systems Engineer at a tech services company with 51-200 employees
Real User
Validates the datasheets for anti-malware, DDoS, and ransomware response with prediction

What is our primary use case?

We use Ixia BreakingPoint as a security tester oriented to test other network security solutions. Validation is needed in case of major changes in your network security infrastructure. It might be a change in your HW, major change in architecture or if you just want to be sure, that new feature will not have an effect on the performance of your security solution. We use it for IDS, anti-malware, anti-DDoS, anti-ransomware, etc. You can use it also for testing the impact of an attack on your valid application traffic and infrastructure. Ixia BreakingPoint provides us with advanced network… more »

Pros and Cons

  • "There is a virtual version of the product which is scaled to 100s of virtual testing blades."
  • "The production traffic simulations are not realistic enough for some types of DDoS attacks."

What other advice do I have?

I would recommend not to use the OpenStack solution. It's hard to implement. If you have a choice, choose VMware. If you want high-performance, use recommended hardware with DPDK and Intel support. Use new hardware with PCI Express 3.0/3.1. Use multiple network cards for multiple blades. On a scale of 1 to 10, I would rate Ixia BreakingPoint a nine.
LF
SDWAN Architect at a aerospace/defense firm with 10,001+ employees
Real User
Enables us to generate traffic but the quality of the traffic generation should and will be improved

What is our primary use case?

Our primary use for Ixia BreakingPoint is stress testing. We are curently evaluating SDWAN solution. Ixia BP generate traffic and is simulating around 200 users. We didn't want to hire hundreds of people to simulate user web access. ;-) We bought the BreakingPoint to take care of it.

Pros and Cons

  • "We use Ixia BreakingPoint for Layer 7 traffic generation. That's what we like."
  • "The quality of the traffic generation could be improved with Ixia BreakingPoint, i.e. to get closer to being accurate in what a real user will do."

What other advice do I have?

Make sure that you can heavily test the product before purchasing. Testing will tell you if it works as expected with your lab setup. The breaking point UI is little bit fuzzy compare to the Spirent Cyberflood. On a scale of 1-10, I would rate this product a 7.
Find out what your peers are saying about Ixia, Spirent, OWASP and others in Application Security Testing (AST). Updated: April 2021.
479,763 professionals have used our research since 2012.
EK
Director at a aerospace/defense firm with 1,001-5,000 employees
Real User
Offers a lot of options, very stable and good technical support

What is our primary use case?

We use the solution to simulate traffic within the cyber range. We also use it for legacy protocols.

Pros and Cons

  • "The solution has many protocols and options, making it very flexible."
  • "The solution originally was hard to configure; I'm not sure if they've updated this to make it simpler, but if not, it's something that could be streamlined."

What other advice do I have?

We use the on-premises deployment model. I'd recommend the solution to others. We don't use all of its features, but it gives us what we need. I'd rate it nine out of ten.