Spirent Highlights Expanded Security Focus at RSA 2017
San Jose, Calif., USA, 7 February, 2017 – Spirent Communications plc (LSE:SPT) – will demonstrate its expanded focus on security at the upcoming RSA Conference 2017 with a preview version of its CyberFlood performance and security validation software at the Moscone Center in San Francisco February 13–17. Also at the show, Spirent positioning security technologist Guy Buesnel will present a classroom session on the evolution of deliberate threats to global navigation satellite systems (GNSS).
“With our expanded focus on Security, Spirent is addressing the growing need in government, industry, health care and financial services for effective products and services to assess, validate and monitor the performance and security of their networks and applications,” said John Weinschenk, general manager of applications and security at Spirent. “We look forward to demonstrating at the RSA Conference how our industry leading product and service offerings can meet today’s need for performance and security effectiveness under a wide range of real-world threat and attack scenarios.”
Spirent representatives in the company’s booth (S2015 in the Moscone South hall) will be available during the show to speak with attendees about the industry leading CyberFlood software and many of its upcoming ease of use features and real-world threat and attack emulation capabilities. The new features will include a flexible advanced testing component for customized testing needs and extended fuzzing techniques that enable users to find more issues faster and understand them better than any competing product in the industry. Attendees will also be able to learn more about the scanning, penetration testing, monitoring and source code analysis security services available from Spirent SecurityLabs for networks, wireless infrastructures, websites, mobile applications and embedded devices.
Focusing on deliberate attacks against global navigation satellite systems at the application layer and through RF channels, Guy Buesnel will introduce session attendees to the vulnerabilities of satellite navigation and timing systems and how they have been exploited. Based on his experience in protecting GNSS receivers from emerging threats for nearly two decades, Guy’s session will address the evolution of deliberate GNSS threats and present the latest evidence of deliberate jammer use from a network of detector devices.
“There are compelling parallels between the manner in which IP threats have developed on the internet and the evolution of both jamming and spoofing attacks against GNSS,” said Buesnel. “Once people understand that the evolution of GNSS threats not only has clear parallels with the way in which IP threats have evolved, but also that GNSS share many of the features of a connected network, they will see that many of the lessons learned by the information security community apply equally well to the GNSS community.”
Part of the Mobile & IoT Security track, the Guy Buesnel classroom session (Session Code MBS-F01) will take place between 9:00 – 9:45 a.m. on Friday, February 17, 2017 on the second floor of the Moscone West hall, room 2002.
The Message Machine