Select a tab
Testing in the ATC makes it all real
We use enterprise-class traffic generation tools, such as Ixia IxLoad, to simulate the applications that are unique to your organization to show how a solution seamlessly integrates into your network. Over the years we have developed a testing framework that allows us to go from concept to test plan to achieve the outcome needed for your product or solution evaluation.
Dedicated environments
Cyber Lab
Test software and hardware against real world situations in a multi-tenant, completely secure environment that can validate security tools, simulate live malware and serve as a proving ground.
Next-Gen Composition Lab
Accelerate provisioning and testing in this multi-vendor, fully equipped environment that includes blade chassis, rackmount servers, edge compute, composable compute, GPU, DPU, and various NICs.
Testing Capabilities in the ATC
Network Technologies Tested:
- Data Center Fabric Product Comparison
- Cisco ACI Data Center Fabric Evaluation
- Cisco NXOS Data Center Validation
- Cisco NXOS Single Device Validation
- SD-WAN Product Comparison
- Cisco Viptela, HPE Silver Peak, Palo Alto, VMware Cloudgenix
- Cisco Campus Catalyst Validation
- Cisco Viptela Hardware/Software Validation
- F5 LTM Hardware/Software Validation
- F5 GTM Hardware/Software Validation
Application Delivery Controller Testing
- Server Load balancing and SSL Offload testing
Application Layer Traffic Testing
- Layer 4 through 7 real world application testing
IntelligentWAN / Failover Testing
- Layer 2 through 3 traffic patterns for simulatedWAN and Failover testing
- Throughput and Latency
Traffic Impairment / WAN Emulation
- WAN Emulation and Latency Injection
- Packet corruption and alterations
Key Testing Tools
- Ixia IxNetwork and IxLoad
- Spirent Test Center and Cyber Flood
- Traffic Jam Network Impairment
NGFW Testing
- Security and Threat testing
- Throughput and Maximum Connections Per Second
- Cisco, Palo Alto, Fortinet, Checkpoint
End Point Security Testing
- Microsoft Defender, Carbon Black, Crowdstrike, McAfee, SentinelOne, Cybereason, Palo Alto Cortex, Broadcom
SSL Inspection Testing
- F5, AVI
Key Testing Tools:
- Ixia Breaking Point and Perfect Storm
- Spirent Cyber Flood
- Mandiant Security Solutions
HCI Performance and Validation Testing
- Disk I/O workloads for validating performance
- Validating Read/Write Distribution
- Dell, Cisco, Nutanix
Compute Power Testing
- Dell, HPE, Cisco
(VCF) VMware Cloud Foundation
(NSX) VMware
VDI End User Compute Testing
- VMware, Citrix
Key Testing Tools
- VDBench
- SpecPower
- SpecCPU
- LoginEnterprise
- HCI Bench
- Burnin Pro
Functional Storage Testing
- DellEMC, Pure Storage, NetApp
Performance Storage Testing
- DellEMC, Pure Storage, NetApp
(RAS) High Availability Storage Testing
- DellEMC, Pure Storage, NetApp
Storage Migration between platforms
- DellEMC, Pure Storage, NetApp
Data Protection
- Cohesity, Veeam, Rubrik
Software-Defined Storage
- DellEMC, NetApp
Object Storage Testing
- DellEMC, NetApp
(SAN) Storage Area Network Fabric
- Cisco MDS
Flash Storage Testing
- Disk I/O workloads for validating performance
Object Storage Testing
- Validating Read/Write Distribution with latency injection
Key Testing Tools
- VDBench
- CosBench
- SQL database change rate
- Oracle database change rate
Technologies:
- (CCE) Cisco Contact Center Functionality
- (CCE) Cisco Contact Center Upgrades\Migrations
- Cisco UC Functionality
- Cisco UC Upgrade\Migrations
Testing Platforms:
- Soft Phones
- Physical Phones
- Various User Endpoints