• Tools to generate realistic, stateful traffic to help detect vulnerabilities
• Pre-canned conformance test suites to verify the network protocol stack implementations are correct and protected
• Complements Denial Of Service (DOS) tools
• Lab or cloud based solutions to run traffic generation services from outside an organisation's own network
• Ability to spoof MAC/IP and geographic location of where the simulated data comes from
• Stress testing, loading past the specified limit of the device under test (DUT) to see where it breaks
• Ability to create and test with invalid / unusual flows / messages
• Same test environment and language for many protocols and domains
• Easily tied into automated environments for regression testing etc
• Benchmarking – no of calls and call statistics etc
• Simulate malicious phones and networks