High Performance Network Security

Size: px
Start display at page:

Download "High Performance Network Security"

Transcription

1 White PAPER High Performance Network Security Following the inexorable rise in the demand for bandwidth, the adoption of 10 Gigabit Ethernet is accelerating. An estimated 60,000 Ten GbE ports were sold in 2005 and 3 million ports are expected to be sold annually by GbE builds on the success of previous generations of Ethernet extending Ethernet simplicity and scalability across the LAN, MAN, and WAN. Whether in a massive data center, in the core of a large campus, or as a transport technology in a service provider or high speed research network, 10 Gigabit Ethernet represents a breakthrough technology that will give users a high performance, low-cost alternative to today s backbone technologies and a considerable competitive advantage. The speed and growth of high performance networks has always presented a challenge to the security IT staff. Today, that challenge is compounded by the very fluid, dynamic nature of security requirements. Network attacks are sophisticated; they are deployed against millions of machines in seconds; they avoid defenses by mutating, and like medical viruses infect the population at exponential rates (true viral contagion). Worse, the attackers themselves are increasingly driven by criminal intent whereas traditional attack activity has been motivated by curiosity and a desire to show off technical virtuosity, many current threats are motivated by profit and targeting key assets. The network itself is also becoming a prime target. By moving traffic faster, in larger pipes and in more scalable platforms, the network is an important asset that can be a target for attack. This rise in attacks at the network layer is reflected in the security statistics. According to the 2006 Internet Threat Index published by Symantec: "Over the last six months of 2005, Symantec detected an average of 1,402 Denial of Service (DoS) attacks per day. This is an increase of 51 percent from the first half of 2005, when Symantec detected an average of 927 DoS attacks per day." 2 Figure 1. Symantec Internet Security Threat Report, Volume IX 1 Dell Oro Group, Ethernet Switch Report, Five Year Forecast, Jan, Source: Innovating 10 Gigabit Security 10 GbE Security Appliances Security appliances are now a mainstay in the corporate security arsenal. Intrusion Prevention Systems (IPS) are one of the leading categories of security appliances. Unlike traditional devices like firewalls which examine packet headers alone, an IPS examines the entire packet called deep packet inspection and is capable of detecting and blocking application level attacks such as the Blaster worm that exploited specific DCOM RPC vulnerabilities that firewalls let pass. An IPS can effectively bring both deep packet inspection and stateful pattern matching together with security enforcement and blocking to recognize and stop malicious traffic. The single biggest challenge for any security appliance, firewall or IPS is delivering security at the performance levels required by today s networks. Put simply, the speeds of networking technologies have far surpassed the capabilities of today s security appliances to monitor, analyze, filter, and defend the network. The result is a Hobbesean dilemma for corporations slow the network and ensure security or provide a high speed network with reduced security protection. Resolving this tradeoff creates a parallel and daunting challenge for security vendors. Delivering inspection and firewalling services at 10 Gigabit speed is enormously challenging but adding the requirement for flexibility so that the security appliance can adapt to and defend against new attacks has never been accomplished until now. The 2006 FORCE10 NETWORKS, INC. [ P AGE 1 OF 5 ]

2 heart of the problem lies in the traditional divide between software and hardware. Software provides flexibility but is slow because it runs on general purpose microprocessors. Hardware, on the other hand, has traditionally been blazing fast, but has not been flexible and therefore not ideal for environments in which the requirements are constantly changing. First generation security devices attempted to resolve this challenge by running security software on faster and faster microprocessors. While this improved speed somewhat, the maximum performance remained well below Gigabit speeds. The second generation of devices used hardware to assist the software in an effort to offload some of the "security work". This did improve performance but again topped out near 1 Gigabit per second. The second generation also suffered from being exceptionally expensive which limited its adoption in the market. In sum, security appliance systems have existed on a hard divide deliver the software flexibility necessary to deliver adaptable security rules or provide high performance by utilizing dedicated, permanent silicon-based computing systems such as those delivered from ASICs but give up flexibility in trade. DPI: Solving the Software-Hardware Conundrum The Force10 P-Series is the first of a new generation of security appliances. It is based on a fundamentally different technology called DPI (Dynamic Parallel Inspection), which provides the performance of custom hardware but the flexibility of software. DPI overcomes the software-hardware conundrum through the patented use of a massively parallel inspection process deployed entirely in field programmable gate array technology (FPGA). Dynamic Parallel Inspection uses an innovative extension of a well known super computing taxonomy, known as multiple instruction, single data, and takes advantage of the flexibility and dynamic characteristics of FPGA hardware processing. In multiple instruction single data designs, a single compute resource is broken up into "blocks" which all simultaneously perform tasks on the same unit of data. As a line-rate system, for 10 Gigabit deep packet inspection, each "block" is a continuous stream of 128 bit data blocks from the million packets per second in a 10 Gigabit stream. The FPGA is allocated into hundreds or thousands of "blocks" and in each block the desired security rules are embedded in the gates of the FPGA. Then, as a packet moves through the system, each block applies all of its rules simultaneously. By splitting security rules into many discrete engines that can run on the same data in parallel, and by embedding these rules in the gates of an FPGA, DPI can achieve both record-breaking inspection throughputs of million packets per second, while doing so in under 16 microseconds. Finally, each of the security rules which are embedded in the blocks can be changed dynamically. As new threats emerge, new rules can be written and pushed into the blocks. This can be done online, on the fly, or offline. In fact, these rules can be changed in a production system and are applied in less than 1/10th of a second. During the application of new rules, the system will maintain all state and continue to apply all existing rules without interruption. In sum, DPI achieves both the dynamic, real-time flexibility required for today s fast-changing IPS requirements, while introducing the industry s first line-rate 1 Gigabit and 10 Gigabit inspection and prevention system. How It Works Pre-Processing: To begin inspecting traffic, the DPI engine converts the entire traffic stream, including all payload and header information into "words" of 128 bits or less. Similarly, each security rule is also represented as a "word". The stream then compares the rules to create a Boolean value indicating a match or not a match on the current cycle. This stream can also be run against multiple signature words providing a very large number of concurrent comparisons to be executed in parallel. Figure 2. DPI Parallel Block Inspection Inspection/Detection: Each of the packet inspection blocks in the FPGA operates as a comparison unit. Each comparison unit includes matching logic to match a specific rule and at any time can assert a true or false signal indicating whether a match occurred. Based on user preference, a matched signal can be configured to trigger an alarm, a network block or the traffic can be 2006 FORCE10 NETWORKS, INC. [ P AGE 2 OF 5 ]

3 mirrored or captured to the host operation system. Traffic streams can also be matched against existing known flows through a stateful packet inspection table that tracks and keeps state information on all established flows of traffic. Key Benefits Industry Leading Line-rate Performance The fundamental building block of the P-Series security appliance, the DPI engine, is the only architecture that can support line-rate 10 Gigabit Ethernet performance today. Just as the speeds of networks have outpaced the ability of traditional security system designs, the signature scale and complexity of signatures in IPS systems are also rapidly growing. One of the key advantages of the P-Series and the DPI design stems from the matching of payload traffic against multiple subsystems which allows virtually unlimited signature scaling. The data stream can be presented to each functional "rule" cocurrently so as to maintain wire-speed packet processing. If one needs more signatures or more complexity in signature operations, these can be incrementally added through the use of additional parallel FPGAs. Figure 3. DPI Packet Inspection Flow One key design element of the DPI process is that serializing the input stream to large words (to achieve higher speeds) does not add cost to the solution since it only involves widening the input bus without requiring additional hardware. In fact, to deliver 10 Gigabit linerate inspection, traffic which was originally serialized into 16 bit words was scaled to 128 bit words. Widening does affect the amount of logic required to perform the matching functions but does not incur any additional synchronization overhead. This well-known property of data-parallel systems, therefore, allows cost-effective scaling to occur with the addition of multiple processors interconnected with simple combinatorial circuits. Each signature word can also be pre-programmed to match network traffic by: an initial word of a signature a middle word of a signature a unique word of a signature the last word of a signature a word to occur at a specific offset from the start of the packet This processing technology can scale in both speed by employing larger de-serialized words to balance faster serial links and in the number of signatures by adding more matching logic to store the additional signatures. The additional matching logic may be gained through adding FPGAs. Another scalability advantage stems from the fact that an increase of more rules or signatures only results in minimal synchronization overhead by virtue of the use of a single data stream. In other words, as you scale more gates for packet processing, a smaller percentage of the hardware is required for traffic management and overhead. Figure 4. DPI Parallel Block Inspection Open Flexibility In addition, the DPI s programmable features (built entirely in FPGAs), can be totally customized to various capabilities in pattern matching, anomaly detection, blocking and firewall filtering, monitoring or network capture. The entire system can be reprogrammed at the level of the silicon "assignments" of each gate on the FPGA. This flexibility is also driven by the openended nature of the DPI inspection logic. There are no protocol, packet, framing requirements, and as such, customizing new inspection capabilities (IPv6 traffic inspection for example) can be quickly facilitated FORCE10 NETWORKS, INC. [ P AGE 3 OF 5 ]

4 Stateful Matching Stateful matching enforces a time dependency between the matching events. With stateful pattern matching, it is possible to specify which matching event needs to occur at which time with respect to other matching events. In order to achieve this, it is necessary to store information (state) on which events occurred and use such information each time a new event occurs. Stateful matching improves the accuracy of detection because it adds ordering when specifying behaviors across multiple matching events. As in many designs, one of the great challenges of stateful matching is to efficiently manage the matching information as it unfolds. It is often the case that there are limited resources to record the information and thus techniques are needed to reclaim stale resources for new matching events. Because wire-speed, hardware-based matching systems work synchronously without the aid of operating systems, they need to manage state in a simple and deterministic way. The DPI incorporates a lossless state management algorithm that allows a deterministic use of memory resources by matching state to follow a non-cyclic pattern (with the exception of a transition to garbagecollect stale states). This restriction on the state transition greatly simplifies the memory management system at the expense of expressiveness of the stateful matching design. However, the number of stateful signatures requiring cyclic patterns are estimated to be very low. Predictable Performance As a pure hardware-based inspection system, the P-Series is inherently predictable across all traffic loads, with any number of security rules enabled. The DPI technology literally assigns individual inspections and packet analysis directly into silicon hardware "gates" on the chip. By using true hardware separation of the blocking, mirroring and capturing sub-systems, DPI ensures there is no impact to signature inspection logic or its wire-speed operation under load, under full traffic capture, or under any traffic mirroring or blocking scenarios. This leads to identical performance, identical throughput, and identical latency with any traffic load, and under full use of the system s security policies. Cost Effective Force10 has created a compilation and synthesis process to optimize the DPI s use of the gates in the FPGA allowing the lowest cost per inspected Gigabit of bandwidth in the industry. This patented process is able to find processing "overlaps" by identified similarities in the security rules. At a high level, this means that security rules share a logic, and can utilize the same silicon gates on the hardware to perform that same function. In sum, the P-Series delivers the lowest cost of inspected bandwidth in the industry. Key Applications for the P-Series The combination of high performance line-rate 10 GbE density, ultra low latency, total open flexibility, and reliable and resilient operation are driving five P-Series solution architectures: Dedicated IDS/IPS: For intrusion detection and protection, the P-Series models P1 and P10 support existing, open source network security and monitoring applications by specifying capture and filtering policies using public domain IDS signatures such as Snort and Bro or standard network packet capture (Libpcap) monitoring libraries. Firewall and IDS/IPS Pre-Processing: Because of its performance characteristics, the P-Series is also being deployed in front of other IDS/IPS and firewall systems as a security accelerator. P-Series technology also provides developers an API for creating custom network security and monitoring applications such as stateful firewalling, DoS and DDoS, and packet and flow analysis applications. Lawful Intercept: In surveillance, lawful intercept and Communications Assistance for Law Enforcement Act (CALEA) compliance applications, new aggregate network speeds and recently increased illegal activity on the Internet have challenged law enforcement's ability to conduct authorized electronic surveillance online. The P-Series, in its ability to stay fully deterministic under full traffic conditions and the full customization to search any where in the data stream, including IPv6 header information, provides the ideal solution to this challenge. The P-Series dynamic packet and traffic capture capabilities are a strong compliment to Force10 switching solutions already gaining traction in this application FORCE10 NETWORKS, INC. [ P AGE 4 OF 5 ]

5 Regulatory Compliance Applications: The ability to continuously guard, monitor, and capture key data are also key elements of both the Sarbanes-Oxley Act (SOX) of 2002 and the Health Insurance Portability and Accountability Act (HIPAA) of Both were driven by the need to improve how we report, govern, and disclose public information and manage confidential record keeping. For organizations, compliance with these acts is a problem of network visibility providing information to key officers so they can attest to the integrity of their financial controls for Sarbanes-Oxley, or the integrity and security of health information for HIPPA. Because the P-Series can identity traffic by any nature machine, address, traffic type and provide line-rate monitoring and packet capture of potentially thousands of search strings, customers have been able to insert the P-Series at key network intersections and provide compliance visibility to these regulations. Custom Open-Ended Wire-Speed Applications: Due to the unique properties of the DPI technology wire speed, predictable, programmable packet analysis customers are also pursuing new and unique applications for the P-Series using the application programming interface (API). Examples of customer-driven P-Series applications include a network monitoring and diagnostic application at an Internet exchange, and a U.S. financial services customer writing a latency validation application for Tibco message data. Summary The Force10 P-Series, and its DPI technology, represent the next generation security appliance. Based on DPI integrated hardware packet processing technology, the P-Series is capable of deep packet inspection at line-rate 10 Gigabit speeds, enabling the P-Series to monitor, capture and block malicious traffic without impacting performance. The P-Series is adaptable and extensible to provide open flexibility especially important in network security and packet monitoring applications. Force10 is the performance and resiliency leader in Gigabit and 10 Gigabit Ethernet switching and routing. With the launch of the P-Series, we extend our technology leadership into the security market, while introducing industry-leading innovations in high speed security designs. The P-Series, based on advanced DPI technology, brings new performance scaling, reliability, flexibility and predictable performance to stateful packet inspection, filtering and capture and blocking applications. Force10 Networks, Inc McCarthy Boulevard Milpitas, CA USA PHONE FACSIMILE 2006 Force10 Networks, Inc. All rights reserved. Force10 and the Force10 logo are registered trademarks, and EtherScale, FTOS and TeraScale are trademarks of Force10 Networks, Inc. All other brand and product names are trademarks or registered trademarks of their respective holders. Information in this document is subject to change without notice. Certain features may not yet be generally available. Force10 Networks, Inc. assumes no responsibility for any errors that may appear in this document. WP v FORCE10 NETWORKS, INC. [ P AGE 5 OF 5 ]

WHITE PAPER. Extending Network Monitoring Tool Performance

WHITE PAPER. Extending Network Monitoring Tool Performance WHITE PAPER Extending Network Monitoring Tool Performance www.ixiacom.com 915-6915-01 Rev. A, July 2014 2 Table of Contents Benefits... 4 Abstract... 4 Introduction... 4 Understanding Monitoring Tools...

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

100 Gigabit Ethernet is Here!

100 Gigabit Ethernet is Here! 100 Gigabit Ethernet is Here! Introduction Ethernet technology has come a long way since its humble beginning in 1973 at Xerox PARC. With each subsequent iteration, there has been a lag between time of

More information

Securing the Intelligent Network

Securing the Intelligent Network WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.

More information

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Denial of Service (DOS) Testing IxChariot

Denial of Service (DOS) Testing IxChariot TEST PLAN Denial of Service (DOS) Testing IxChariot www.ixiacom.com 915-6681-01, 2005 Contents Overview of Denial of Service functionality in IxChariot...3 A brief outline of the DoS attack types supported

More information

10 Gbps Line Speed Programmable Hardware for Open Source Network Applications*

10 Gbps Line Speed Programmable Hardware for Open Source Network Applications* 10 Gbps Line Speed Programmable Hardware for Open Source Network Applications* Livio Ricciulli livio@metanetworks.org (408) 399-2284 http://www.metanetworks.org *Supported by the Division of Design Manufacturing

More information

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats Symantec Enterprise Security WHITE PAPER Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats INSIDE Executive Summary Challenges to securing NAS An effective

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Avoiding Network Polarization and Increasing Visibility in Cloud Networks Using Broadcom Smart- Hash Technology

Avoiding Network Polarization and Increasing Visibility in Cloud Networks Using Broadcom Smart- Hash Technology Avoiding Network Polarization and Increasing Visibility in Cloud Networks Using Broadcom Smart- Hash Technology Sujal Das Product Marketing Director Network Switching Karthik Mandakolathur Sr Product Line

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),

More information

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

TIME TO RETHINK PERFORMANCE MONITORING

TIME TO RETHINK PERFORMANCE MONITORING TIME TO RETHINK PERFORMANCE MONITORING New requirements for application awareness and support for unified communications are challenging performance monitoring appliance vendors to reconsider their approach.

More information

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

How to Build a Massively Scalable Next-Generation Firewall

How to Build a Massively Scalable Next-Generation Firewall How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies

More information

Alteon Switched Firewall

Alteon Switched Firewall Alteon Switched SECURED BY Firewall Buyer s Guide A quick-reference aid to selecting the Alteon firewall that best meets a customer s needs When it comes to ensuring the safety of your network, one size

More information

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02 Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9

More information

Database Security in Virtualization and Cloud Computing Environments

Database Security in Virtualization and Cloud Computing Environments White Paper Database Security in Virtualization and Cloud Computing Environments Three key technology challenges in protecting sensitive data Table of Contents Securing Information in Virtualization and

More information

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency. Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High

More information

APRIL 2010 HIGH PERFORMANCE NETWORK SECURITY APPLIANCES

APRIL 2010 HIGH PERFORMANCE NETWORK SECURITY APPLIANCES APRIL 21 HIGH PERFORMANCE NETWORK SECURITY APPLIANCES The more you can process, the more value your network security appliance provides Disclaimer: This document is intended for informational purposes

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

Fail-Safe IPS Integration with Bypass Technology

Fail-Safe IPS Integration with Bypass Technology Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive

More information

Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment

Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Table of Contents Introduction 3 Limitations in WIDS monitoring 3 Monitoring weaknesses 3 Traffic analysis

More information

Analyzing Full-Duplex Networks

Analyzing Full-Duplex Networks Analyzing Full-Duplex Networks There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports), or full-duplex TAPs are the three

More information

Firewall Testing Methodology W H I T E P A P E R

Firewall Testing Methodology W H I T E P A P E R Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness

More information

High performance security for low-latency networks

High performance security for low-latency networks High performance security for low-latency networks Fortinet solutions for the financial services sector Financial Services Fortinet solutions protect your network and proprietary data without compromising

More information

OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES

OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES It is possible to consolidate multiple network appliances into a single server using intelligent flow distribution, data sharing and virtualization

More information

Insiders View: Network Security Devices

Insiders View: Network Security Devices Insiders View: Network Security Devices Dennis Cox CTO @ BreakingPoint Systems CanSecWest/Core06 Vancouver, April 2006 Who am I? Chief Technology Officer - BreakingPoint Systems Director of Engineering

More information

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one

More information

Radware s Attack Mitigation Solution On-line Business Protection

Radware s Attack Mitigation Solution On-line Business Protection Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...

More information

Advanced Core Operating System (ACOS): Experience the Performance

Advanced Core Operating System (ACOS): Experience the Performance WHITE PAPER Advanced Core Operating System (ACOS): Experience the Performance Table of Contents Trends Affecting Application Networking...3 The Era of Multicore...3 Multicore System Design Challenges...3

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: info@cs3-inc.com The Reverse Firewall: Defeating

More information

Database Security, Virtualization and Cloud Computing

Database Security, Virtualization and Cloud Computing Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs P/N 500205 July 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 1 Integrated VPN/firewall Page 2 placed

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

Application Security Backgrounder

Application Security Backgrounder Essential Intrusion Prevention System (IPS) & DoS Protection Knowledge for IT Managers October 2006 North America Radware Inc. 575 Corporate Dr., Lobby 1 Mahwah, NJ 07430 Tel: (888) 234-5763 International

More information

Observation and Findings

Observation and Findings Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

How To Design An Intrusion Prevention System

How To Design An Intrusion Prevention System INTRUSION PREVENTION SYSTEMS (IPS): NEXT GENERATION FIREWALLS A Spire Research Report March 2004 By Pete Lindstrom, Research Director SP i RE security Spire Security, LLC P.O. Box 152 Malvern, PA 19355

More information

Observer Analysis Advantages

Observer Analysis Advantages In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Consolidating Multiple Network Appliances

Consolidating Multiple Network Appliances October 2010 Consolidating Multiple s Space and power are major concerns for enterprises and carriers. There is therefore focus on consolidating the number of physical servers in data centers. Application

More information

Firewalls and IDS. Sumitha Bhandarkar James Esslinger

Firewalls and IDS. Sumitha Bhandarkar James Esslinger Firewalls and IDS Sumitha Bhandarkar James Esslinger Outline Background What are firewalls and IDS? How are they different from each other? Firewalls Problems associated with conventional Firewalls Distributed

More information

Cloud-ready network architecture

Cloud-ready network architecture IBM Systems and Technology Thought Leadership White Paper May 2011 Cloud-ready network architecture 2 Cloud-ready network architecture Contents 3 High bandwidth with low latency 4 Converged communications

More information

Using & Offering Wholesale Ethernet Network and Operational Considerations

Using & Offering Wholesale Ethernet Network and Operational Considerations White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier

More information

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity

More information

Network Security Forensics

Network Security Forensics Network Security Forensics As hacking and security threats grow in complexity and organizations face stringent requirements to document access to private data on the network, organizations require a new

More information

Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the security of people, economy, and infrastructure. One

More information

Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches

Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches Intel Ethernet Switch Converged Enhanced Ethernet (CEE) and Datacenter Bridging (DCB) Using Intel Ethernet Switch Family Switches February, 2009 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Cisco ASA 5500 Series IPS Solution

Cisco ASA 5500 Series IPS Solution Cisco ASA 5500 Series IPS Solution Product Overview Network threats and security compliance mandates continue to increase in number. The Cisco ASA 5500 Series Intrusion Prevention System (IPS) solution

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

Intelligent Data Access Networking TM

Intelligent Data Access Networking TM Gigamon TM delivers intelligent data access solutions to enhance monitoring of service provider and enterprise data centers. The company s world-renowned GigaVUE orange boxes aggregate, filter and replicate

More information

Solution Brief. Secure and Assured Networking for Financial Services

Solution Brief. Secure and Assured Networking for Financial Services Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

EAGLE EYE IP TAP. 1. Introduction

EAGLE EYE IP TAP. 1. Introduction 1. Introduction The Eagle Eye - IP tap is a passive IP network application platform for lawful interception and network monitoring. Designed to be used in distributed surveillance environments, the Eagle

More information

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Providing Secure IT Management & Partnering Solution for Bendigo South East College Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,

More information

POLIWALL: AHEAD OF THE FIREWALL

POLIWALL: AHEAD OF THE FIREWALL POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and

More information

Intrusion Defense Firewall

Intrusion Defense Firewall Intrusion Defense Firewall Available as a Plug-In for OfficeScan 8 Network-Level HIPS at the Endpoint A Trend Micro White Paper October 2008 I. EXECUTIVE SUMMARY Mobile computers that connect directly

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

White Paper Increase Flexibility in Layer 2 Switches by Integrating Ethernet ASSP Functions Into FPGAs

White Paper Increase Flexibility in Layer 2 Switches by Integrating Ethernet ASSP Functions Into FPGAs White Paper Increase Flexibility in Layer 2 es by Integrating Ethernet ASSP Functions Into FPGAs Introduction A Layer 2 Ethernet switch connects multiple Ethernet LAN segments. Because each port on the

More information

Definition of a White Box. Benefits of White Boxes

Definition of a White Box. Benefits of White Boxes Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies sandeep@ezchip.com Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

Why an Intelligent WAN Solution is Essential for Mission Critical Networks

Why an Intelligent WAN Solution is Essential for Mission Critical Networks Why an Intelligent WAN Solution is Essential for Mission Critical Networks White Paper Series WP100135 Charles Tucker Director of Marketing June 1, 2006 Abstract: Reliable Internet connectivity is now

More information

Compiling PCRE to FPGA for Accelerating SNORT IDS

Compiling PCRE to FPGA for Accelerating SNORT IDS Compiling PCRE to FPGA for Accelerating SNORT IDS Abhishek Mitra Walid Najjar Laxmi N Bhuyan QuickTime and a QuickTime and a decompressor decompressor are needed to see this picture. are needed to see

More information

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

First Line of Defense to Protect Critical Infrastructure

First Line of Defense to Protect Critical Infrastructure RFI SUBMISSION First Line of Defense to Protect Critical Infrastructure Developing a Framework to Improve Critical Infrastructure Cybersecurity Response to NIST Docket # 130208119-3119-01 Document # 2013-044B

More information

Scalability in Log Management

Scalability in Log Management Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

In-Band Security Solution // Solutions Overview

In-Band Security Solution // Solutions Overview Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used

More information

White paper. Keys to SAP application acceleration: advances in delivery systems.

White paper. Keys to SAP application acceleration: advances in delivery systems. White paper Keys to SAP application acceleration: advances in delivery systems. Table of contents The challenges of fast SAP application delivery...3 Solving the acceleration challenge: why traditional

More information

Make the Most of Big Data to Drive Innovation Through Reseach

Make the Most of Big Data to Drive Innovation Through Reseach White Paper Make the Most of Big Data to Drive Innovation Through Reseach Bob Burwell, NetApp November 2012 WP-7172 Abstract Monumental data growth is a fact of life in research universities. The ability

More information

5 Steps to Avoid Network Alert Overload

5 Steps to Avoid Network Alert Overload 5 Steps to Avoid Network Alert Overload By Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic

More information

Types of cyber-attacks. And how to prevent them

Types of cyber-attacks. And how to prevent them Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual

More information

Gaining Operational Efficiencies with the Enterasys S-Series

Gaining Operational Efficiencies with the Enterasys S-Series Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction

More information

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network 10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity

More information

Bivio 7000 Series Network Appliance Platforms

Bivio 7000 Series Network Appliance Platforms W H I T E P A P E R Bivio 7000 Series Network Appliance Platforms Uncompromising performance. Unmatched flexibility. Uncompromising performance. Unmatched flexibility. The Bivio 7000 Series Programmable

More information

Pervasive Security Enabled by Next Generation Monitoring Fabric

Pervasive Security Enabled by Next Generation Monitoring Fabric Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever

More information

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators Liang Xia Frank.xialiang@huawei.com Tianfu Fu Futianfu@huawei.com Cheng He Danping He hecheng@huawei.com

More information

Solving Monitoring Challenges in the Data Center

Solving Monitoring Challenges in the Data Center Solving Monitoring Challenges in the Data Center How a network monitoring switch helps IT teams stay proactive White Paper IT teams are under big pressure to improve the performance and security of corporate

More information

VALIDATING DDoS THREAT PROTECTION

VALIDATING DDoS THREAT PROTECTION VALIDATING DDoS THREAT PROTECTION Ensure your DDoS Solution Works in Real-World Conditions WHITE PAPER Executive Summary This white paper is for security and networking professionals who are looking to

More information