Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery

Size: px
Start display at page:

Download "Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery"

Transcription

1 WHITE PAPER Cost-Efficient SSL Application Delivery Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery Always On SSL Since 1994, enterprises looking to protect the security and integrity of web transactions have relied on HTTPS. HTTPS uses the standards-based IETF SSL/TLS 1 protocols to authenticate web servers and to encrypt traffic sent between the user and the web server. In recent years, there has been a notable movement towards extending encryption beyond just web commerce transactions to protecting all web traffic. In 2010, Google switched to using HTTPS to secure use of their service and browser searches. 2 This helped prevent the theft of identity cookies, eavesdropping, as well as unwanted changes to transmitted content. Many other Internet service providers have also switched to HTTPS to secure their customers traffic, including Twitter and Facebook. 3,4 More recently, Microsoft issued a patch to all their client and server operating systems that blocked the usage of cryptographic keys less than 2048 bits RSA. 5 The transition to encrypting all Internet traffic is commonly referred to as always on SSL. A recent analysis by Sandvine of the Internet traffic on their customers networks revealed that 3.73 percent of upstream traffic and 1.97 percent of downstream traffic was protected with SSL. 6 Figure 1 predicts the impact of SSL traffic on IT organizations over the next five years. The blue line shows growth if the percentage of SSL protected traffic stays at the 2012 aggregated level of 2.23 percent. The red line shows the Coyote Point projection that 5 percent of Internet traffic will utilize SSL by These projections show that the growth in SSL traffic is significant, and that even small to mid-size enterprises will need highperformance SSL application delivery platforms starting as early as Today, most enterprises use SSL/TLS to secure traffic between multiple locations. However, these organizations are recognizing that a critical part of success depends on Exabytes per Year 45,000 40,000 35,000 30,000 25,000 20,000 15,000 10,000 5,000 0 SSL Traffic Growth Data courtesy of Sandvine* Global Internet Phenomena Report - 2H Sandvine GIPR Projection Coyote Point* Projection Figure 1. Projected growth in SSL traffic 2013 to 2018 the ability to also protect the privacy of customer and client traffic. Upgrading websites and applications to support SSL can take considerable effort. SSL is computationally intensive, and requires the server CPU to spend a considerable number of cycles encrypting and decrypting

2 traffic. This negatively impacts the response times and latency that the user experiences. The performance impact and resulting slower page loads caused by SSL processing were particularly notable through out 2011 and 2012 as the industry transitioned certificates based upon 1024-bit RSA keys to Extended Validation (EV) certificates using 2048-bit RSA keys. The longer key lengths increased the level of security, but required substantially more CPU processing cycles. There is the potential that even longer keys may be required in the future, as 4096-bit certificates are emerging for some applications. An effective solution to this performance bottleneck is to offload SSL processing from the web servers to separate appliances designed to perform SSL acceleration. These appliances must be fast, efficient, and cost effective to meet today s needs, and they must be capable of scaling as demand grows. Coyote Point provides SSL offload and acceleration on its application delivery controller (ADC) products. The company recognized that, as SSL protected traffic continued to grow, they needed to identify new technologies that would allow their appliances to exceed projected requirements. For this reason, Coyote Point chose the Intel platform for communications infrastructure to build its next-generation ADC product family. This paper describes the factors that influenced Coyote Point to design its next-generation ADC around this Intel platform, and how this translates into tangible benefits for IT organizations needing to address the challenges of increasing SSL traffic. How Application Delivery Controllers Manage SSL Traffic The common usage scenario for ADCs is to provide the appearance of a single Internet service, which is actually running on multiple servers. Examples include a single URL for multiple WWW servers or a single address for multiple Microsoft * Exchange servers. Any IT organization responsible for delivering web and application services to customers, probably has or is considering the purchase of ADCs, commonly called next-generation load balancers. ADC load balancers are deployed in enterprise organizations between the Internet and web servers, where workloads are distributed evenly across multiple servers, networks, CPUs, and other system resources. Load balancing has several key benefits, including maximizing throughput, minimizing network and server processing latencies and improving the performance and capacity of server infrastructure. Perhaps the most crucial benefit is that it prevents any one web or application server from becoming a single point of failure and interrupting application availability. Next-generation load balancers use sophisticated policy rules and scheduling algorithms to determine which server should receive a specific client request. Rules may be based on an extensive number of factors, such as geographical location, response times, and server capabilities. However, ADCs have evolved to do more than just load balancing. They continuously monitor and manage traffic and workloads, facilitate decisions about taking computing resources on and off line, monitor the health of a system, and identify potential resource constraints. Next-generation ADCs look deep inside packets to make intelligent decisions about how content should be manipulated and how to apply advanced routing strategies. Deep packet inspections provide a new level of optimization where workloads can be managed, based on the type of content and packet attributes, such as Quality of Service. There are two major technical challenges in designing next- generation ADCs with deep packet inspection capabilities. First, the underlying platform must be scalable and support the continued growth in Internet traffic. Second, the solution must efficiently handle the encryption/decryption of SSL traffic. Without the ability to decrypt packets, a load balancer cannot do deep packet inspections on encrypted traffic. 2

3 Interweb SSL-Enabled Web Browsers, Smart Phones, etc. SSL Secured Traffic Coyote Point * Load Balancer with Intel QuickAssist Technology Cleartext Traffic Figure 2. Coyote Point* SSL application delivery solution The location of the load balancer ADC, between the insecure Internet and the physically secured data center, makes it uniquely positioned to provide SSL offload and acceleration services. The ADC can provide SSL/TLS authentication and encryption services over the Internet, and then communicate in cleartext with the servers in the secured data center. This removes the need for servers to be burdened with processor-intensive decryption/ encryption processing. The Coyote Point * Solution A typical Coyote Point deployment is shown in Figure 2, with the ADC between the firewall and web servers. Arriving web traffic is decrypted at the ADC, inspected for application-specific parameters and forwarded to the appropriate servers in cleartext. Returning traffic from the servers is encrypted by the ADC before it is transmitted over the Internet. SSL hardware accelerators are not new in the Coyote Point feature set, and the company has used several different non-intel chipsets in previous product lines. However, when designing its next-generation ADC to meet the upsurge in encrypted traffic, a platform was needed that would provide an order of magnitude performance improvement. In 2013, Coyote Point will roll out a new series of ADCs, based on the Intel platform for communications infrastructure. Designed to process up to 160 million packets per second, it utilizes the Intel Communications Chipset 89xx Series to provide SSL hardware acceleration, compression, and pattern matching, and represents a major improvement in scalability and performance. This chipset series is dedicated and optimized to process the encryption and decryption of SSL traffic. It enables customers to offload the computationally intensive SSL processing from their servers while maintaining performance, even as the percentage of encrypted traffic grows. The Intel Communications Chipset 89xx Series is available in four SKUs, as shown in Table 1; three featuring hardware acceleration, making them scalable from 5 to Intel Communications Chipset 89xx Series : 5G 8910: 10G 8920: 20G SSL Throughput (Gbps) * RSA CRT decryption using 1024 bit key Performance SSL Throughput (PKE ops/s) No hardware acceleration Total Throughput (Gbps) 5 12, , , Table 1: Intel Communications Chipset 89xx Series performance 3

4 20 Gbps cryptography. The hardware accelerator can handle up to 28 thousand RSA CRT 7 operations per second, assuming a 1024 bit key, and 5.5 thousand assuming a 2048 bit key. The low-end SKU handles SSL cryptography in software, allowing developers to design and build their product solutions, and subsequently add hardware acceleration. Multiple Intel Communications Chipsets can be deployed within a single hardware platform, providing additional scalability. Customer Advantage with Coyote Point ADCs based on Intel Communications Chipsets Improve efficiency of server resources Most IT organizations are acutely aware that Internet traffic is growing exponentially, and are planning to expand their networks and data centers to support this growth. Many have already deployed ADCs to balance the load across multiple servers and optimize their resources. However, many IT organizations are only just beginning to see the uptake of encrypted SSL traffic over the Internet and its negative impact on performance. The recent transition to long length keys further exasperates this situation. The solution is to replace slower, legacy SSL products with higher performance and scalable SSL platforms. However, the advantages of implementing the Coyote Point ADC, based on Intel architecture, go beyond performance and scalability. Improve network performance Coyote Point s technical analysis shows that the Intel platform provides competitive performance advantages for both SSL processing and Layer 4 to 7 traffic management. Bill Kish, CEO at Coyote Point states, Typically Extended Validation SSL certificates and longer private key lengths slow servers and ADCs down by five to six times. In our trials we have seen a significant performance gain when we transitioned to the Intel Communications Chipset 89xx Series. Enable scalability as business grows The scalability of the Intel Communications Chipset 89xx Series enables Coyote Point to drive SSL acceleration capabilities into its low-end product family. This makes the technology and its benefits available to small businesses with as few as two web or exchange servers, through to large enterprise organizations that manage large data centers in multiple geographic locations. This level of scalability provides IT organizations with a solid plan for growth and the ability to quickly respond to traffic changes. Protect your investment For years, IT organizations have seen the benefits of running on Intel architecture. These include a roadmap of continued performance improvements and the ability to take advantage of new processors without the need to redesign and develop existing software applications. Intel s renowned tick-tock development methodology delivers a roadmap of continuous performance improvements to the market. Tick represents a significant reduction in the die size. The tock represents a new microarchitecture based on a reduced die size that optimizes both performance and power consumption. The Intel x86 processor family continues to support legacy operating systems, meaning that programs developed to run on older processors can run on the newer processors. IT departments can rest assured that application software, designed to run on the Intel platform for communications infrastructure, will run on future Intel microprocessors, and customers can take immediate advantage of new, higher-performance chipsets as they become available. Two things can be said with certainty: Internet traffic will continue to grow and a greater percentage of traffic will be encrypted in the future. We can also anticipate more complex and expensive encryption techniques. A Coyote Point ADC based on Intel architecture provides the performance to support this growth, and the 4

5 ability to roll out emerging cryptographic standards and recommendations. Drive down the cost of provisioning secure SSL connections The Coyote Point product roadmap delivers ADC products that increase performance while reducing the cost of processing SSL connections year after year. An essential part of delivering this roadmap is a robust software development environment. The Intel software development environment provides a comprehensive suite of tools that supports the entire software development cycle, from coding, compiling, and debugging to analyzing performance and troubleshooting. It combines industry-leading, open source software with a broad set of tools, to enable product development that achieves exceptional performance, code stability, and power optimization on the latest generation of Intel microprocessors. Figure 3 shows the Intel QuickAssist technology that provides developers with a consistent API to invoke the hardware acceleration engine. 8 This means that ADC applications, written for the Intel Communications Chipset 89xx Series, will work on the next generation of Intel s hardware accelerators, providing the reliability that IT departments need to support their data center traffic. Leverage virtualization The Intel Communications Chipset 89xx Series can perform thousands of RSA operations per second. When hardware acceleration is used in a virtual environment, its capabilities can be shared by multiple instances of the ADC applications. Conversely, an ADC application can utilize multiple chipsets. There are many advantages of virtualization, including the ability to consolidate hardware, reduce power consumption, improve security, and the flexibility to provision ADC resources as needed. Support of SSL hardware acceleration in a virtualized environment is important for large enterprise organizations that are hosting applications or providing cloud services, and need to quickly respond to changing traffic usages. These benefits can also be realized by small-and mediumsize businesses looking to improve the efficiency of their IT organizations. Coyote Point is fully committed to implementing virtualization on its next-generation ADC platform. According to Michael Hayes, President of Coyote Point, commented that, We anticipate being the first virtual ADC appliance vendor to support cryptographic acceleration and offload with the Intel Communications Chipset 89xx Series. Support the latest cryptography standards Security standards and recommendations continue to evolve. The Intel Communications Chipset 89xx Series supports the current industry SSL recommendations, such as adoption of longer length RSA keys and Extended Validation SSL certificates. It also supports new public key encryption techniques like Elliptic Curve Cryptography (ECC), which is expected to be standardized over the next few years as SSL/TLS security becomes even more prevalent. Figure 3. Intel Communications Chipset 89xx Series for SSL hardware acceleration Intel Ethernet Network Connection I347-AT4 PCIe* x16 Gen2 Intel Communications Chipset 89xx Series x4 GbE MAC x6 USB Intel QuickAssist Technology Crypto x2 SATA x50 GPIO x2 UART x4 DMI Compression SMBus LPC & SPI Timers WDT RTC HPET PCIe Gen1 Root PCIe Gen1 1x4 2x2 4x1 5

6 Product Plans and Real Solutions Today, Coyote Point is a market leader in the production of SSL performance and application delivery platforms. Its next-generation ADCs, running on the Intel communications platform, will provide IT organizations with solutions for handling the growth and the increasing complexity of encrypted web traffic. Coyote Point s initial Application Delivery Controller to be based on Intel architecture, targets smaller-tier to large enterprise markets. It provides a truly highperformance solution for enterprise organizations running data centers and experiencing increased SSL processing loads on their servers. Through intelligent rule-based decision making, these next-generation ADCs will load balance traffic across the servers while offloading and accelerating SSL processing, to allow the servers to run at optimal performance. Coyote Point is also extending the performance advantages of its next-generation ADC platform to small- and midtier customers. This will enable organizations with only a few servers to meet the growing market demands for encryption of Internet traffic while maintaining server performance. For more information about Coyote Point products go to For more information about Intel solutions for SSL hardware accelerators visit 6

7 1 Transport Layer Security (TLS) is the successor to Secure Sockets Layer (SSL). SSL is used in this white paper as an umbrella term encompassing both TLS and SSL protocols Global Internet Phenomena Report: Sandvine, Operations using the Chinese Remainder Theorem (CRT). 8 For additional information on Intel QuickAssist technology see INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EX-PRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RE-LATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. A Mission Critical Application is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. Buyers should consult other sources of information to evaluate the performance of systems or components they are considering purchasing. For more information on performance tests and on the performance of Intel products, visit Intel Performance Benchmark Limitations: benchmark_limitations.htm. Intel and the Intel logo, are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. * Other names and brands may be claimed as the property of others. Other vendors are listed by Intel as a convenience to Intel s general customer base, but Intel does not make any representations or warranties whatsoever regarding quality, reliability, functionality, or compatibility of these devices. This list and/or these devices may be subject to change without notice. Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. This document contains information on products in the design phase of development. Copyright 2013, Intel Corporation. All rights reserved. Printed in USA MS/VC/0113 Order No US 7

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

Intel Data Direct I/O Technology (Intel DDIO): A Primer >

Intel Data Direct I/O Technology (Intel DDIO): A Primer > Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Intel Media SDK Library Distribution and Dispatching Process

Intel Media SDK Library Distribution and Dispatching Process Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media

More information

Haswell Cryptographic Performance

Haswell Cryptographic Performance White Paper Sean Gulley Vinodh Gopal IA Architects Intel Corporation Haswell Cryptographic Performance July 2013 329282-001 Executive Summary The new Haswell microarchitecture featured in the 4 th generation

More information

Intel Service Assurance Administrator. Product Overview

Intel Service Assurance Administrator. Product Overview Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an

More information

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1. Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

VNF & Performance: A practical approach

VNF & Performance: A practical approach VNF & Performance: A practical approach Luc Provoost Engineering Manager, Network Product Group Intel Corporation SDN and NFV are Forces of Change One Application Per System Many Applications Per Virtual

More information

with PKI Use Case Guide

with PKI Use Case Guide Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION

More information

Developing High-Performance, Flexible SDN & NFV Solutions with Intel Open Network Platform Server Reference Architecture

Developing High-Performance, Flexible SDN & NFV Solutions with Intel Open Network Platform Server Reference Architecture White Paper Developing Solutions with Intel ONP Server Reference Architecture Developing High-Performance, Flexible SDN & NFV Solutions with Intel Open Network Platform Server Reference Architecture Developing

More information

A Superior Hardware Platform for Server Virtualization

A Superior Hardware Platform for Server Virtualization A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations

More information

Cloud based Holdfast Electronic Sports Game Platform

Cloud based Holdfast Electronic Sports Game Platform Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online

More information

The Case for Rack Scale Architecture

The Case for Rack Scale Architecture The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage

More information

How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1

How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 Technical Brief v1.0 February 2013 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED

More information

Securing the Intelligent Network

Securing the Intelligent Network WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.

More information

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration Intel HTML5 Development Environment Article - Native Application Facebook* Integration V3.06 : 07.16.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO

More information

Product Overview. UNIFIED COMPUTING Managed Load Balancing Data Sheet

Product Overview. UNIFIED COMPUTING Managed Load Balancing Data Sheet Product Overview Interoute s Load Balancing and Application Delivery services provide high availability, security and increased performance to your critical business applications. Based on the industry-leading

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Ubuntu* Enterprise Cloud Executive Summary Intel Cloud Builder Guide Intel Xeon Processor Ubuntu* Enteprise Cloud Canonical*

More information

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Accelerating High-Speed Networking with Intel I/O Acceleration Technology

Accelerating High-Speed Networking with Intel I/O Acceleration Technology White Paper Intel I/O Acceleration Technology Accelerating High-Speed Networking with Intel I/O Acceleration Technology The emergence of multi-gigabit Ethernet allows data centers to adapt to the increasing

More information

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Revision 1.4 March 10, 2015 Revision History Revision Revision History Date 1.0 First

More information

The Application Front End Understanding Next-Generation Load Balancing Appliances

The Application Front End Understanding Next-Generation Load Balancing Appliances White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.

More information

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Intel Identity Protection Technology with PKI (Intel IPT with PKI) Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION

More information

Fast, Low-Overhead Encryption for Apache Hadoop*

Fast, Low-Overhead Encryption for Apache Hadoop* Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software

More information

Achieve Deeper Network Security and Application Control

Achieve Deeper Network Security and Application Control Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet

More information

Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN

Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,

More information

How To Reduce Pci Dss Scope

How To Reduce Pci Dss Scope WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS

More information

iscsi Quick-Connect Guide for Red Hat Linux

iscsi Quick-Connect Guide for Red Hat Linux iscsi Quick-Connect Guide for Red Hat Linux A supplement for Network Administrators The Intel Networking Division Revision 1.0 March 2013 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH

More information

Intel Technical Advisory

Intel Technical Advisory This Technical Advisory describes an issue which may or may not affect the customer s product Intel Technical Advisory 5200 NE Elam Young Parkway Hillsboro, OR 97124 TA-1054-01 April 4, 2014 Incorrectly

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide

More information

Software Solutions for Multi-Display Setups

Software Solutions for Multi-Display Setups White Paper Bruce Bao Graphics Application Engineer Intel Corporation Software Solutions for Multi-Display Setups January 2013 328563-001 Executive Summary Multi-display systems are growing in popularity.

More information

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Solution Brief Telefonica NFV Reference Platform Intel Xeon Processors NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Summary This paper reviews Telefónica s vision and

More information

COSBench: A benchmark Tool for Cloud Object Storage Services. Jiangang.Duan@intel.com 2012.10

COSBench: A benchmark Tool for Cloud Object Storage Services. Jiangang.Duan@intel.com 2012.10 COSBench: A benchmark Tool for Cloud Object Storage Services Jiangang.Duan@intel.com 2012.10 Updated June 2012 Self introduction COSBench Introduction Agenda Case Study to evaluate OpenStack* swift performance

More information

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation

More information

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV) 新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV) 李 國 輝 客 戶 方 案 事 業 群 亞 太 區 解 決 方 案 架 構 師 美 商 英 特 爾 亞 太 科 技 有 限 公 司 Email: kuo-hui.li@intel.com 1 Legal

More information

Secure SSL, Fast SSL

Secure SSL, Fast SSL Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual

More information

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES

SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES SSL Encryption and Traffic Inspection ADDRESSING THE INCREASED 2048-BIT PERFORMANCE DEMANDS OF 2048-BIT SSL CERTIFICATES Contents Introduction 3 SSL Encryption Basics 3 The Need for SSL Traffic Inspection

More information

Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture

Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture White Paper Intel Xeon processor E5 v3 family Intel Xeon Phi coprocessor family Digital Design and Engineering Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture Executive

More information

How To Get A Client Side Virtualization Solution For Your Financial Services Business

How To Get A Client Side Virtualization Solution For Your Financial Services Business SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual

More information

How to Build a Massively Scalable Next-Generation Firewall

How to Build a Massively Scalable Next-Generation Firewall How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies

More information

Intel Internet of Things (IoT) Developer Kit

Intel Internet of Things (IoT) Developer Kit Intel Internet of Things (IoT) Developer Kit IoT Cloud-Based Analytics User Guide September 2014 IoT Cloud-Based Analytics User Guide Introduction Table of Contents 1.0 Introduction... 4 1.1. Revision

More information

Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management

Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management Identify, Monitor and Manage All SSL Certificates Present Datasheet: Leveraging Symantec CIC and A10 Thunder ADC The information

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Intel Platform and Big Data: Making big data work for you.

Intel Platform and Big Data: Making big data work for you. Intel Platform and Big Data: Making big data work for you. 1 From data comes insight New technologies are enabling enterprises to transform opportunity into reality by turning big data into actionable

More information

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security

More information

Getting More Performance and Efficiency in the Application Delivery Network

Getting More Performance and Efficiency in the Application Delivery Network SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency

More information

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology (IPT) Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright

More information

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*

More information

The ROI from Optimizing Software Performance with Intel Parallel Studio XE

The ROI from Optimizing Software Performance with Intel Parallel Studio XE The ROI from Optimizing Software Performance with Intel Parallel Studio XE Intel Parallel Studio XE delivers ROI solutions to development organizations. This comprehensive tool offering for the entire

More information

4 Delivers over 20,000 SSL connections per second (cps), which

4 Delivers over 20,000 SSL connections per second (cps), which April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation

More information

Power Benefits Using Intel Quick Sync Video H.264 Codec With Sorenson Squeeze

Power Benefits Using Intel Quick Sync Video H.264 Codec With Sorenson Squeeze Power Benefits Using Intel Quick Sync Video H.264 Codec With Sorenson Squeeze Whitepaper December 2012 Anita Banerjee Contents Introduction... 3 Sorenson Squeeze... 4 Intel QSV H.264... 5 Power Performance...

More information

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances White Paper Overview To accelerate response times for end users and provide a high performance, highly secure and scalable foundation for Web applications and rich internet content, application networking

More information

SSL Performance Problems

SSL Performance Problems ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation

More information

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide Opal* Compatibility Guide 1.0 Order Number: 331049-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL

More information

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp. Vendor Update Intel 49 th IDC HPC User Forum Mike Lafferty HPC Marketing Intel Americas Corp. Legal Information Today s presentations contain forward-looking statements. All statements made that are not

More information

Implementation and Performance of AES-NI in CyaSSL. Embedded SSL

Implementation and Performance of AES-NI in CyaSSL. Embedded SSL Implementation and Performance of AES-NI in CyaSSL Embedded SSL In 2010, Intel introduced the 32nm Intel microarchitecture code name Westmere. With this introduction, Intel announced support for a new

More information

Intel Data Migration Software

Intel Data Migration Software User Guide Software Version 2.0 Document Number: 324324-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY

More information

Intel: a Thought Leader Helping IoT Scale Out

Intel: a Thought Leader Helping IoT Scale Out Internet of Things Intel: a Thought Leader Helping IoT Scale Out The Next Evolution Of Computing Dr Jean-Laurent PHILIPPE Intel EMEA IoT Technical Manager Eclipse Days, Grenoble, Mar 30-31, 2015 Legal

More information

Intel HTML5 Development Environment Article Using the App Dev Center

Intel HTML5 Development Environment Article Using the App Dev Center Intel HTML5 Development Environment Article Using the App Dev Center v1.06 : 06.04.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

Intel Open Network Platform Release 2.1: Driving Network Transformation

Intel Open Network Platform Release 2.1: Driving Network Transformation data sheet Intel Open Network Platform Release 2.1: Driving Network Transformation This new release of the Intel Open Network Platform () introduces added functionality, enhanced performance, and greater

More information

Intel Small Business Advantage (Intel SBA) Release Notes for OEMs

Intel Small Business Advantage (Intel SBA) Release Notes for OEMs Intel Small Business Advantage (Intel SBA) Release Notes for OEMs Document Release Date: October 16, 2015 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO

More information

Accelerating Business Intelligence with Large-Scale System Memory

Accelerating Business Intelligence with Large-Scale System Memory Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

The Evolution of Application Acceleration:

The Evolution of Application Acceleration: WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda

More information

Deliver More Applications for More Users

Deliver More Applications for More Users HARDWARE DATASHEET Deliver More Applications for More Users F5 BIG-IP Application Delivery Controller (ADC) platforms can manage even the heaviest traffic loads at both layer 4 and layer 7. By merging

More information

Intel SSD 520 Series Specification Update

Intel SSD 520 Series Specification Update Intel SSD 520 Series Specification Update June 2012 Revision 1.0 Document Number: 327567-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary

Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary Intel HTML5 Development Environment Tutorial Building an Apple ios* Application Binary V1.02 : 08.08.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO

More information

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study The adoption of cloud computing creates many challenges and opportunities in big data management and storage. To

More information

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011 Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011 Document Number: 324818-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

White paper. Keys to SAP application acceleration: advances in delivery systems.

White paper. Keys to SAP application acceleration: advances in delivery systems. White paper Keys to SAP application acceleration: advances in delivery systems. Table of contents The challenges of fast SAP application delivery...3 Solving the acceleration challenge: why traditional

More information

Cisco and Citrix Solution

Cisco and Citrix Solution Cisco and Citrix Solution Build Application-Centric Data Centers with Application Delivery Controllers 2014 Cisco Citrix. All rights reserved. Page 1 What You Will Learn Cisco Application Centric Infrastructure

More information

Healthcare Security and HIPAA Compliance with A10

Healthcare Security and HIPAA Compliance with A10 WHITE PAPER Healthcare Security and HIPAA Compliance with A10 Contents Moving Medicine to the Cloud: the HIPAA Challenge...3 HIPAA History and Standards...3 HIPAA Compliance and the A10 Solution...4 164.308

More information

Advanced Core Operating System (ACOS): Experience the Performance

Advanced Core Operating System (ACOS): Experience the Performance WHITE PAPER Advanced Core Operating System (ACOS): Experience the Performance Table of Contents Trends Affecting Application Networking...3 The Era of Multicore...3 Multicore System Design Challenges...3

More information

Specification Update. January 2014

Specification Update. January 2014 Intel Embedded Media and Graphics Driver v36.15.0 (32-bit) & v3.15.0 (64-bit) for Intel Processor E3800 Product Family/Intel Celeron Processor * Release Specification Update January 2014 Notice: The Intel

More information

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA) Intel HTML5 Development Environment Tutorial Test & Submit a Microsoft Windows Phone 8* App v1.00 : 04.09.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.

More information

White Paper A10 Thunder and AX Series Application Delivery Controllers and the A10 Advantage

White Paper A10 Thunder and AX Series Application Delivery Controllers and the A10 Advantage White Paper A10 Thunder and AX Series Application Delivery Controllers and the A10 Advantage June 2013 WP_ADC 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks

More information

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02 Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9

More information

Leading Virtualization 2.0

Leading Virtualization 2.0 Leading Virtualization 2.0 How Intel is driving virtualization beyond consolidation into a solution for maximizing business agility within the enterprise White Paper Intel Virtualization Technology (Intel

More information

CLOUD SECURITY: Secure Your Infrastructure

CLOUD SECURITY: Secure Your Infrastructure CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED

More information

Accelerating Business Intelligence with Large-Scale System Memory

Accelerating Business Intelligence with Large-Scale System Memory Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness

More information

Intel Virtualization Technology (VT) in Converged Application Platforms

Intel Virtualization Technology (VT) in Converged Application Platforms Intel Virtualization Technology (VT) in Converged Application Platforms Enabling Improved Utilization, Change Management, and Cost Reduction through Hardware Assisted Virtualization White Paper January

More information

Intel Solid-State Drives Increase Productivity of Product Design and Simulation

Intel Solid-State Drives Increase Productivity of Product Design and Simulation WHITE PAPER Intel Solid-State Drives Increase Productivity of Product Design and Simulation Intel Solid-State Drives Increase Productivity of Product Design and Simulation A study of how Intel Solid-State

More information

PC Solutions That Mean Business

PC Solutions That Mean Business PC Solutions That Mean Business Desktop and notebook PCs for small business Powered by the Intel Core 2 Duo Processor The Next Big Thing in Business PCs The Features and Performance to Drive Business Success

More information

Accelerating Data Compression with Intel Multi-Core Processors

Accelerating Data Compression with Intel Multi-Core Processors Case Study Predictive Enterprise Intel Xeon processors Intel Server Board Embedded technology Accelerating Data Compression with Intel Multi-Core Processors Data Domain incorporates Multi-Core Intel Xeon

More information

Customizing Boot Media for Linux* Direct Boot

Customizing Boot Media for Linux* Direct Boot White Paper Bruce Liao Platform Application Engineer Intel Corporation Customizing Boot Media for Linux* Direct Boot October 2013 329747-001 Executive Summary This white paper introduces the traditional

More information

Intel Atom Processor E3800 Product Family

Intel Atom Processor E3800 Product Family Intel Atom Processor E3800 Product Family Thermal Design Guide October 2013 Document Number: 329645-001 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.

More information

Virtualized Security: The Next Generation of Consolidation

Virtualized Security: The Next Generation of Consolidation Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the

More information

Intel Network Builders

Intel Network Builders Intel Network Builders Nakina Systems Solution Brief Intel Xeon Processors Intel Network Builders Nakina Systems and Intel Make NFV Network Operational Introduction Every great generation of computing

More information

How Does Fax over IP Work?

How Does Fax over IP Work? Small Logo How Does Fax over IP Work? A Discussion of the T.30 and T.38 Protocols and the Dialogic Brooktrout Fax Products Executive Summary This white paper briefly describes the T.30 and T.38 protocols,

More information

Douglas Fisher Vice President General Manager, Software and Services Group Intel Corporation

Douglas Fisher Vice President General Manager, Software and Services Group Intel Corporation Douglas Fisher Vice President General Manager, Software and Services Group Intel Corporation Other brands and names are the property of their respective owners. Other brands and names are the property

More information

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information