APU/GPGPU-BASED SECURITY SOLUTIONS. Vikenty Frantsev ALTELL CEO
|
|
|
- Jean Hicks
- 10 years ago
- Views:
Transcription
1
2 APU/GPGPU-BASED SECURITY SOLUTIONS Vikenty Frantsev ALTELL CEO
3 ALTELL: KEY FACTS Core business: IT security, software development, network appliances design & manufacturing Founded: Year 2006 Vertical markets served: telecommunications; financial & banking institutions; insurance companies; medicine; federal & municipal authorities Partnership with AMD started in 2008 Current engagements: Embedded: RTOS, routers based on G34 CPUs offered in Europe IBV (Independent BIOS Vendor) UEFI BIOS for Ontario & G34 OpenCL library development for AMD 3 APU/GPGPU-Based Security Solutions June 2011
4 ALTELL: CORE IP Secure BIOS with Virtualization capabilities - ensures security and control at boot, prevents intrusions, allows isolation of secure and non secure machines Virtualization environment isolates secure and non-secure machines, prevents intrusions Microkernel based operating system (RTOS for network appliances) - guarantees security of I/O, prevents intrusions Encryption and security tools crypto libraries, DPI, DLP, antivirus, antispam, packet routing etc guarantees security of received/transmitted data ALTELL has extensive expertise in network & security ALTELL has a software stack for a complete secure computer system (Secure BIOS, Virtualization Suite, seos RTOS, Network & Crypto Libraries, seos OS) 4 APU/GPGPU-Based Security Solutions June 2011
5 EVOLUTION OF COMPUTER/DATA SECURITY PRESENT Only small part of data is encrypted Large segments of corporate and personal data is transferred over open channels No encryption for majority of video and voice data FUTURE All data is encrypted Video and voice data transferred over secure, encrypted channels CHALLENGES Network speed and capacity Computational overhead associated with encryption (especially on the client side) Cost ASIC-based solutions OPPORTUNITIES GPGPU and Fusion development Broadband - WiMax, LTE, etc. Development of OpenCL, CUDA 5 APU/GPGPU-Based Security Solutions June 2011
6 Software Hardware Security needs NEW MARKET - CLIENT SECURITY Technology enablers Past Now Future Limited personal/business data are stored on a mobile computer. Limited connectivity to public network. Security treats are not fully understood Significant amount of personal/business data is stored on a mobile computer and remote servers. Pervasive connectivity to public networks. Growing need for secure communications and data protection on a client device Majority of personal/business data is stored on remote servers. Pervasive connectivity to public networks. Secure communications and data protection are a must Desktop/laptop equipped with a CPU Encryption done by the CPU VPN at 2 Mb/sec. Antivirus SW is run on the CPU Desktop/Laptop equipped with a CPU/GPU combination GPUs are becoming more and more power efficient, enabling their use as security processors 0.5 Gb/sec Device equipped with a Fusion APU. The GPU cores of an APU are used as security/network processors AMD Fusion (2011), Intel Sandy Bridge (2011),Apple A4 SGX543 Antivirus SW, VPN Antivirus, antispam SW, growing acceptance of the unified threat management (UTM) concept encryption, packet inspection, attack prevention growing security SW market UTM is a must. Pervasive use of security software encryption, DPI, DLP etc We target these segments in the client space 6 APU/GPGPU-Based Security Solutions June 2011
7 DATA ENCRYPTION SOLUTIONS CURRENT FUTURE Data are partially encrypted All data are encrypted Legal issues & prohibitions; export/import regulations Proprietary hardware-based crypto solutions; often incompatible with each other. Despite their high-performance, HW-based solutions cannot be upgraded. Highly priced. Transition to digital document flow & digitally signed documents ALTELL s solution utilizes the advantages of Fusion architecture with the help of OpenCL framework. Using task-based and data-based parallelism, ALTELL s solution drastically speeds up all crypto operations, beating even hardware-based solutions and network processors. Software-based solutions can be upgraded, but cannot compete with specialized ASICs. APU-based solution can be upgraded 7 APU/GPGPU-Based Security Solutions June 2011
8 EXISTING CRYPTO SOLUTIONS The competitive landscape of crypto market: Hardware-based solutions Pro: High performance; crypto operations are isolated from OS Cons: High cost of ownership; non-upgradable Software-based solutions Pro: Upgradable; low cost of ownership; can be implemented anywhere Cons: Slow; SW crypto modules can be compromised 8 APU/GPGPU-Based Security Solutions June 2011
9 NEEDS AND SOLUTIONS Facts Use of x86 for certain tasks bears prohibitive computational cost There is a customer driven need in hardware flexibility (programmability) at low cost Solutions Intel instructions integrated on the die AES encryption (up to 200 Mb/sec on Xeon CPUs), FPGA combined with an x86 processor on a board Apple, AMD, NVidia - GPGPU (OpenCL, CUDA, Apple A4 SGX543 ) AMD Fusion architecture 9 APU/GPGPU-Based Security Solutions June 2011
10 VISION The Fusion architecture offers customers a powerful, low cost and energy efficient programmable device The GPU part of an APU can be used for variety of tasks such as security, compression, networking, video etc Fusion architecture creates many new possibilities in existing markets and will create new applications and markets We believe that there will be an explosive demand in SW for heterogeneous architectures 10 APU/GPGPU-Based Security Solutions June 2011
11 WHY IS SECURITY THE APPLICATION OF CHOICE? Market perception of the Fusion concept is that it is mostly limited to graphics and HPC These markets are limited to gaming enthusiasts and HPC specialists Using Fusion concept for security provides ways to expand the Fusion appeal to the mainstream consumer, commercial enterprise and embedded markets We believe that there are mutual benefits for AMD in the security space Network & security IP gives us a significant advantage over competitors in time-to-market 11 APU/GPGPU-Based Security Solutions June 2011
12 OPPORTUNITIES Fusion technology (or CPU/GPU combination) enables development of cost efficient programmable security/network systems using GPU as a security/network co-processor Fusion security systems can provide up to 250% speed improvement and more than 1000% performance/$ improvement over existing systems based on specialty silicon Markets Embedded/network security GPGPU/Fusion based security systems can become a pervasive alternative to existing specialized hardware solutions. Fusion systems implemented on standard silicon can offer significant cost and performance advantages. These systems offer unparalleled flexibility and could offer a competitive edge in several large regional markets (China, Russia, Brazil, ME). A GPU core in this case serves as an efficient and programmable network/security co-processor (100 M TAM, est) Enterprise and consumer client market Fusion architecture will create a new market for security solutions on the client side of the computer business. Existing HW and SW systems are not well suited for client applications due to performance and cost restrictions. Fusion systems developed on standard silicon provide a fast and cost efficient solution for the space. (1 B TAM, est) Server market - GPGPU/Fusion security approach can be used with any CPU/GPU combination. This is a significant opportunity in the server (cloud server) (200 M TAM, est) 12 APU/GPGPU-Based Security Solutions June 2011
13 OPENCL SOLUTION: USAGE SCENARIOS GPGPU can be used in telecommunication devices and servers for wide range of applications: Fast packet processing that can be used for high load firewall appliances. For example, 10G link will lose 10% of bandwidth with 10 FW rules and about 50% of bandwidth with only 50 rules. CPU has to deal with large amount of packets, that should be processed. Packet processing requires quite simple checks with limited branches, and this task suits very well to OpenCL and GPGPU. Data compression/decompression. For high load devices, with many incoming and outgoing requests, data compression becomes a bottle neck. Data compression can be used in VPN tunnels, network services (www servers, etc.), content inspection software (IDS/IPS, antivirus, antispam). Data encryption and decryption is widely used in network devices and appliances, as well as in network servers. With accelerated connection speed growth encryption speed becomes an issue. Turning GPU into cryptoprocessor can provide a solution suitable to the whole market (network, server and client) 13 APU/GPGPU-Based Security Solutions June 2011
14 OPENCL SOLUTION: USAGE SCENARIOS Deep packet inspection that can be used in IPS/IDS (Intrusion Prevention/Detection Systems). Nowadays, IPS/IDS performance leaves much to be desired, due to high-speed connections and a lot of traffic generated by users, while packet inspection is a very resource-hungry & consuming task (typically, it requires pattern matching against huge database of signatures). GPGPU and OpenCL can speed up packet inspection up to 3x at least. Antivirus protection. Again, like in deep packet inspection case, antivirus protection requires pattern matching against database of virus signatures, viruses, trojan horses and other scumware. Packet routing. Core/border routers have to deal with thousands and millions records of gateways, reducing the speed of network in case of routers low performance. OpenCL applications should improve the situation. Data Loss Prevention. Content inspection & pattern matching used by modern DLP systems require substantial computational power. Typically general-purpose CPUs are used for this purpose. DLP performance can be improved by offloading CPU and processing the data with GPGPU. 14 APU/GPGPU-Based Security Solutions June 2011
15 SOLUTION BASED ON OpenCL / GPGPU GPGPU FUSION OpenCL Security libraries Data Storage Data Transfer A Fusion based system utilizes computational power of GPGPU or Fusion architecture, enabling ultra-fast crypto & security operations. Effectively, it turns an APU/GPGPU into a programmable security (co)processor. This approach overcomes problems of pure hardware (our solution is cost efficient and programmable) or pure software solutions (our solution is fast and energy efficient) 15 APU/GPGPU-Based Security Solutions June 2011
16 PROPOSED SUITE OF DEVTOOLS & SW STACKS Software Stacks and Libraries Crypto Compression TCP IP SSL SSL VPN IPSec/IKE Secure BIOS Antivirus Antispam Wireless security IDS/IPS SDKs Operating Systems HW Solutions Software Development Kit for OpenCL (OS, Tools, Libraries, Drivers, APIs) Linux, Windows, ios, etc. FUSION / GPGPU 16 APU/GPGPU-Based Security Solutions June 2011
17 DEVELOPMENT STAGES Implementation of: AES/ hash function / random number generator / Open SSL TLS / IPSec / other cryptographic algorithms Regular expressions / Deep packet inspection / Compression/Decompression AV / AS / IPS-IDS solutions 17 APU/GPGPU-Based Security Solutions June 2011
18 MULTICORE X86 CRYPTO SOLUTION Solution utilizes the computation power of Multicore architecture, allowing ultra-fast crypto operations to be performed. During encryption/decryption operations, data is processed in several parallel streams, allowing high performance to be achieved without specialized ASICs. IPsec AES 128 ECB 6 Gbit/s performance on Dual Opteron 12 Cores. 18 APU/GPGPU-Based Security Solutions June 2011
19 OpenCL CRYPTO SOLUTION Kernel Space Driver GPU 19 APU/GPGPU-Based Security Solutions June 2011
20 PROOF OF CONCEPT Prototype encryption system working on a GPU. The preliminary results are : AES encryption CPU only, Gbit/s AES encryptiongpu, Gbit/s SHA-256 rate, CPU only, Gbit/s SHA-256 rate, GPU, Gbit/s 3DES encryption CPU, Gbit/s 3DES encryption GPU, Gbit/s Block Size (Byte) In this test the measured quantity was the time required to encrypt one block with the AES 128 and 3DES with CBC algorithms and hash-function calculation. The start time was taken as the time EVP_CIpherUpdate() was called, the end time was the time of return from this routine. The hardware was an AMD Phenom II GHz/2Gb memory & HD5770 GPU combination. Optimization of the system and its implementation on true Fusion silicon is expected to bring encryption rate to 2Gbps (AMD Ontario). Larger improvements are expected for AMD Llano based systems. 20 APU/GPGPU-Based Security Solutions June 2011
21 PRODUCTS & TARGET CUSTOMERS Products Client Network Server OpenCL Security Library Regular expressions / Deep packet inspection/ Compression/Encryption BIOS GPGPU Encryption/VPN Module OpenCL Network Library OEMs Enterprise Consumers Security Suite: AV / AS / IPS-IDS solutions End Customers OEMs Enterprise OEMs Enterprise 21 APU/GPGPU-Based Security Solutions June 2011
22 CLIENT PLAN Products OpenCL Security Library Regular expressions / Deep packet inspection/ Compression/Encryption Customers - OEMs, Enterprise, Consumers Security Suite: AV / AS / IPS-IDS solutions BIOS GPGPU Encryption/VPN Module Revenue generation OEMs pay royalties for the BIOS security module Enterprise and consumer clients pay license fees for use of the GPGPU/Fusion security SW Target hardware Full HD secure video/computing terminal Secure laptop with encryption and Antivirus scanning Ontario Secure tablet 22 APU/GPGPU-Based Security Solutions June 2011
23 APU / GPGPU ANTIVIRUS SOLUTION Process efficiencies offered by Fusion APU or GPGPU provide an opportunity to perform on-access/on-demand antivirus/antispam scanning on a client/network device. OpenCL framework opens a path to offer this solution to a broad range of hardware platforms and client devices. Advantages over traditional antivirus solutions: Up to 10x faster Extremely effective: multiple virus signatures databases ensure % reliability Option to choose virus signature databases from different vendors Kaspersky Lab Symantec Trend Micro OpenCL-optimized engine. Runs on APU/GPGPU with multiple antivirus/antispam databases. On-access scan On-demand scan 23 APU/GPGPU-Based Security Solutions June 2011
24 NETWORK PLAN Products OpenCL Security Library Regular expressions / Deep packet inspection/ Compression/Encryption Customers - OEMs, Enterprise Security Suite: AV / AS / IPS-IDS solutions OpenCL Network Library Revenue generation OEMs pay one time fees and royalties for the OpenCL encryption and network libraries (IP Infusion model) Enterprise clients pay license fees for use of the GPGPU/Fusion security SW Target hardware Fusion router with encryption Ontario/Llano Secure WiFi router Ontario/Llano 24 APU/GPGPU-Based Security Solutions June 2011
25 PERFORMANCE: CAVIUM OCTEON VS AMD LLANO (ESTIMATES) CAVIUM OCTEON CN5860 AMD Fusion Llano (projected) CPU Frequency 750 MHz 3000 MHz Number of cores 16 4 ASP, USD 850$ 100$ SSL AES B encryption 8.46 Gbps 10 Gbps IPv4 FWD Performance 20 Gbps (limited by IO) 50 Gbps IPS/IDS Performance 4.4 Gbps (limited by RLDRAM2 bandwidth) 8 Gbps Antivirus Performance 4.4 Gbps (limited by RLDRAM2 bandwidth) 8 Gbps Compression Performance 10 Gbps 16 Gbps Fusion security systems are projected to provide up to 250% speed improvement and more than 1000% performance/$ improvement over existing specialty silicon solutions 25 APU/GPGPU-Based Security Solutions June 2011
26 SERVER PLAN Products OpenCL Security Library Regular expressions / Deep packet inspection/ Compression/Encryption Security Suite: AV / AS / IPS-IDS solutions Customers - OEMs, Enterprise Revenue generation OEMs pay one time fees and royalties for the OpenCL encryption library Enterprise clients pay license fees for use of the GPGPU/Fusion security SW Target hardware GPGPU based secure server Opteron/GPGPU Multiple APU Volume encryption server (similar to the SeaMicro approach) Ontario/Llano 26 APU/GPGPU-Based Security Solutions June 2011
27 Disclaimer & Attribution The information presented in this document is for informational purposes only and may contain technical inaccuracies, omissions and typographical errors. The information contained herein is subject to change and may be rendered inaccurate for many reasons, including but not limited to product and roadmap changes, component and motherboard version changes, new model and/or product releases, product differences between differing manufacturers, software changes, BIOS flashes, firmware upgrades, or the like. There is no obligation to update or otherwise correct or revise this information. However, we reserve the right to revise this information and to make changes from time to time to the content hereof without obligation to notify any person of such revisions or changes. NO REPRESENTATIONS OR WARRANTIES ARE MADE WITH RESPECT TO THE CONTENTS HEREOF AND NO RESPONSIBILITY IS ASSUMED FOR ANY INACCURACIES, ERRORS OR OMISSIONS THAT MAY APPEAR IN THIS INFORMATION. ALL IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE ARE EXPRESSLY DISCLAIMED. IN NO EVENT WILL ANY LIABILITY TO ANY PERSON BE INCURRED FOR ANY DIRECT, INDIRECT, SPECIAL OR OTHER CONSEQUENTIAL DAMAGES ARISING FROM THE USE OF ANY INFORMATION CONTAINED HEREIN, EVEN IF EXPRESSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. AMD, the AMD arrow logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc. All other names used in this presentation are for informational purposes only and may be trademarks of their respective owners. The contents of this presentation were provided by individual(s) and/or company listed on the title page. The information and opinions presented in this presentation may not represent AMD s positions, strategies or opinions. Unless explicitly stated, AMD is not responsible for the content herein and no endorsements are implied. 27 APU/GPGPU-Based Security Solutions June 2011
Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms
Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network
A Vision for Tomorrow s Hosting Data Center
A Vision for Tomorrow s Hosting Data Center JOHN WILLIAMS CORPORATE VICE PRESIDENT, SERVER MARKETING MARCH 2013 THE EVOLVING HOSTING MARKET NEW OPPORTUNITIES: HOSTING IN THE CLOUD Hosted Server shipments
Definition of a White Box. Benefits of White Boxes
Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies [email protected] Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview
ATI Radeon 4800 series Graphics. Michael Doggett Graphics Architecture Group Graphics Product Group
ATI Radeon 4800 series Graphics Michael Doggett Graphics Architecture Group Graphics Product Group Graphics Processing Units ATI Radeon HD 4870 AMD Stream Computing Next Generation GPUs 2 Radeon 4800 series
GPU ACCELERATED DATABASES Database Driven OpenCL Programming. Tim Child 3DMashUp CEO
GPU ACCELERATED DATABASES Database Driven OpenCL Programming Tim Child 3DMashUp CEO SPEAKERS BIO Tim Child 35 years experience of software development Formerly VP Engineering, Oracle Corporation VP Engineering,
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
AMD Product and Technology Roadmaps
AMD Product and Technology Roadmaps AMD 2013 DESKTOP OEM GRAPHICS ROADMAP 2012: AMD RADEON 7000/6000 SERIES 2013: AMD RADEON HD 8000 SERIES Enthusiast AMD Radeon 7900 Series GPU AMD Radeon 8990 Series
Radeon GPU Architecture and the Radeon 4800 series. Michael Doggett Graphics Architecture Group June 27, 2008
Radeon GPU Architecture and the series Michael Doggett Graphics Architecture Group June 27, 2008 Graphics Processing Units Introduction GPU research 2 GPU Evolution GPU started as a triangle rasterizer
Data Center and Cloud Computing Market Landscape and Challenges
Data Center and Cloud Computing Market Landscape and Challenges Manoj Roge, Director Wired & Data Center Solutions Xilinx Inc. #OpenPOWERSummit 1 Outline Data Center Trends Technology Challenges Solution
Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02
Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9
White Paper. ZyWALL USG Trade-In Program
White Paper ZyWALL USG Trade-In Program Table of Contents Introduction... 1 The importance of comprehensive security appliances in today s world... 1 The advantages of the new generation of zyxel usg...
HETEROGENEOUS SYSTEM COHERENCE FOR INTEGRATED CPU-GPU SYSTEMS
HETEROGENEOUS SYSTEM COHERENCE FOR INTEGRATED CPU-GPU SYSTEMS JASON POWER*, ARKAPRAVA BASU*, JUNLI GU, SOORAJ PUTHOOR, BRADFORD M BECKMANN, MARK D HILL*, STEVEN K REINHARDT, DAVID A WOOD* *University of
Developing High-Performance, Flexible SDN & NFV Solutions with Intel Open Network Platform Server Reference Architecture
White Paper Developing Solutions with Intel ONP Server Reference Architecture Developing High-Performance, Flexible SDN & NFV Solutions with Intel Open Network Platform Server Reference Architecture Developing
Embedded Systems: map to FPGA, GPU, CPU?
Embedded Systems: map to FPGA, GPU, CPU? Jos van Eijndhoven [email protected] Bits&Chips Embedded systems Nov 7, 2013 # of transistors Moore s law versus Amdahl s law Computational Capacity Hardware
FLOATING-POINT ARITHMETIC IN AMD PROCESSORS MICHAEL SCHULTE AMD RESEARCH JUNE 2015
FLOATING-POINT ARITHMETIC IN AMD PROCESSORS MICHAEL SCHULTE AMD RESEARCH JUNE 2015 AGENDA The Kaveri Accelerated Processing Unit (APU) The Graphics Core Next Architecture and its Floating-Point Arithmetic
Getting More Performance and Efficiency in the Application Delivery Network
SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Emerging Trends in the Network Security Market in India, CY 2013
Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive
Load Balancing Security Gateways WHITE PAPER
Load Balancing Security Gateways WHITE PAPER Table of Contents Acceleration and Optimization... 4 High Performance DDoS Protection... 4 Web Application Firewall... 5 DNS Application Firewall... 5 SSL Insight...
Oracle SDN Performance Acceleration with Software-Defined Networking
Oracle SDN Performance Acceleration with Software-Defined Networking Oracle SDN, which delivers software-defined networking, boosts application performance and management flexibility by dynamically connecting
COMPUTING. Centellis Virtualization Platform An open hardware and software platform for implementing virtualized applications
COMPUTING Data Sheet Centellis VP provides the hardware and software platform to deploy carrier grade virtualized applications. Application virtualization software framework based on industry standard
Bivio 7000 Series Network Appliance Platforms
W H I T E P A P E R Bivio 7000 Series Network Appliance Platforms Uncompromising performance. Unmatched flexibility. Uncompromising performance. Unmatched flexibility. The Bivio 7000 Series Programmable
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Foundation for High-Performance, Open and Flexible Software and Services in the Carrier Network. Sandeep Shah Director, Systems Architecture EZchip
Foundation for High-Performance, Open and Flexible Software and Services in the Carrier Network Sandeep Shah Director, Systems Architecture EZchip Linley Carrier Conference June 10, 2015 1 EZchip Overview
OMAP platform security features
SWPT008 - July 2003 White Paper OMAP platform security features By Harini Sundaresan Applications Engineer, OMAP Security Texas Instruments, Wireless Terminal Business Unit This white paper introduces
Different NFV/SDN Solutions for Telecoms and Enterprise Cloud
Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*
Unified Threat Management Throughput Performance
Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core
Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE
Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to
How to Build a Massively Scalable Next-Generation Firewall
How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies
Advanced Core Operating System (ACOS): Experience the Performance
WHITE PAPER Advanced Core Operating System (ACOS): Experience the Performance Table of Contents Trends Affecting Application Networking...3 The Era of Multicore...3 Multicore System Design Challenges...3
PHYSICAL CORES V. ENHANCED THREADING SOFTWARE: PERFORMANCE EVALUATION WHITEPAPER
PHYSICAL CORES V. ENHANCED THREADING SOFTWARE: PERFORMANCE EVALUATION WHITEPAPER Preface Today s world is ripe with computing technology. Computing technology is all around us and it s often difficult
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.
Eudemon 1000E-X Series Firewall Huawei Technologies Co., Ltd. Product Overview With the dramatic increase in threats to networks, users are become ever more concerned by application- and service-based
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
White Paper EMBEDDED GPUS ARE NO GAMBLE
White Paper EMBEDDED GPUS ARE NO GAMBLE Designing electronic slot machine systems with optimal performance, power consumption and reliability it all starts with the processing platform TABLE OF CONTENTS
Huawei AR G3 FAQ TOP14
Huawei AR G3 FAQ TOP14 Question 1: "AR G3" Is the Name of the Huawei AR G3 Series Routers of Huawei Technologies Co., Ltd. What Does "AR G3" Represent? "AR G3" is short for "the Third-Generation Access
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know
The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,
Freescale Network Security Solutions freescale.com/networking
IP Services Freescale Network Security Solutions freescale.com/networking Freescale Network Security Solutions Overview Today s business networks are under attack and being invaded by hackers and competitors
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
GPU System Architecture. Alan Gray EPCC The University of Edinburgh
GPU System Architecture EPCC The University of Edinburgh Outline Why do we want/need accelerators such as GPUs? GPU-CPU comparison Architectural reasons for GPU performance advantages GPU accelerated systems
Intel Virtualization Technology (VT) in Converged Application Platforms
Intel Virtualization Technology (VT) in Converged Application Platforms Enabling Improved Utilization, Change Management, and Cost Reduction through Hardware Assisted Virtualization White Paper January
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Wherever there is a conflict, the Addenda to the RFP document and the RFP document (in that order) override the explanations that are provided here.
Procurement of Services to Design, Develop, Implement and Maintain Centralized e-governance Application for Urban Local Bodies in Tamil Nadu Explanatory Notes 2 / Dated 17-December--2013 Explanatory Notes
BroadSAFE Enhanced IP Phone Networks
White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls
Security Guide. BES12 Cloud
Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud
Hardware RAID vs. Software RAID: Which Implementation is Best for my Application?
STORAGE SOLUTIONS WHITE PAPER Hardware vs. Software : Which Implementation is Best for my Application? Contents Introduction...1 What is?...1 Software...1 Software Implementations...1 Hardware...2 Hardware
An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky
Stingray Traffic Manager Sizing Guide
STINGRAY TRAFFIC MANAGER SIZING GUIDE 1 Stingray Traffic Manager Sizing Guide Stingray Traffic Manager version 8.0, December 2011. For internal and partner use. Introduction The performance of Stingray
White Paper A10 Thunder and AX Series Load Balancing Security Gateways
White Paper A10 Thunder and AX Series Load Balancing Security Gateways June 2013 WP_LB FW 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks or about its
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Optimizing GPU-based application performance for the HP for the HP ProLiant SL390s G7 server
Optimizing GPU-based application performance for the HP for the HP ProLiant SL390s G7 server Technology brief Introduction... 2 GPU-based computing... 2 ProLiant SL390s GPU-enabled architecture... 2 Optimizing
Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure
Oracle s Secure HetNet Backhaul Solution A Solution Based on Oracle s Network Session Delivery and Control Infrastructure HetNets are a gradual evolution of cellular topology, not a distinct network unto
Securing the Small Business Network. Keeping up with the changing threat landscape
Securing the Small Business Network Keeping up with the changing threat landscape Table of Contents Securing the Small Business Network 1 UTM: Keeping up with the Changing 2 Threat Landscape RFDPI: Not
"JAGUAR AMD s Next Generation Low Power x86 Core. Jeff Rupley, AMD Fellow Chief Architect / Jaguar Core August 28, 2012
"JAGUAR AMD s Next Generation Low Power x86 Core Jeff Rupley, AMD Fellow Chief Architect / Jaguar Core August 28, 2012 TWO X86 CORES TUNED FOR TARGET MARKETS Mainstream Client and Server Markets Bulldozer
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
The Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
Achieving Low-Latency Security
Achieving Low-Latency Security In Today's Competitive, Regulatory and High-Speed Transaction Environment Darren Turnbull, VP Strategic Solutions - Fortinet Agenda 1 2 3 Firewall Architecture Typical Requirements
Astaro Gateway Software Applications
Astaro Overview Astaro Products - Astaro Security Gateway - Astaro Web Gateway - Astaro Mail Gateway - Astaro Command Center - Astaro Report Manager Astaro Gateway Software Applications - Network Security
introducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
SSL VPN Client Installation Guide Version 9
SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Next Generation Operating Systems
Next Generation Operating Systems Zeljko Susnjar, Cisco CTG June 2015 The end of CPU scaling Future computing challenges Power efficiency Performance == parallelism Cisco Confidential 2 Paradox of the
Cisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3
WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113
Providing Secure IT Management & Partnering Solution for Bendigo South East College
Providing Secure IT Management & Partnering Solution for Bendigo South East College Why did Bendigo South East College engage alltasksit & DELL? BSEC is in the midst of school population growth in 2015,
NetScreen-5GT Announcement Frequently Asked Questions (FAQ)
Announcement Frequently Asked Questions (FAQ) Q: What is the? A: The is a high performance network security appliance targeted to small or remote offices in distributed enterprises, including telecommuters,
GPU File System Encryption Kartik Kulkarni and Eugene Linkov
GPU File System Encryption Kartik Kulkarni and Eugene Linkov 5/10/2012 SUMMARY. We implemented a file system that encrypts and decrypts files. The implementation uses the AES algorithm computed through
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Accelerating High-Speed Networking with Intel I/O Acceleration Technology
White Paper Intel I/O Acceleration Technology Accelerating High-Speed Networking with Intel I/O Acceleration Technology The emergence of multi-gigabit Ethernet allows data centers to adapt to the increasing
Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios
An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice
The Advantages of a Firewall Over an Interafer
FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection
NetScaler VPX FAQ. Table of Contents
NetScaler VPX FAQ Table of Contents Feature and Functionality Frequently Asked Questions... 2 Pricing and Packaging Frequently Asked Questions... 4 NetScaler VPX Express Frequently Asked Questions... 5
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA
E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA RFP FOR SELECTION OF SYSTEM INTEGRATOR CORRIGENDUM RELEASED BY: Goa Police Government
UEFI on Dell BizClient Platforms
UEFI on Dell BizClient Platforms Authors: Anand Joshi Kurt Gillespie This document is for informational purposes only and may contain typographical errors and technical inaccuracies. The content is provided
MS Exchange Server Acceleration
White Paper MS Exchange Server Acceleration Using virtualization to dramatically maximize user experience for Microsoft Exchange Server Allon Cohen, PhD Scott Harlin OCZ Storage Solutions, Inc. A Toshiba
1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
Cisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
An Oracle White Paper January 2011. Using Oracle's StorageTek Search Accelerator
An Oracle White Paper January 2011 Using Oracle's StorageTek Search Accelerator Executive Summary...2 Introduction...2 The Problem with Searching Large Data Sets...3 The StorageTek Search Accelerator Solution...3
Understanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
SonicWALL Corporate Design System. The SonicWALL Brand Identity
SonicWALL Corporate Design System The SonicWALL Brand Identity 1 SonicWALL Corporate Vision Vision Dynamic Security for the Global Network Our vision is simple: we believe security solutions should be
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security
Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security White Paper September 2003 Abstract The network security landscape has changed dramatically over the past several years. Until
Accelerating UTM with Specialized Hardware WHITE PAPER
Accelerating UTM with Specialized Hardware WHITE PAPER FORTINET Accelerating UTM with Specialized Hardware PAGE 2 Summary Tighter security requirements and ever-faster enterprise networks are placing extraordinary
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications
Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion
FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0
FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0 June 10, 2014 01-500-96996-20140610
