The major security applications for the converged communication network include:
As the converged communications market carries increasingly more real-time data traffic at higher and higher bandwidth, it’s more important than ever for high-demand, high-performance applications to gracefully carry the extra real-time work load created by both the increased traffic and effective security functionality. IP security protocols are required in multiple devices – packet data gateways, security gateways for I-WLAN, Femtocell gateways, network interconnect gateways, and enterprise remote access and site-to-site gateways. Basic network-level security protocols offer “packet by packet” protection for which there are mature industry standards from the IETF, known as IPsec and IKE, that authenticate, protect, and assure packet integrity.
Interphase offers Cavium Networks OCTEON™ multicore processor-based packet accelerator cards that ideal for security processing in a variety of form factors:
Interphase and SafeNet jointly presented a live webinar in which recognized industry experts from Interphase and SafeNet discussed how to exploit essential hardware and software components for real-time security for AdvancedTCA-based high-demand applications. The webinar examined the state of security-related technology for dealing with IP security problems and presented solutions to gracefully and effectively handle these threats and the extra real-time work load that requires.
Download the complete webinar presentation now to gain insights from both the hardware and software sides of the security equation, with information geared to help you move forward in planning for effective security in your next project that requires unified threat management, whether for enterprise or carrier networks, rack-mounted server, or ATCA form factor.
Packet processing hardware has evolved over time to handle higher throughput, as evidenced in Moore’s Law. In addition, as general-purpose hardware improved, specific-purpose innovations were able to occur for even further improvement in specific capabilities. This trend is particularly helpful for security applications.
For example, packet processing silicon has evolved from ASICs and FPGA to network processor silicon especially suited for ATM-based packet networks, to the general-purpose multicore processors, and more recently to the current multicore processor solutions with hardware acceleration assists that are ideal for offloading some of the security processing. The introduction of industry-standard cores and operating systems for them helps even more by making it easier to program for multicore processing with security processing offloading.
As the need for speed grows, the hardware will continue to evolve in both processing and board interface speeds. Unified Threat Management (UTM) platforms are now emerging which integrate many of the applications noted above into a single solution. Multicore Packet Processors allow the UTM platform to configure the number of cores allocated to each security application providing solutions which can be efficiently scaled.
Security application software has gone through a similar evolution, from proprietary programs especially written for proprietary hardware to the current solution set that includes a variety of open source Linux-based security software solutions and security solution software from other companies that is just right for when even higher performance security is required.
These Interphase partners offer software that has been pre-integrated with Interphase OCTEON™ based solutions use the OCTEON on chip security accelerator:
Contact Interphase now to discuss Security solutions for your equipment design whether you are considering “custom off-the-shelf,” new custom design, software or system integration, or a complete turnkey solution. Interphase - your best solution partner for Security success. Contact Us.