Product Search:
Interphase Products

Interphase Security Solutions

The major security applications for the converged communication network include:

  • Intrusion detection & prevention (IDP)
  • Direct Denial of Service (DDoS) prevention
  • Anti-virus / Spam / Phishing
  • Regulatory compliance & leak prevention
  • Lawful Intercept

As the converged communications market carries increasingly more real-time data traffic at higher and higher bandwidth, it’s more important than ever for high-demand, high-performance applications to gracefully carry the extra real-time work load created by both the increased traffic and effective security functionality. IP security protocols are required in multiple devices – packet data gateways, security gateways for I-WLAN, Femtocell gateways, network interconnect gateways, and enterprise remote access and site-to-site gateways. Basic network-level security protocols offer “packet by packet” protection for which there are mature industry standards from the IETF, known as IPsec and IKE, that authenticate, protect, and assure packet integrity.

 

Interphase Security Processors

Webinar - Enabling Effective IPsec Security for High-Demand Gateway Applications

The Hardware Story

The Software Story

 

Interphase Security Processors

 

Interphase offers Cavium Networks OCTEON™ multicore processor-based packet accelerator cards that ideal for security processing in a variety of form factors:

 

 

 

Webinar - Enabling Effective IPsec Security for High-Demand Gateway Applications

 

Interphase and SafeNet jointly presented a live webinar in which recognized industry experts from Interphase and SafeNet discussed how to exploit essential hardware and software components for real-time security for AdvancedTCA-based high-demand applications. The webinar examined the state of security-related technology for dealing with IP security problems and presented solutions to gracefully and effectively handle these threats and the extra real-time work load that requires.

 

Download the complete webinar presentation now to gain insights from both the hardware and software sides of the security equation, with information geared to help you move forward in planning for effective security in your next project that requires unified threat management, whether for enterprise or carrier networks, rack-mounted server, or ATCA form factor.

 Download IPsec Webinar Presentation

 

 

The Hardware Story

 

Packet processing hardware has evolved over time to handle higher throughput, as evidenced in Moore’s Law. In addition, as general-purpose hardware improved, specific-purpose innovations were able to occur for even further improvement in specific capabilities. This trend is particularly helpful for security applications.

 

For example, packet processing silicon has evolved from ASICs and FPGA to network processor silicon especially suited for ATM-based packet networks, to the general-purpose multicore processors, and more recently to the current multicore processor solutions with hardware acceleration assists that are ideal for offloading some of the security processing. The introduction of industry-standard cores and operating systems for them helps even more by making it easier to program for multicore processing with security processing offloading.

 

As the need for speed grows, the hardware will continue to evolve in both processing and board interface speeds. Unified Threat Management (UTM) platforms are now emerging which integrate many of the applications noted above into a single solution. Multicore Packet Processors allow the UTM platform to configure the number of cores allocated to each security application providing solutions which can be efficiently scaled.

 

 

The Software Story

 

Security application software has gone through a similar evolution, from proprietary programs especially written for proprietary hardware to the current solution set that includes a variety of open source Linux-based security software solutions and security solution software from other companies that is just right for when even higher performance security is required.

 

These Interphase partners offer software that has been pre-integrated with Interphase OCTEON™ based solutions use the OCTEON on chip security accelerator:

 

  • SafeNet – The QuickSec™ 5.0 toolkit has been integrated with the Interphase iSPAN™ 36CA AdvancedMC™ and iSPAN™ 55CA PCI-X Cavium Networks OCTEON™ multicore processor-based packet processor cards. This integration easily saturates a 4GB IPsec network link with millions of tunnels implemented to address the need for the highest security performance in both AdvancedTCA® architecture network elements and rack mount servers.
  •  

  • 6WIND –The 6WINDGate™ toolkit has been integrated with the Interphase iSPAN™ 36CA AdvancedMC™ packet processor card. 6WINDGate provides a complete, comprehensive and ready to use set of L2/L3 networking features specifically designed for performance with efficient Fast Path implementation.

 

 

Next Steps

 

Contact Interphase now to discuss Security solutions for your equipment design whether you are considering “custom off-the-shelf,” new custom design, software or system integration, or a complete turnkey solution. Interphase - your best solution partner for Security success.    Contact Us.