Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/23/2012
04:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Emulex OneConnect Network Xceleration Solution Provides Increased Performance With New Release Of Suricata

FastStack Sniffer 10G provides greater vulnerability protection with lower packet drop rates

LAS VEGAS, July 23, 2012 -- /PRNewswire/ -- Black Hat USA 2012 -- Emulex Corporation (NYSE: ELX) and Myricom today announced that Emulex's new OneConnect® 10Gb Ethernet (10GbE) Network Xceleration™ solution with FastStack Sniffer10G™ application acceleration software powered by Myricom is fully compatible with the latest release of the Open Information Security Foundation (OISF) open source Suricata engine (Suricata 1.3). This technology combination delivers higher rules processing performance, decreases packet drop rates and greatly improves server utilization for Intrusion Detection (IDS)/Intrusion Prevention (IPS) deployments based on the Suricata engine.

Click here for more of Dark Reading's Black Hat articles.

"Intrusion detection and prevention at 10GbE rates is becoming increasingly important to large enterprises today because the risk of malicious attacks by industry predators is on the upswing and protecting the availability of data continues to be a business critical requirement," said Shaun Walsh, senior vice president of marketing and business development, Emulex. "Emulex's OneConnect Network Xceleration solution with FastStack Sniffer10G is the only standard 10GbE Network Interface Card (NIC) that can offer multiple buffer support for Suricata. This leads to a gain of up to two times the rules processing performance over standard NICs,1 resulting in increased system security."

In addition to improved rules processing, FastStack Sniffer 10G provides greater vulnerability protection with lower packet drop rates and improved server utilization with the ability to aggregate more 10GbE capture feeds per system.

"The integration of FastStack Sniffer10G packet capture/injection technology with Suricata enables customers to achieve higher performance, cost-effective IDS/IPS solutions for their security applications," said Dr. Nan Boden, chief executive officer, Myricom. "FastStack Sniffer10G is a clear example of Myricom's expertise in vertical market applications and our ability to deliver networking solutions that meet critical market requirements."

The Emulex family of OneConnect (OC)e12000 10GbE Network Xceleration solutions combined with FastStack Sniffer10G software provides a powerful, cost-effective solution for network traffic capture, injection and analysis for performance-sensitive and mission-critical markets, such as network surveillance, monitoring and analysis, deep packet inspection (DPI), and distributed denial-of-service (DDoS) defense appliances.

FastStack Sniffer10G includes the following features:

100 Percent Lossless Packet Capture: FastStack Sniffer10G provides 100 percent lossless packet capture and packet injection for all Ethernet packet sizes within a 10GbE data stream. This line-rate performance enables more thorough inspection and better detection of threats for cyber security environments. Improved Multi-Core Utilization: FastStack Sniffer10G can distribute incoming packets over multiple CPU cores to not only improve CPU utilization, but also improve application performance through partitioning, parallelism, and process sharing. Increased Bandwidth: Port aggregation allows network traffic from two or more ports from the same or different OCe12000 adapters.

Emulex and Myricom are also now OISF Consortium members. The OISF is a non-profit foundation that has formed a multi-national group of the leading software developers in the security industry and a consortium consisting of many leading cyber security companies that engages the open-source security community to identify current and future IDS/IPS customer needs.

"As OISF Consortium members, Emulex and Myricom help us meet customer system integration needs and position us to provide cost-effective full life-cycle support for OISF open source solutions," said Matt Jonkman, President of the OISF. "The integration of FastStack Sniffer10G and Suricata demonstrates that strong partnerships between government, industry, and the open source community are drivers for the best overall network security solutions."

Emulex and Myricom will be demonstrating the rules processing performance benefits of FastStack Sniffer10G's multiple buffer support for Suricata applications using OISF-provided data and test rule sets to mimic a realistic IDS/IPS deployment this week at Black Hat USA 2012 in Las Vegas, Nev. at booth #141.

Read more here: http://www.sacbee.com/2012/07/23/4651488/emulex-oneconnect-network-xceleration.html#storylink=cpy

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2021-20622
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2020-5626
PUBLISHED: 2021-01-28
Logstorage version 8.0.0 and earlier, and ELC Analytics version 3.0.0 and earlier allow remote attackers to execute arbitrary OS commands via a specially crafted log file.
CVE-2021-3142
PUBLISHED: 2021-01-28
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-35128. Reason: This candidate is a reservation duplicate of CVE-2020-35128. Notes: All CVE users should reference CVE-2020-35128 instead of this candidate. All references and descriptions in this candidate have been removed to preve...