Saturday, September 25, 2010

UTM Revolution - Who can not have both fish and bear's paw?



As the market and technology developments, many users find that their purchases of UTM products very much like a Swiss army knife - only useful when using a single function. All modules use fully, UTM devices will greatly decrease the performance, availability poor. Certain brands of UTM products, nominal performance is only open when the single function of the test data. Once the full-function, performance may decline more than half. Therefore, the manufacturers engineers in the implementation of the recommendations in good faith when users first open only to a certain function, other functions later to gradually open the frequent scene. At the same time, users are also not worried about performance not to use the full functionality to open, resulting in name only as a function UTM security products to buy, but only as a single functional product.

This occurs because, for the first generation appeared in the market, UTM products, integrated firewall, VPN, anti-virus, intrusion prevention, protection and other functions or terminals in the equipment to do is really just a simple superposition Once when opening multi-functional, various functional modules of the computing resources to snatch the overall performance directly led to a sharp decline. Although many companies have taken such as improving the hardware configuration, even with some features of ASIC hardware acceleration means, but the effect is not significant.

On the other hand, UTM market, the user after years of baptism, the requirements for UTM has become increasingly rational. At present, many mature users, vendors no longer accept all the performance parameters. But according to their network needs, set up a test environment, then use the standard test instrument to measure various products. The most common case is, ignoring the vendor product nominal number of connections, such as data throughput, but the test products in the environment at least Firewall + Intrusion Detection + anti-virus pages open at a time when handling HTTP, FTP throughput, etc. data as a selection basis. This test, more in line with the user's practical situation, coupled with Avalanche, IXIA test equipment and other standards to bring the relative fair, and the results more reliable.

Facing the new market environment, Lenovo network imperial continuous improvement in technology, in order to seek introduction of performance to meet user demand for a new generation of UTM products to use. Particularly with the integration of technology + engine + PSE pre-Optimal Matching technology to solve next-generation UTM product very good comprehensive performance problems.

Fusion engine, that is within UTM products, no longer exists independent of the firewall, intrusion prevention, anti-virus detection engine, but is a complete integrated test engine replaced by UTM. In fact, firewall, intrusion protection, virus protection and other major gateway protection technology, is a big overlap. By integration of the engine rather than multi-engine work independently or in series, can effectively reduce the wasteful duplication of testing brought the performance. Inevitably bring about the integration of the engine characteristics of database integration, and the resulting performance in fact is considerable. Of course, firms can adopt a prerequisite for fusion engine is vendor for firewall, intrusion prevention, anti-virus, VPN, and other additional features have sufficient technical inputs and accumulation of feature library can be purchased, but the engine must self-development, or have Source-level partners. Only on this basis, the chance of achieving complete integration of the engine.

Integration of the engine using the premise, UTM products can also be pre-screening technologies and optimization through the PSE matching techniques for further performance leap.

Integration engine technology principle as shown above. Data into the device, in addition to abnormal traffic flow protocol anomaly detection module outside. Traffic are the main engine to pre-PSE. PSE engine to a very high pre-separation of the innocent and suspicious traffic flow, and then by the characteristics of suspicious traffic matching engine optimization for further processing.

PSE a kind of pre-existing characteristics of technologies for data abstraction library to form a volume much smaller than the original features of the PSE database, then use the PSE library of pre-screening to speed up network processing technology. PSE through the abstract use of pre-treatment technology PSE Library, the detection time required for 10% less than conventional. When suspicious network traffic only to the 20% (which in practice is already high), pre-treatment with PSE performance can be as high as 70%.

Upon completion of the pre-PSE, the suspicious flow characteristics and then further optimized to match the engine for processing. This optimization principle of matching the technology is constantly under the processed data packets state set, when the state bits are placed in a predetermined value, then trigger the appropriate treatment.

Can be compared in the past the police vehicle on the highway to check every car on the release of a complete investigation. The culprits will be guns scattered the parts and bring in a number of vehicles. When the police see a particular component, can not be certain, do not immediately detained vehicles to avoid traffic congestion, but only made a record in mind. Until the check to the back of a car's parts, with the mind than the records and found that these components can be combined into a gun in the best car to be detained. Although the front has been spared some of the parts, but due to parts missing, the ultimate combination of guns can not cause damage.

Lenovo net Royal integration engine + PSE using technology and optimizing the pre-matching techniques of a new generation of UTM products can already do intrusion prevention + firewall + anti-virus functionality is fully open and contrast the performance of individual performance, down 10% to 20 % of the level of the user's network can be useful in the process, the real turn on all of the features to provide users with comprehensive protection really.







Recommended links:



"Nobunaga's Ambition 12 Innovation" 82 Hokkaido start a battlefield report



Huang Ching-agents Accused Of Switching CPU Is Not Placed On File



Text links 3



VB.NET Enumeration Efficiency With New



Bearing Co., Ltd. Yantai Ximeng Xi



Picked GAMES Kids



"Chino CONFLICT" Comment



Evaluation Investment Tools



BENQ projector and Joybee Brilliance



Recommend Development



DV To AVI



MPEG to MOV



IDC how to charge only reasonable



YUV to AVI



Java And JavaScript Report



Monday, September 13, 2010

Gtalk and Skype will interact


When the end of last year, Google with 10 million to acquire 5% stake in AOL, in alliance with AOL at the same time, AIM has established interoperability with Gtalk. Although we can now use some unofficial ways to achieve Gtalk and AIM and other IM interoperability, but to wait for the official Google still some time to achieve.鍚屾牱鍦帮紝杩戞棩Google鍙堟嬁涓嬩簡eBay锛屼綔涓哄悎浣滅殑鍐呭涔嬩竴锛孏talk鍜孲kype灏嗕細鍏卞悓琚簲鐢ㄥ埌鐐瑰嚮閫氳瘽鐨勫箍鍛婇噷銆?Therefore, we suspect Gtalk and Skype will interact.鐜板湪锛孏talk瀹樻柟blog纭浜嗚繖涓?秷鎭?

Gtalk's product marketing manager Lewis Lin said, Google Gtalk and Skype will be started studying ways to achieve official interoperability, to allow both users to more easily communicate, including voice calls. Skype has more than 100 million worldwide users in China alone more than 13 million users. Although the number of the Gtalk users worldwide is unknown, but there were some statistics that the U.S. base camp, Gtalk number of active online users only 44,000. So if we can achieve interoperability with Skype, Gtalk and I believe that the promotion has a great advantage.

Benefit, of course, our customers, because I myself is Skype and Gtalk users. To achieve such interoperability, we do not have the same time open up the two IM.







相关链接:



ESRI experts, non-Chan: Snow Emergency GIS can do more



J2ME Game NORMAL-FRAME



Corporate governance reasons to cure what



free mkv CONVERTER



Games Board Report



Fax Tools comparison



Deutsche Post's revelation



C + + Classes And C # Class (2)



ILM concept of COMPETING



"Change" And "no Change" In The Contest



Blackberry format



Flv To 3gp Converter



vob to flv



The nature of CHAIN