DATA CENTER IPS COMPARATIVE ANALYSIS

Size: px
Start display at page:

Download "DATA CENTER IPS COMPARATIVE ANALYSIS"

Transcription

1 DATA CENTER IPS COMPARATIVE ANALYSIS Performance 2014 Jason Pappalexis, Thomas Skybakmoen Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire

2 Overview Implementation of intrusion prevention systems (IPS) can be a complex process with multiple factors affecting the overall performance of the solution. Each of these factors should be considered over the course of the useful life of the solution, including: 1. Where will it be deployed? 2. What is the predominant traffic mix? 3. What security policy is applied? There is usually a trade- off between security effectiveness and performance; a product s security effectiveness should be evaluated within the context of its performance (and vice versa). This ensures that new security protections do not adversely impact performance and security shortcuts are not taken to maintain or improve performance. Sizing considerations are absolutely critical, since vendor performance claims can vary significantly from actual throughput with protection enabled. NSS Labs rates throughput based on the average of the following test results: "Real- World Protocol Mixes for the data center (financial, virtualization hub, mobile users and applications, web- based applications and services, and Internet Service Provider mix), and 21 KB HTTP response- based capacity tests. 2,500,000( Sourcefire(8290=2( 2,000,000( Maximum'TCP'Connec/ons'per'Second' 1,500,000( 1,000,000( 500,000( McAfee(NS=9300( For$net(For$Gate(5140B( Juniper(SRX(5800( 0( 0( 20,000( 40,000( 60,000( 80,000( 100,000( 120,000( 140,000( 160,000( NSS6Tested'Throughput'(Mbps)' Figure 1 Throughput and Connection Rates Farther to the right indicates higher tested throughput. Higher up indicates higher maximum connections per second. Products with low connections/throughput ratio run the risk of exhausting connection tables before they reach their maximum potential throughput. Furthermore, if bypass mode is enabled, the IPS engine could be allowing uninspected traffic to enter the network once system resources are exhausted, and administrators would never be informed of threats within subsequent sessions NSS Labs, Inc. All rights reserved. 2

3 For0net&For0Gate&5140B& 980,000& 1,195,000& 107,400& 113,500& McAfee&NSC9300& 681,000& 1,045,300& Sourcefire&8290C2& 801,984& 2,086,208& 0& 500,000& 1,000,000& 1,500,000& 2,000,000& 2,500,000& Maximum&TCP&Connec0ons&Per&Second& Maximum&HTTP&Connec0ons&Per&Second& Figure 2 Connection Dynamics Performance is not just about raw throughput. Connection dynamics are also important and will often provide an indication of the effectiveness of the inspection engine. If devices with high throughput capabilities cannot set up and tear down TCP or application- layer connections quickly enough, their maximum throughput figures can rarely be realized in a real- world deployment NSS Labs, Inc. All rights reserved. 3

4 Table of Contents Analysis... 5 Connection Dynamics Concurrency and Connection Rates... 6 HTTP Connections per Second and Capacity... 7 HTTP Connections per Second and Capacity (Throughput)... 8 Application Average Response Time HTTP (at 90% Maximum Capacity) Real- World Traffic Mixes UDP Throughput & Latency Test Methodology Contact Information Table of Figures Figure 1 Throughput and Connection Rates... 2 Figure 2 Connection Dynamics... 3 Figure 3 Vendor- Claimed vs. NSS- Tested Throughput (Mbps)... 5 Figure 4 Concurrency and Connection Rates (I)... 6 Figure 5 Concurrency and Connection Rates (II)... 7 Figure 6 Maximum Throughput per Device with 44 KB Response... 8 Figure 7 Maximum Throughput per Device with 21 KB Response... 8 Figure 8 Maximum Throughput per Device with 10 KB Response... 9 Figure 9 Maximum Throughput per Device with 4.5 KB Response... 9 Figure 10 Maximum Throughput per Device with 1.7 KB Response... 9 Figure 11 Maximum Connection Rates per Device with various Response Sizes Figure 12 Application Latency (milliseconds) per Device with various Response Sizes Figure 13 Real World Protocol Mix (Data center Financial) Figure 14 Real World Protocol Mix (Data center Virtualization Hub) Figure 15 Real World Protocol Mix (Data center Mobile users and applications) Figure 16 Real World Protocol Mix (Data center Web- based applications and services) Figure 17 Real World Protocol Mix (Data Center Internet Service Provider Mix) Figure 18 UDP Throughput by Packet Size (Mbps) Figure 19 UDP Throughput by Packet Size (Mbps) Figure 20 UDP Latency by Packet Size (microseconds) NSS Labs, Inc. All rights reserved. 4

5 Analysis NSS research indicates that all enterprises tune their IPS devices when deployed in the data center. Therefore, during NSS testing of IPS products, the devices are deployed with tuned policies (see Data Center IPS Comparative Analysis Security ). Every effort is made to deploy policies that ensure the optimal combination of security effectiveness and performance, as would be the aim of a typical customer deploying the device in a live network environment. This provides readers with the most useful information on key IPS security effectiveness and performance capabilities based on their expected usage. For0net'For0Gate'5140B' 59,340' 120,000' Juniper'SRX'5800' 31,625' 40,000' McAfee'NSC9300' 40,000' 47,533' Sourcefire'8290C2' 80,000' 136,033' 0' 20,000' 40,000' 60,000' 80,000' 100,000' 120,000' 140,000' 160,000' NSSCTested'Throughput'(Mbps)' VendorCClaimed'Throughput'(Mbps)' Figure 3 Vendor- Claimed vs. NSS- Tested Throughput (Mbps) Figure 3 depicts the difference between the NSS performance rating and the vendor performance claims, which are often under ideal/unrealistic conditions. Where multiple figures are quoted by vendors in marketing materials, NSS selects those that relate to TCP, or with protection enabled, rather than the more optimistic UDP- only or large packet size performance figures often quoted. Even so, NSS- tested throughput typically is lower than that which is claimed by the vendor, often significantly so, since it is more representative of how devices will perform in real- world deployments. Only McAfee and Sourcefire tested higher than vendor claimed performance NSS Labs, Inc. All rights reserved. 5

6 Connection Dynamics Concurrency and Connection Rates These tests stress the detection engine to determine how the sensor copes with increasing rates of TCP connections per second, application layer transactions per second, and concurrent open connections. All packets contain valid payload and address data, and these tests provide an excellent representation of a live network at various connection/transaction rates. Note that in all tests, the following critical breaking points where the final measurements are taken are used: Excessive concurrent TCP connections latency within the IPS is causing unacceptable increase in open connections on the server- side. Excessive response time for HTTP transactions latency within the IPS is causing excessive delays and increased response time to the client. Unsuccessful HTTP transactions normally, there should be zero unsuccessful transactions. Once these appear, it is an indication that excessive latency within the IPS is causing connections to time out. The following are the key connection dynamics results from performance tests. Product Theoretical Maximum Maximum Connections per Second Maximum Concurrent TCP Connections Concurrent TCP Connections w/data TCP HTTP HTTP Transactions per Second Fortinet FortiGate 5140B 120,000, ,000,000 1,195, ,000 2,777,000 Juniper SRX ,000,000 60,000, , , ,000 McAfee NS ,000,000 43,276,208 1,045, , ,340 Sourcefire ,000, ,620,912 2,086, ,984 2,359,665 Figure 4 Concurrency and Connection Rates (I) Beyond overall throughput of the device, connection dynamics can play an important role in sizing a security device that will not unduly impede the performance of a system or an application. Maximum connection and transaction rates help size a device more accurately than simply examining throughput. By having knowledge of the maximum connections per second, it is possible to predict maximum throughput based on the traffic mix in a given enterprise environment. For example, if the device maximum HTTP connections per second (CPS) is 2,000 and average traffic size is 44 KB such that 2,500 CPS = 1 Gbps, then the tested device will achieve a maximum of 800 Mbps (i.e., (2,000/2,500) x 1,000 Mbps = 800 Mbps). Maximum concurrent TCP connections and maximum TCP connections per second rates are also useful metrics when attempting to size a device accurately. Products with low connection/throughput ratio run the risk of exhausting connections before they reach their maximum potential throughput. By determining the maximum connections per second, it is possible to predict when a device will fail in a given enterprise environment NSS Labs, Inc. All rights reserved. 6

7 ( Maximum'TCP'Connec/ons'per'Second' ( ( ( ( For$net(For$Gate(5140B( McAfee(NS=9300( Sourcefire(8290=2( Juniper(SRX(5800( 0( 100,000( 1,000,000( 10,000,000( 100,000,000( 1,000,000,000( Maximum'Concurrent'/'Simultaneous'TCP'Connec/ons' Figure 5 Concurrency and Connection Rates (II) Higher up indicates increased connections per second capacity. Farther to the right indicates increased concurrent/simultaneous connections. Products with low concurrent connection/connection per second ratios run the risk of exhausting connections (sessions) before they reach their maximum potential connection rates. HTTP Connections per Second and Capacity In- line IPS devices exhibit an inverse correlation between security effectiveness and performance. The more deep- packet inspection is performed, the fewer packets can be forwarded. Furthermore, it is important to consider a real- world mix of traffic that a device will encounter. NSS tests aim to stress the HTTP detection engine in order to determine how the sensor copes with detecting and blocking exploits under network loads of varying average packet size and varying connections per second. By creating genuine session- based traffic with varying session lengths, the sensor is forced to track valid TCP sessions, thus ensuring a higher workload than for simple, packet- based background traffic. Each transaction consists of a single HTTP GET request, and there are no transaction delays (i.e., the web server responds immediately to all requests). All packets contain valid payload (a mix of binary and ASCII objects) and address data. This test provides an excellent representation of a live network (albeit one biased towards HTTP traffic) at various network loads NSS Labs, Inc. All rights reserved. 7

8 HTTP Connections per Second and Capacity (Throughput) As previously stated, NSS research has found that there is usually a trade- off between security effectiveness and performance. Because of this, it is important to judge a product s security effectiveness within the context of its performance (and vice versa). This ensures that new security protections do not adversely impact performance and that security shortcuts are not taken to maintain or improve performance. Figure 6 to Figure 10 depict the maximum throughput achieved across a range of different HTTP response sizes that may be encountered in a typical data center. 0$ 20,000$ 40,000$ 60,000$ 80,000$ 100,000$ 120,000$ 140,000$ 160,000$ For.net$For.Gate$5140B$ 80,000$ Juniper$SRX$5800$ 37,360$ McAfee$NSB9300$ 60,000$ Sourcefire$8290B2$ 146,880$ Sourcefire$8290B2$ McAfee$NSB9300$ Juniper$SRX$5800$ For.net$For.Gate$5140B$ 44$KB$Response$ 146,880$ 60,000$ 37,360$ 80,000$ Megabits)per)Second) Figure 6 Maximum Throughput per Device with 44 KB Response 0$ 20,000$ 40,000$ 60,000$ 80,000$ 100,000$ 120,000$ 140,000$ 160,000$ For.net$For.Gate$5140B$ 80,000$ Juniper$SRX$5800$ 18,980$ McAfee$NSB9300$ 60,000$ Sourcefire$8290B2$ 134,200$ Sourcefire$8290B2$ McAfee$NSB9300$ Juniper$SRX$5800$ For.net$For.Gate$5140B$ 21$KB$Response$(Mbps)$ 134,200$ 60,000$ 18,980$ 80,000$ Megabits)per)Second) Figure 7 Maximum Throughput per Device with 21 KB Response 2014 NSS Labs, Inc. All rights reserved. 8

9 0& 10,000& 20,000& 30,000& 40,000& 50,000& 60,000& 70,000& 80,000& For0net&For0Gate&5140B& 55,028& 9,840& McAfee&NSC9300& 41,490& Sourcefire&8290C2& 68,000& 10&KB&Response&(Mbps)& Sourcefire&8290C2& 68,000& McAfee&NSC9300& 41,490& 9,840& For0net&For0Gate&5140B& 55,028& Megabits)per)Second) Figure 8 Maximum Throughput per Device with 10 KB Response 0& 5,000& 10,000& 15,000& 20,000& 25,000& 30,000& 35,000& 40,000& 45,000& For/net&For/Gate&5140B& 36,050& 4,960& McAfee&NSB9300& 38,000& Sourcefire&8290B2& 38,185& 4.5&KB&Response&(Mbps)& Sourcefire&8290B2& 38,185& McAfee&NSB9300& 38,000& 4,960& For/net&For/Gate&5140B& 36,050& Megabits)per)Second) Figure 9 Maximum Throughput per Device with 4.5 KB Response 0% 5,000% 10,000% 15,000% 20,000% 25,000% For-net%For-Gate%5140B% 21,200% Juniper%SRX%5800% 2,800% McAfee%NS@9300% 13,200% Sourcefire%8290@2% 13,455% Sourcefire%8290@2% McAfee%NS@9300% Juniper%SRX%5800% For-net%For-Gate%5140B% 1.7%KB%Response%(Mbps)% 13,455% 13,200% 2,800% 21,200% Megabits)per)Second) Figure 10 Maximum Throughput per Device with 1.7 KB Response 2014 NSS Labs, Inc. All rights reserved. 9

10 Figure 11 depicts the maximum application layer connection rates (HTTP connections per second) achieved with different HTTP response sizes (from 44 KB down to 1.7 KB). Product 44 KB Response 21 KB Response 10 KB Response 4.5 KB Response 1.7 KB Response Fortinet FortiGate 5140B 200, , , , ,000 Juniper SRX ,400 94,900 98,400 99, ,000 McAfee NS , , , , ,000 Sourcefire , , , , ,200 Figure 11 Maximum Connection Rates per Device with various Response Sizes Application Average Response Time HTTP (at 90% Maximum Capacity) Figure 12 depicts the average application response time (application latency, measured in milliseconds) with different packet sizes (from 44 KB down to 1.7 KB) recorded at 90% of the measured maximum capacity (throughput). A lower number is better (denotes improved application response time). Product 44 KB Latency (ms) 21 KB Latency (ms) 10 KB Latency (ms) 4.5 KB Latency (ms) 1.7 KB Response (ms) Fortinet FortiGate 5140B Juniper SRX McAfee NS Sourcefire Figure 12 Application Latency (milliseconds) per Device with various Response Sizes 2014 NSS Labs, Inc. All rights reserved. 10

11 Real- World Traffic Mixes The aim of these tests is to measure the performance of the device under test in a real world environment by introducing additional protocols and real content, while still maintaining a precisely repeatable and consistent background traffic load. In order to simulate real use cases, different protocol mixes are utilized to model different data center deployment scenarios. For details about real world traffic protocol types and percentages, see the Data Center Intrusion Prevention System Methodology, available at For.net%For.Gate%5140B% 75,000% Juniper%SRX%5800% 20,500% McAfee%NSA9300% 58,500% Sourcefire%8290A2% 160,000% 0% 20,000% 40,000% 60,000% 80,000% 100,000% 120,000% 140,000% 160,000% 180,000% Real%World %Protocol%Mix%(Data%center%A%Financial)% Figure 13 Real World Protocol Mix (Data center Financial) For-net&For-Gate&5140B& 66,250& 40,000& McAfee&NS@9300& 58,000& Sourcefire&8290@2& 160,000& 0& 20,000& 40,000& 60,000& 80,000& 100,000& 120,000& 140,000& 160,000& 180,000& Real&World &Protocol&Mix&(Data&center&@&Virtualiza-on&Hub)& Figure 14 Real World Protocol Mix (Data center Virtualization Hub) 2014 NSS Labs, Inc. All rights reserved. 11

12 For/net&For/Gate&5140B& 47,426& 30,500& McAfee&NSB9300& 43,700& Sourcefire&8290B2& 105,000& 0& 20,000& 40,000& 60,000& 80,000& 100,000& 120,000& Real&World &Protocol&Mix&(Data&center&B&Mobile&Applica/ons)& Figure 15 Real World Protocol Mix (Data center Mobile users and applications) For0net&For0Gate&5140B& 28,363& 39,770& McAfee&NSC9300& 45,000& Sourcefire&8290C2& 118,000& 0& 20,000& 40,000& 60,000& 80,000& 100,000& 120,000& 140,000& Real&World &Protocol&Mix&(Data&center&C&Web&Apps)& Figure 16 Real World Protocol Mix (Data center Web- based applications and services) For/net%For/Gate%5140B% 59,000% Juniper%SRX%5800% 40,000% McAfee%NSB9300% 20,000% Sourcefire%8290B2% 139,000% 0% 20,000% 40,000% 60,000% 80,000% 100,000% 120,000% 140,000% 160,000% Real%World %Protocol%Mix%(Data%center%B%ISP)% Figure 17 Real World Protocol Mix (Data Center Internet Service Provider Mix) 2014 NSS Labs, Inc. All rights reserved. 12

13 UDP Throughput & Latency The aim of this test is to determine the raw packet processing capability of each in- line port pair of the device. This traffic does not attempt to simulate any form of real- world network condition. No TCP sessions are created during this test, and there is very little for the detection engine to do in the way of protocol analysis. However, this test is relevant since vendors are forced to perform inspection on UDP packets as a result of current threat vectors. Figure 18 and Figure 19 depict the maximum UDP throughput (in megabits per second) achieved by each device using different packet sizes. 180,000( 160,000( Sourcefire(8290=2( 140,000( Megabits)per)Second) 120,000( 100,000( 80,000( 60,000( For$net(For$Gate(5140B( McAfee(NS=9300( 40,000( 20,000( 0( 64(Byte(( 128(Byte(( 256(Byte(( 512(Byte(( 1024(Byte(( 1514(Byte(( UDP)Packet)Size) Juniper(SRX(5800( Figure 18 UDP Throughput by Packet Size (Mbps) Product 64 Byte 128 Byte Throughput (Mbps) 256 Byte 512 Byte 1024 Byte 1514 Byte Fortinet FortiGate 5140B 15,443 41,000 67,400 63,840 76,900 86,740 Juniper SRX ,753 5,728 8,094 11,052 13,424 14,225 McAfee NS ,700 36,177 60,218 69,500 70,300 75,000 Sourcefire ,273 25,600 43,614 74, , ,000 Figure 19 UDP Throughput by Packet Size (Mbps) 2014 NSS Labs, Inc. All rights reserved. 13

14 In- line security devices that introduce high levels of latency lead to unacceptable response times for users, particularly where multiple security devices are placed in the data path. Figure 20 reflects the latency (in microseconds) as recorded during the UDP throughput tests at 90% of maximum load. Lower values are preferred. Product 64 Byte 128 Byte 256 Byte Latency (μs) 512 Byte 1024 Byte 1514 Byte Fortinet FortiGate 5140B Juniper SRX McAfee NS Sourcefire Figure 20 UDP Latency by Packet Size (microseconds) 2014 NSS Labs, Inc. All rights reserved. 14

15 Test Methodology Methodology Version: Data Center IPS Test Methodology v1.1.1 A copy of the test methodology is available on the NSS Labs website at Contact Information NSS Labs, Inc. 206 Wild Basin Rd Buliding A, Suite 200 Austin, TX (512) info@nsslabs.com This and other related documents available at: To receive a licensed copy or report misuse, please contact NSS Labs at +1 (512) or sales@nsslabs.com NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS Labs without notice. 2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader s sole risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY NSS LABS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners NSS Labs, Inc. All rights reserved. 15

WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS

WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Performance Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet FortiWeb

More information

BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS

BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS Security Thomas Skybakmoen, Jason Pappalexis Tested Products AhnLab MDS Fidelis XPS Direct 1000 FireEye Web MPS 4310 and Email MPS 5300 Fortinet FortiSandbox

More information

TEST METHODOLOGY. SSL/TLS Performance. v1.0

TEST METHODOLOGY. SSL/TLS Performance. v1.0 TEST METHODOLOGY SSL/TLS Performance v1.0 Table of Contents 1 Introduction... 3 1.1 The Need for SSL/TLS Performance Testing... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria... 3 2 SSL/TLS

More information

NEXT GENERATION FIREWALL. Tested Products. Environment. SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen

NEXT GENERATION FIREWALL. Tested Products. Environment. SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen NEXT GENERATION FIREWALL SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen Tested Products NGFW Group Test: SonicWall NSA 6600 SonicOS Enhanced 6.2.5.10-70n Dynamic signature database

More information

NEXT GENERATION FIREWALL COMPARATIVE REPORT

NEXT GENERATION FIREWALL COMPARATIVE REPORT NEXT GENERATION FIREWALL COMPARATIVE REPORT Security Value Map (SVM) Authors Thomas Skybakmoen, Christopher Conrad Tested Products Barracuda Networks F600.E20 v6.1.1-071 Check Point Software Technologies

More information

ENTERPRISE ENDPOINT COMPARATIVE REPORT

ENTERPRISE ENDPOINT COMPARATIVE REPORT ENTERPRISE ENDPOINT COMPARATIVE REPORT SECURITY STACK: EXPLOITS Authors Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3 ESET Endpoint Antivirus v6.1 Fortinet FortiClient

More information

BREACH DETECTION SYSTEM PRODUCT ANALYSIS

BREACH DETECTION SYSTEM PRODUCT ANALYSIS BREACH DETECTION SYSTEM PRODUCT ANALYSIS Sourcefire (Cisco) Advanced Malware Protection 1 v4.5.2 Bhaarath Venkateswaran, Jayendra Pathak, Ahmed Garhy, Ryan Liles 1 Sourcefire is now part of Cisco. Overview

More information

ADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT

ADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT ADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT Total Cost of Ownership () MARCH 10, 2017 Authors Jason Brvenik, Thomas Skybakmoen, Morgan Dhanraj Tested Products Carbon Black Cb Protection v7.2.3.3106

More information

TEST METHODOLOGY. Virtual Firewall. v2.1 MARCH 13, 2017

TEST METHODOLOGY. Virtual Firewall. v2.1 MARCH 13, 2017 TEST METHODOLOGY Virtual Firewall MARCH 13, 2017 v2.1 Table of Contents 1 Introduction... 4 1.1 The Need for Virtual Firewalls... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 2 Product

More information

ADVANCED ENDPOINT PROTECTION TEST REPORT

ADVANCED ENDPOINT PROTECTION TEST REPORT ADVANCED ENDPOINT PROTECTION TEST REPORT SentinelOne Endpoint Protection Platform v1.8.3#31 FEBRUARY 14, 2017 Authors Thomas Skybakmoen, Morgan Dhanraj Overview NSS Labs performed an independent test of

More information

THREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS

THREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS THREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS v1.1.0.3568 2013 Jayendra Pathak, Ken Baylor, Ph.D Overview NSS Labs performed an independent test of the 1.1.0.3568 threat isolation technology. The product

More information

CONSUMER EPP COMPARATIVE ANALYSIS

CONSUMER EPP COMPARATIVE ANALYSIS CONSUMER EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Mohamed Saher, Ahmed Garhy Tested Vendors AVG, F- Secure, Kaspersky, McAfee, Microsoft, Symantec, Trend Micro

More information

TEST METHODOLOGY. Data Center Firewall. v2.2

TEST METHODOLOGY. Data Center Firewall. v2.2 TEST METHODOLOGY Data Center Firewall v2.2 Table of Contents 1 Introduction... 4 1.1 The Need for Firewalls in the Data Center... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 2 Product

More information

Quick Start Guide for Administrators and Operators Cyber Advanced Warning System

Quick Start Guide for Administrators and Operators Cyber Advanced Warning System NSS Labs Quick Start Guide for Administrators and Operators Cyber Advanced Warning System Introduction to the Cyber Advanced Warning System and RiskViewer... 1 Activating Your Account... 2 Adding a New

More information

Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report

Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T First published April 2012 (V1.0) Published by Broadband-Testing A division

More information

TEST METHODOLOGY. Breach Detection Systems (BDS) v5.0 MARCH 5, 2018

TEST METHODOLOGY. Breach Detection Systems (BDS) v5.0 MARCH 5, 2018 TEST METHODOLOGY Breach Detection Systems (BDS) MARCH 5, 2018 v5.0 Table of Contents 1 Introduction... 3 1.1 The Need for Breach Detection... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria...

More information

They Call It Stormy Monday

They Call It Stormy Monday ANALYST BRIEF They Call It Stormy Monday MOVE TO THE CLOUD REQUIRES FULL LIFE CYCLE MANAGEMENT Author Rob Ayoub Overview The revelation on September 17, 2013 that the cloud storage company Nirvanix would

More information

TEST METHODOLOGY. Breach Detection Systems (BDS) v3.0

TEST METHODOLOGY. Breach Detection Systems (BDS) v3.0 TEST METHODOLOGY Breach Detection Systems (BDS) v3.0 Table of Contents 1 Introduction... 4 1.1 The Need for Breach Detection... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 1.4 Deployment...

More information

CONSUMER AV / EPP COMPARATIVE ANALYSIS

CONSUMER AV / EPP COMPARATIVE ANALYSIS CONSUMER AV / EPP COMPARATIVE ANALYSIS Exploits Evasion Defenses 2012 Randy Abrams, Nathan Taylor Tested Vendors Avast, AVG, Avira, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Norton, Panda,

More information

The Forcepoint NGFW should be on every company s short list.

The Forcepoint NGFW should be on every company s short list. Dear Sir/Madam, I m very excited to tell you that for the fifth straight test, Forcepoint Next Generation Firewall (NGFW) achieved NSS Labs Recommended rating - the highest level possible! More NSS Labs

More information

DBAM Systems EP60 Test Executive Summary

DBAM Systems EP60 Test Executive Summary Test Executive Summary A Broadband-Testing Report First published February 2007 (V1.0) Published by Broadband-Testing La Calade, 11700 Moux, Aude, France Tel : +33 (0)4 68 43 99 70 Fax : +33 (0)4 68 43

More information

NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT

NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT Check Point Software Technologies, Ltd. 13800 Next Generation Firewall Appliance vr77.20 Recommended Policy SEPTEMBER 22, 2016 Author Tim

More information

NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT

NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT NEXT GENERATION INTRUSION PREVENTION SYSTEM (NGIPS) TEST REPORT Trend Micro TippingPoint 7500NX v3.8.4.4525 Tuned Policy SEPTEMBER 28, 2016 Author Tim Otto Overview NSS Labs performed an independent test

More information

NETWORK INTRUSION PREVENTION SYSTEMS

NETWORK INTRUSION PREVENTION SYSTEMS NETWORK INTRUSION PREVENTION SYSTEMS INDIVIDUAL PRODUCT TEST RESULTS NSFOCUS Network IPS 1200 METHODOLOGY VERSION: 6.0 MARCH 2010 Licensed to: NSFOCUS Information Technology Co., Ltd. To acquire a licensed

More information

TEST METHODOLOGY. Breach Prevention Systems (BPS) V2.0 MARCH 5, 2018

TEST METHODOLOGY. Breach Prevention Systems (BPS) V2.0 MARCH 5, 2018 TEST METHODOLOGY Breach Prevention Systems (BPS) MARCH 5, 2018 V2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Breach Prevention... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria...

More information

NETWORK INTRUSION PREVENTION SYSTEMS

NETWORK INTRUSION PREVENTION SYSTEMS NETWORK INTRUSION PREVENTION SYSTEMS INDIVIDUAL PRODUCT TEST RESULTS McAfee Network Security Platform M-8000 METHODOLOGY VERSION: 6.0 SEPTEMBER 2010 Licensed to: McAfee To receive a licensed copy or report

More information

BREACH DETECTION SYSTEMS TEST REPORT

BREACH DETECTION SYSTEMS TEST REPORT BREACH DETECTION SYSTEMS TEST REPORT Lastline Enterprise v7.10 Authors Dipti Ghimire, Jessica Williams, Ahmed Garhy Overview NSS Labs performed an independent test of the Lastline Enterprise v7.10. The

More information

NEXT GENERATION FIREWALL PRODUCT ANALYSIS

NEXT GENERATION FIREWALL PRODUCT ANALYSIS NEXT GENERATION FIREWALL PRODUCT ANALYSIS Cisco FirePOWER 8350 v5.3 Authors Ryan Liles, Christopher Conrad Overview NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product

More information

Maturing VARs Offer New Outsourcing Option

Maturing VARs Offer New Outsourcing Option ANALYST BRIEF Maturing VARs Offer New Outsourcing Option VALUE- ADDED RESELLERS SHIFT TO OFFERING MANAGED SECURITY SERVICES Author Rob Ayoub Overview Security equipment vendors have found managed security

More information

Check Point Power

Check Point Power NETWORK INTRUSION PREVENTION SYSTEMS INDIVIDUAL PRODUCT TEST RESULTS Check Point Power-1 11065 DECEMBER 2010 METHODOLOGY VERSION: 6.1 To receive a licensed copy or report misuse, please contact NSS Labs

More information

SOFTWARE-DEFINED WIDE AREA NETWORKING TEST REPORT

SOFTWARE-DEFINED WIDE AREA NETWORKING TEST REPORT SOFTWARE-DEFINED WIDE AREA NETWORKING TEST REPORT Fortinet FortiGate 61E v6.0.1 GA Build 5068 AUGUST 8, 2018 Author Julian Owusu-Abrokwa Overview NSS Labs performed an independent test of the Fortinet

More information

TEST METHODOLOGY. Breach Detection Systems (BDS) v4.0

TEST METHODOLOGY. Breach Detection Systems (BDS) v4.0 TEST METHODOLOGY Breach Detection Systems (BDS) v4.0 Table of Contents 1 Introduction... 3 1.1 The Need for Breach Detection... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria... 4 1.4 Deployment...

More information

TEST METHODOLOGY. Next Generation Intrusion Prevention System (NGIPS) V4.0 FEBRUARY 2, 2018

TEST METHODOLOGY. Next Generation Intrusion Prevention System (NGIPS) V4.0 FEBRUARY 2, 2018 TEST METHODOLOGY Next Generation Intrusion Prevention System (NGIPS) FEBRUARY 2, 2018 V4.0 Table of Contents 1 Introduction... 4 1.1 The Need for Next Generation Intrusion Prevention Systems... 4 1.2 About

More information

NETWORK INTRUSION PREVENTION SYSTEM

NETWORK INTRUSION PREVENTION SYSTEM NETWORK INTRUSION PREVENTION SYSTEM PRODUCT ANALYSIS Sourcefire 3D8120 4.10 METHODOLOGY VERSION: 6.2 Independent & unsponsored test report. This and other related documents available at: http://www.nsslabs.com/research/network-security/network-ips/

More information

Market Analysis. Overview 2013 INTRUSION PREVENTION SYSTEMS. Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis

Market Analysis. Overview 2013 INTRUSION PREVENTION SYSTEMS. Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis Market Analysis 2013 INTRUSION PREVENTION SYSTEMS Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis Overview Prior to 2013, the intrusion prevention system (IPS) market was viewed as heading towards

More information

CAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0

CAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0 CAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0 Version 3.3, 10/6/2017 NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX 78746 US info@nsslabs.com www.nsslabs.com 2017

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Revision C McAfee Network Security Platform (Managing Latency in IPS Networks) Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended settings

More information

HYCU SCOM Management Pack for F5 BIG-IP

HYCU SCOM Management Pack for F5 BIG-IP HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.3 Product release date: March 2018 Document edition: Second Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This document

More information

TEST METHODOLOGY. Breach Prevention Systems (BPS) v1.0

TEST METHODOLOGY. Breach Prevention Systems (BPS) v1.0 TEST METHODOLOGY Breach Prevention Systems (BPS) v1.0 Table of Contents 1 Introduction... 5 1.1 The Need for Breach Prevention... 5 1.2 About This Test Methodology... 5 1.3 Inclusion Criteria... 6 1.4

More information

SUPPORT MATRIX. HYCU OMi Management Pack for Citrix

SUPPORT MATRIX. HYCU OMi Management Pack for Citrix HYCU OMi Management Pack for Citrix : 2.0 Product release date: October 2017 Document release data: April 2018 Legal notices Copyright notice 2014-2018 HYCU. All rights reserved. This document contains

More information

Intel Unite. Intel Unite Firewall Help Guide

Intel Unite. Intel Unite Firewall Help Guide Intel Unite Intel Unite Firewall Help Guide September 2015 Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain

More information

TEST METHODOLOGY. Data Center Network Security (DCNS) V2.0. October 10, 2018

TEST METHODOLOGY. Data Center Network Security (DCNS) V2.0. October 10, 2018 TEST METHODOLOGY Data Center Network Security (DCNS) October 10, 2018 V2.0 Table of Contents 1 Introduction... 5 1.1 Data Center Network Security... 5 1.2 The Need for the Data Center Firewall... 5 1.3

More information

Customer Support: For more information or support, please visit or at Product Release Information...

Customer Support: For more information or support, please visit   or  at Product Release Information... Product Release Information Product: Cyberoam Release Number: 9.3.0 build 5 Release Date: 19th July 2006 Compatible versions: 9.2.0 build 2 Upgrade Mode: Manual 1 Important note Upgrade removes all the

More information

CAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0

CAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0 CAWS CONTINUOUS SECURITY VALIDATION PLATFORM API GUIDE VERSION 3.0 Version 3.0, 7/17/2017 NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX 78746 US info@nsslabs.com www.nsslabs.com 2017

More information

CAWS CYBER THREAT PROTECTION PLATFORM API GUIDE. Version 2.3

CAWS CYBER THREAT PROTECTION PLATFORM API GUIDE. Version 2.3 CAWS CYBER THREAT PROTECTION PLATFORM API GUIDE Version 2.3 Version 2.3, 6/29/2017 NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX 78746 US info@nsslabs.com www.nsslabs.com 2017 NSS

More information

SUPPORT MATRIX. Comtrade OMi Management Pack for Citrix

SUPPORT MATRIX. Comtrade OMi Management Pack for Citrix Comtrade OMi Management Pack for Citrix : 2.0 Product release date: December 2016 Document release date: July 2017 Legal notices Copyright notice 2017 Comtrade Software. All rights reserved. This document

More information

Intrusion Prevention System Performance Metrics

Intrusion Prevention System Performance Metrics White Paper Intrusion Prevention System Performance Metrics The Importance of Accurate Performance Metrics Network or system design success hinges on multiple factors, including the expected performance

More information

TEST METHODOLOGY. Next Generation Intrusion Prevention System (NGIPS) v2.0

TEST METHODOLOGY. Next Generation Intrusion Prevention System (NGIPS) v2.0 TEST METHODOLOGY Next Generation Intrusion Prevention System (NGIPS) v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Next Generation Intrusion Prevention Systems... 4 1.2 About This Test Methodology...

More information

By Jorge Gomez. Citrix Consulting Services. Citrix Systems, Inc.

By Jorge Gomez. Citrix Consulting Services. Citrix Systems, Inc. PeopleSoft 8 Network Bandwidth Consumption By Jorge Gomez Citrix Systems, Inc. Disclaimer The objective of this white paper is to compare consumption of bandwidth between different PeopleSoft 8 deployment

More information

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Avaya Matrix: Release 3.0 Issue 2 April 2016 April 2016 Avaya Matrix: 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,

More information

Release Information. Revision History. Version: build 018 Release Date: 23 rd November 2011

Release Information. Revision History. Version: build 018 Release Date: 23 rd November 2011 Version: 02.00.2 build 018 Release Date: 23 rd November 2011 Release Date Version 02.00.2 Build 018 23 rd November 2011 Release Information Release Type: General Availability Supported Cyberoam Versions:

More information

Wireless Clients and Users Monitoring Overview

Wireless Clients and Users Monitoring Overview Wireless Clients and Users Monitoring Overview Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT

More information

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Issue 1.0 August 24, 2015 August 2015 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 1 ALL INFORMATION IS BELIEVED

More information

Performance Characterization of ONTAP Cloud in Azure with Application Workloads

Performance Characterization of ONTAP Cloud in Azure with Application Workloads Technical Report Performance Characterization of ONTAP Cloud in NetApp Data Fabric Group, NetApp March 2018 TR-4671 Abstract This technical report examines the performance and fit of application workloads

More information

Performance Consistency

Performance Consistency White Paper Performance Consistency SanDIsk Corporation Corporate Headquarters 951 SanDisk Drive, Milpitas, CA 95035, U.S.A. Phone +1.408.801.1000 Fax +1.408.801.8657 www.sandisk.com Performance Consistency

More information

Stealthwatch and Cognitive Analytics Configuration Guide (for Stealthwatch System v6.10.x)

Stealthwatch and Cognitive Analytics Configuration Guide (for Stealthwatch System v6.10.x) Stealthwatch and Cognitive Analytics Configuration Guide (for Stealthwatch System v6.10.x) Copyrights and Trademarks 2018 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION

More information

Validating Service Provisioning

Validating Service Provisioning Validating Service Provisioning Cisco EPN Manager 2.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

Policies & Medical Disclaimer

Policies & Medical Disclaimer Policies & Medical Disclaimer Money Back Guarantee Heather Woodruff Nutrition proudly stands behind its programs. To help you feel comfortable we offer a Money-Back Guarantee* If you are not absolutely

More information

Solace Message Routers and Cisco Ethernet Switches: Unified Infrastructure for Financial Services Middleware

Solace Message Routers and Cisco Ethernet Switches: Unified Infrastructure for Financial Services Middleware Solace Message Routers and Cisco Ethernet Switches: Unified Infrastructure for Financial Services Middleware What You Will Learn The goal of zero latency in financial services has caused the creation of

More information

CA IDMS 18.0 & 18.5 for z/os and ziip

CA IDMS 18.0 & 18.5 for z/os and ziip FREQUENTLY ASKED QUESTIONS CA IDMS 18.0 & 18.5 for z/os and ziip Important October 2013 update ziip (IBM System z Integrated Information Processor) is a specialty mainframe processor designed to help free

More information

QPP Proprietary Profile Guide

QPP Proprietary Profile Guide Rev. 04 April 2018 Application note Document information Info Content Keywords Proprietary Profile, Server, Client Abstract The Proprietary Profile is used to transfer the raw data between BLE devices.

More information

Terms of Use. Changes. General Use.

Terms of Use. Changes. General Use. Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED

More information

10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control

10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control 10 ways to securely optimize your network Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control Table of Contents Secure network optimization 3 #1. Application

More information

Tisio CE Release Notes

Tisio CE Release Notes Tisio CE Release Notes Copyright Copyright 2005, 2006, 2007 and 2008 by ThinPATH Systems, Inc. The information contained in this document is subject to change without notice. ThinPATH Systems, Inc. shall

More information

Intelligent Application Bypass

Intelligent Application Bypass The following topics describe how to configure access control polices to use (IAB) Introduction to IAB, on page 1 IAB Options, on page 2 Configuring IAB, on page 4 IAB Logging and Analysis, on page 5 Introduction

More information

Release Notes. BlackBerry Enterprise Identity

Release Notes. BlackBerry Enterprise Identity Release Notes BlackBerry Enterprise Identity Published: 2018-03-13 SWD-20180606100327990 Contents New in this release...4 Fixed issues...5 Known issues... 6 Legal notice...8 New in this release New in

More information

Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Matrix Equinox 3.0 Issue 1.0 December 15, 2016 Proprietary Use pursuant to the terms of your signed agreement or policy. December 2016 Matrix: Equinox 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT

More information

STONESOFT. New Appliances2012

STONESOFT. New Appliances2012 STONESOFT New Appliances2012 FW-315 WLAN Visibility and control to remote locations WLAN networks! Availability: April 2012 FW-315L WLAN Interfaces 4 x 10/100/1000 Mbps Throughput 100Mbps, 25Mbps VPN Management

More information

Keeping the Doors Open and the Lights On

Keeping the Doors Open and the Lights On ANALYST BRIEF Keeping the Doors Open and the Lights On PROTECTING AGAINST DISTRIBUTED DENIAL- OF- SERVICE ATTACKS Authors Rob Ayoub and David DeSanto Overview Over the past decade, the threat landscape

More information

Milestone Solution Partner IT Infrastructure Components Certification Report

Milestone Solution Partner IT Infrastructure Components Certification Report Milestone Solution Partner IT Infrastructure Components Certification Report HUAWEI OceanStor 2800 V3 27-08-2015 Table of Contents Executive Summary:... 4 Abstract... 4 Certified Products... 4 Key Findings...

More information

USB Server User Manual

USB Server User Manual 1 Copyright Notice Copyright Incorporated 2009. All rights reserved. Disclaimer Incorporated shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or consequential

More information

Flow Sensor and Load Balancer Integration Guide. (for Stealthwatch System v6.9.2)

Flow Sensor and Load Balancer Integration Guide. (for Stealthwatch System v6.9.2) Flow Sensor and Load Balancer Integration Guide (for Stealthwatch System v6.9.2) THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

Information Security Specialist. IPS effectiveness

Information Security Specialist. IPS effectiveness Information Security Specialist IPS effectiveness IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions An Intrusion Prevention System (IPS) is a critical layer of

More information

ivms-5200 Mobile Surveillance V1.1.0 Port List

ivms-5200 Mobile Surveillance V1.1.0 Port List ivms-5200 Mobile Surveillance V1.1.0 Port List Port List COPYRIGHT 2017 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings,

More information

Redirector User Guide

Redirector User Guide Redirector User Guide Revision B November 04, 2005 Part Number GC-800-235 Copyright and Trademark Copyright 2004, Grid Connect, Inc. All rights reserved. No part of this manual may be reproduced or transmitted

More information

IP Addressing: Fragmentation and Reassembly Configuration Guide

IP Addressing: Fragmentation and Reassembly Configuration Guide First Published: December 05, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

Avaya Port Matrix: Avaya Communicator for Microsoft Lync 6.4. Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Port Matrix: Avaya Communicator for Microsoft Lync 6.4. Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Matrix: for Microsoft Lync 6.4 Issue 1 July 28, 2015 Proprietary Use pursuant to the terms of your signed agreement or policy. July 2015 Matrix: for Microsoft Lync 1 ALL INFORMATION IS BELIEVED TO BE CORRECT

More information

HP S1500 SSL Appliance. Product overview. Key features. Data sheet

HP S1500 SSL Appliance. Product overview. Key features. Data sheet HP S1500 SSL Appliance Data sheet Product overview The HP S1500 SSL Appliance provides hardware-accelerated Secure Sockets Layer (SSL) offloading and bridging to enable high-performance intrusion prevention

More information

TEST METHODOLOGY. Wireless Networking. v1.0 DECEMBER 5, 2016

TEST METHODOLOGY. Wireless Networking. v1.0 DECEMBER 5, 2016 TEST METHODOLOGY Wireless Networking DECEMBER 5, 2016 v1.0 Table of Contents 1 Introduction... 4 1.1 The Need for Wireless Networking... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion

More information

SKD Labs Test Report. A Comparative Test on Anti-Malware Products in the China Region

SKD Labs Test Report. A Comparative Test on Anti-Malware Products in the China Region Test Report 2013 No.3 A Comparative Test on Anti-Malware Products in the China Region SKD Labs is a leading independent testing facility in the China market and specializes in functionality testing, performance

More information

User Manual Arabic Name Romanizer Name Geolocation System

User Manual Arabic Name Romanizer Name Geolocation System User Manual Arabic Name Romanizer Name Geolocation System MAPS Ono Lite (Romanizer) Version 2.50 Coverage of this document This document is the full text user manual for MAPSOno Lite (Romanizer) version

More information

File Server Comparison: Executive Summary. Microsoft Windows NT Server 4.0 and Novell NetWare 5. Contents

File Server Comparison: Executive Summary. Microsoft Windows NT Server 4.0 and Novell NetWare 5. Contents File Server Comparison: Microsoft Windows NT Server 4.0 and Novell NetWare 5 Contents Executive Summary Updated: October 7, 1998 (PDF version 240 KB) Executive Summary Performance Analysis Price/Performance

More information

Release Notes. BlackBerry UEM Client for Android Version

Release Notes. BlackBerry UEM Client for Android Version Release Notes BlackBerry UEM Client for Android Version 12.27.0.153083 Published: 2017-01-13 SWD-20170113121937594 Contents What's new...4 Fixed issues...5 Known issues... 6 Legal notice...7 What's new

More information

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.4

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.4 Stonesoft Firewall/VPN Express Release Notes for Version 5.5.4 Created: December 17, 2013 Table of Contents What s New... 3 Fixes... 3 System Requirements... 4 Stonesoft Firewall/VPN Appliances... 4 Build

More information

Fortinet Firewall Validation FortiGate-3810D

Fortinet Firewall Validation FortiGate-3810D Spirent Professional Services Final Report Spirent Communications Validation Spirent Professional Services Final Report Spirent Communications 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: sales@spirent.com

More information

Upgrade Guide GateManager Version 5.x to 5.x

Upgrade Guide GateManager Version 5.x to 5.x Upgrade Guide GateManager Version 5.x to 5.x This guide covers the procedure of upgrading a GateManager 5 server. Upgrading from GateManager 4.x is covered in another guide, see www.secomea.com The intended

More information

CIO Update: Security Platforms Will Transform the Network Security Arena

CIO Update: Security Platforms Will Transform the Network Security Arena IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will

More information

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide

Nokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide Part Number N450000567 Rev 001 Published September 2007 COPYRIGHT 2007 Nokia. All rights reserved. Rights reserved under the copyright

More information

Prime Service Catalog: UCS Director Integration Best Practices Importing Advanced Catalogs

Prime Service Catalog: UCS Director Integration Best Practices Importing Advanced Catalogs Prime Service Catalog: UCS Director Integration Best Practices Importing Advanced Catalogs May 10, 2017 Version 1.0 Cisco Systems, Inc. Corporate Headquarters 170 West Tasman Drive San Jose, CA 95134-1706

More information

StoneGate IPS. Hardware Requirements for Version 5.2.0

StoneGate IPS. Hardware Requirements for Version 5.2.0 StoneGate IPS Hardware Requirements for Version 5.2.0 Created: July 9, 2010 Table of Contents StoneGate Appliances... 3 Certified Intel Platforms... 3 Other Intel Platforms... 3 StoneGate Appliances StoneGate

More information

Validation of Cisco SCE8000

Validation of Cisco SCE8000 Isocore Technical Report Validation of Cisco SCE8000 ISOCORE Internetworking Lab ISOCORE Technical Document Reference: ITD: 13039 Version (v1.3): 4/10/09 ISOCORE Internetworking Lab 1 12359 Sunrise Valley

More information

Compatibility Matrix. Good Control and Good Proxy. June 4, 2018

Compatibility Matrix. Good Control and Good Proxy. June 4, 2018 Compatibility Matrix Good Control and Good Proxy June 4, 2018 Published: 2018-06-04 SWD-20180604161707961 Contents Introduction... 4 Legend... 4 Good Control server... 5 Operating system...5 Database server...5

More information

Supra-linear Packet Processing Performance with Intel Multi-core Processors

Supra-linear Packet Processing Performance with Intel Multi-core Processors White Paper Dual-Core Intel Xeon Processor LV 2.0 GHz Communications and Networking Applications Supra-linear Packet Processing Performance with Intel Multi-core Processors 1 Executive Summary Advances

More information

HTTP Errors User Guide

HTTP Errors User Guide Version 3.8 Published: 2016-03-28 Copyright 2016, Cisco Systems, Inc. Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

TOLLY. No March Fortress Technologies, Inc.

TOLLY. No March Fortress Technologies, Inc. Fortress Technologies, Inc. Encryption and Compression Performance Evaluation of Three Models (FC-1500, FC-500 and FC-250) Test Highlights Premise: Wireless networks are getting faster and enterprise deployments

More information

Stonesoft Management Center. Release Notes for Version 5.6.1

Stonesoft Management Center. Release Notes for Version 5.6.1 Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...

More information

Milestone Solution Partner IT Infrastructure Components Certification Report

Milestone Solution Partner IT Infrastructure Components Certification Report Milestone Solution Partner IT Infrastructure Components Certification Report Huawei OceanStor 5500 V3 SAN Storage 08-09-2015 Table of Contents Executive Summary:... 4 Abstract... 4 Certified Products...

More information

Aellius LynX Office Lookup Enhancements

Aellius LynX Office Lookup Enhancements Aellius LynX Office Lookup Enhancements August 2013 COPYRIGHT LynX Office Enhancements Copyright 2013, Aellius Professional Research & Consulting, LLC. All rights reserved. LynX Business Integrator (the

More information

IBM BigFix Lifecycle 9.5

IBM BigFix Lifecycle 9.5 Software Product Compatibility Reports Product IBM BigFix Lifecycle 9.5 Contents Included in this report Operating systems (Section intentionally removed by the report author) Hypervisors (Section intentionally

More information

IP Addressing: Fragmentation and Reassembly Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)

IP Addressing: Fragmentation and Reassembly Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) IP Addressing: Fragmentation and Reassembly Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information