• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
EncrypTight™ Data Center Security
 

EncrypTight™ Data Center Security

on

  • 592 views

http://www.BlackBox.com/go/EncrypTight | EncrypTight eliminates the need to establish point-to-point VPN tunnels between each pair of remote sites to secure data. Every site can establish an instant ...

http://www.BlackBox.com/go/EncrypTight | EncrypTight eliminates the need to establish point-to-point VPN tunnels between each pair of remote sites to secure data. Every site can establish an instant encrypted connection to every other site without the administrative hassle of setting up a separate tunnel for each pair of sites. In this presentation we explore the data center application.

Statistics

Views

Total Views
592
Views on SlideShare
496
Embed Views
96

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 96

http://go.blackbox.com 96

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    EncrypTight™ Data Center Security EncrypTight™ Data Center Security Presentation Transcript

    • EncrypTight™ Data Center SecuritySecure WAN connections without tunnels!
    • Data Center Remote Access Challenges Secure remote access High speed WAN links – up to 10Gbps Support for multi-point, multi-carrier architectures High availability Low latency Regulatory compliance
    • IPSec wasn’t designed for modernnetworksResulting issues: Complexity Latency Lack of QoS Loss of Layer 4 services Lack of application visibility Does not easily support data recovery or high availability IPSec connections
    • Modern networks require globalsecurity policiesSecurity should not impact: Any-to-Any Connectivity Load Balancing MPLS Tagging Resiliency Monitoring & Measuring Encrypted MPLS
    • EncrypTight delivers secure VPNswithout tunnels Define policies based on existing network or application topologies Topologies Applications • Mesh • Voice • Hub and spoke • Video • Multicast • Control data • Hybrids • FTP or other protocols Standards-based security protocols • AES 256 encryption • SHA hashing (ongoing authentication) • IPsec Enforce policies without creating tunnels Preserve native routing/switching protocols and paths • Layer 2: VLAN encryption • Layer 3: IP routes and subnets Performance Security • Layer 4: Traffic shaping and Netflow/Jflow
    • Example – Secure Redundant DataCenters• 2 Data Centers connecting to 100 member banks• Requires low latency performance with AES 256 encryption• Must support DUAL CARRIERS (no IPsec tunnels) Data Center #2 Data Center #1 Member Bank 100 Provider BEncrypTight Provider A• Two encryption appliances located at each site• Encrypted traffic load balanced across carriers Member• Provides regulatory compliance via single policy Bank 1
    • Manage network from one location All policies All topologies All Layers (2-4) Entire network One screen
    • Bandwidth & Policy Options Speed 3 Mbps 6 Mbps 10 Mbps ET0010A 25 Mbps 50 Mbps 100 Mbps 155 Mbps ET0100AHardware: 250 Mbps 3 Mbps to 10 Gbps 500 Mbps 650 Mbps ET1000ASoftware: 1 Gbps L2 Network-transparent Ethernet frame 2.5 Gbps L3 IPsec-based encryption 5 Gbps ET10000A L4 UDP/TCP payload encryption 10 Gbps
    • Questions? Need More Info?» Call our EncrypTight experts today at 888-245-6215.» Visit: www.blackbox.com/go/EncrypTight.