This technical paper describes the IBM SONAS system integration with Symantec AntiVirus for NAS, and guidelines for using the IBM SONAS system with Symantec AntiVirus for NAS to protect the overall system and prevent security threats caused by malware.
Cisco Advanced Malware Protection for Networks provides network-based advanced malware protection that goes beyond point-in-time detection. It detects, blocks, tracks, and contains malware threats across multiple threat vectors within a single system. It also provides visibility and control to protect organizations against highly sophisticated, targeted, zero-day, and persistent advanced malware threats. Some key capabilities include continuous analysis of files and traffic, retrospective security to look back in time after an attack, correlation of security events into coordinated attacks, tracking malware spread and communications, and containing malware outbreaks.
This technical paper describes the IBM Storwize V7000 Unified system integration with Symantec AntiVirus for NAS, and guidelines for using the IBM Storwize V7000 Unified system with Symantec AntiVirus for NAS to protect the overall system and prevent security threats caused by malware. To know more about the IBM Storwize V7000, visit http://ibm.co/TaLb6Q.
The document defines various terms related to computer security and viruses. It provides definitions for terms like 3G, adware, anti-virus databases, anti-virus engines, anti-virus updates, application programming interfaces, archive files, attack signatures, backdoor Trojans, bandwidth, batch files, behavioral analysis, binary code, and browser hijackers. The document serves as a glossary of security-related technical terms.
In a globally dispersed enterprise with private cloud environment, where unstructured data is exponentially growing, there is a need to provide 24x7 accesses to business-critical data and be able to restore in case of loss of data. IBM Scale Out Network Attached Storage (IBM SONAS) with its integrated IBM Tivoli Storage Manager client enables enterprises to back up and restore data seamlessly and the IBM Active Cloud Engine offers the capability to replicate data to remote sites.
This document provides an overview of using IBM SONAS with Active Cloud Engine to enable backup, replication, and caching of file data across geographically distributed sites in a private cloud environment. It describes how SONAS integrates with Tivoli Storage Manager for backup and with Active Cloud Engine for replication and caching. The document outlines the overall architecture and components. It then provides steps to set up Apple Final Cut Pro on a Mac client to read and write to a SONAS storage system over NFS, including connecting to the NFS export and mounting it. The remaining sections will describe how the solution enables backup of data on the home SONAS cluster, initial migration of data to the cache cluster using Active Cloud Engine,
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareNetgear Italia
Cosa è e come agisce il Ransomware, le azioni da intrapprendere e cosa Netgear può favorire la mitigazione della minaccia. Snapshot istantanee illimitate a livello blocco dati e ReadyRecover, la soluzione di backup appliance per ottenere full backup ogni 15 minuti di ogni sistema windows in Azienda.
Cisco Advanced Malware Protection (AMP) provides organizations protection from cyber attacks before, during and after an attack by using global threat intelligence and dynamic file analysis. AMP continuously monitors all file activity to rapidly detect and remediate threats that evade other defenses. It offers flexible deployment options across networks, endpoints, mobile devices and virtual environments. AMP helps security teams respond faster by providing deep visibility into the scope and origin of compromises.
The document summarizes Cisco Advanced Malware Protection (AMP) for Meraki MX, which provides comprehensive security and advanced threat protection across networks. It gives organizations visibility into threats across multiple locations, simplifies security management with a cloud-based platform, and helps quickly detect, analyze and remediate breaches. Key benefits include reduced time to detection of threats, continuous file monitoring, retrospective alerting, advanced malware analysis, and simplified security management from one central location.
Cisco Advanced Malware Protection for Networks provides network-based advanced malware protection that goes beyond point-in-time detection. It detects, blocks, tracks, and contains malware threats across multiple threat vectors within a single system. It also provides visibility and control to protect organizations against highly sophisticated, targeted, zero-day, and persistent advanced malware threats. Some key capabilities include continuous analysis of files and traffic, retrospective security to look back in time after an attack, correlation of security events into coordinated attacks, tracking malware spread and communications, and containing malware outbreaks.
This technical paper describes the IBM Storwize V7000 Unified system integration with Symantec AntiVirus for NAS, and guidelines for using the IBM Storwize V7000 Unified system with Symantec AntiVirus for NAS to protect the overall system and prevent security threats caused by malware. To know more about the IBM Storwize V7000, visit http://ibm.co/TaLb6Q.
The document defines various terms related to computer security and viruses. It provides definitions for terms like 3G, adware, anti-virus databases, anti-virus engines, anti-virus updates, application programming interfaces, archive files, attack signatures, backdoor Trojans, bandwidth, batch files, behavioral analysis, binary code, and browser hijackers. The document serves as a glossary of security-related technical terms.
In a globally dispersed enterprise with private cloud environment, where unstructured data is exponentially growing, there is a need to provide 24x7 accesses to business-critical data and be able to restore in case of loss of data. IBM Scale Out Network Attached Storage (IBM SONAS) with its integrated IBM Tivoli Storage Manager client enables enterprises to back up and restore data seamlessly and the IBM Active Cloud Engine offers the capability to replicate data to remote sites.
This document provides an overview of using IBM SONAS with Active Cloud Engine to enable backup, replication, and caching of file data across geographically distributed sites in a private cloud environment. It describes how SONAS integrates with Tivoli Storage Manager for backup and with Active Cloud Engine for replication and caching. The document outlines the overall architecture and components. It then provides steps to set up Apple Final Cut Pro on a Mac client to read and write to a SONAS storage system over NFS, including connecting to the NFS export and mounting it. The remaining sections will describe how the solution enables backup of data on the home SONAS cluster, initial migration of data to the cache cluster using Active Cloud Engine,
Webinar NETGEAR - Come Netgear può aiutare a mitigare gli effetti del RansomwareNetgear Italia
Cosa è e come agisce il Ransomware, le azioni da intrapprendere e cosa Netgear può favorire la mitigazione della minaccia. Snapshot istantanee illimitate a livello blocco dati e ReadyRecover, la soluzione di backup appliance per ottenere full backup ogni 15 minuti di ogni sistema windows in Azienda.
Cisco Advanced Malware Protection (AMP) provides organizations protection from cyber attacks before, during and after an attack by using global threat intelligence and dynamic file analysis. AMP continuously monitors all file activity to rapidly detect and remediate threats that evade other defenses. It offers flexible deployment options across networks, endpoints, mobile devices and virtual environments. AMP helps security teams respond faster by providing deep visibility into the scope and origin of compromises.
The document summarizes Cisco Advanced Malware Protection (AMP) for Meraki MX, which provides comprehensive security and advanced threat protection across networks. It gives organizations visibility into threats across multiple locations, simplifies security management with a cloud-based platform, and helps quickly detect, analyze and remediate breaches. Key benefits include reduced time to detection of threats, continuous file monitoring, retrospective alerting, advanced malware analysis, and simplified security management from one central location.
This document provides a vulnerability assessment report for a network called the Grey Network. It analyzes vulnerabilities found on 3 machines with IP addresses 172.31.106.13, 172.31.106.90, and 172.31.106.196. The report found critical vulnerabilities on all machines from outdated operating systems and software. Specific issues included an unencrypted Telnet server, outdated Apache and OpenSSL versions, and Windows XP past its end of life. Scanning tools like Nmap, Nikto, and Nessus were used to detect these vulnerabilities. The report recommends patching all systems, updating to current versions, and disabling insecure services.
SoftNAS Cloud NAS Architecture on AWS whitepaperMH Riad
SoftNAS Cloud is a software-defined NAS solution that can be deployed on Amazon EC2. This document discusses architectural considerations for deploying SoftNAS Cloud on AWS, including application security, performance optimization, high availability, and backup strategies. It provides guidance on choosing appropriate EC2 instance types and EBS volume types based on workload requirements and outlines deployment scenarios such as high availability and hybrid cloud architectures.
Network Attached Storage (NAS) software is commonly deployed to provide shared file services to users and applications. SoftNAS Cloud, a popular NAS solution that can be deployed from the Amazon Web Services (AWS) Marketplace, is designed to support a variety of market verticals, use cases, and workload types.
SoftNAS Cloud is deployed on the AWS platform to enable block and file storage services through NFS, CIFS/SMB, iSCSI and AFP.
This paper addresses architectural considerations when deploying SoftNAS Cloud on AWS. It also provides best practice guidance for security, performance, high availability, and backup.
Trend Micro: This talk examines an overarching security strategy for your deployment, pulled from the real-world experiences of top companies around the world. Paired with services like AWS Lambda, this strategy can result in a unified view of your deployment and automatically respond to incidents – regardless of scale.
Recent ransomware cyberattack on a major oil pipeline caused gas prices to surge and gas stations in multiple states to experience shortages due to a several-day outage resulting from the attack.
Patents are a good information resource for obtaining the state of the art of AI technology innovations for defending against the ransomware attacks. Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
n Forefront Security for SharePoint provides comprehensive protection for SharePoint servers through multi-engine antivirus scanning and filtering of inappropriate content and file types.
n It optimizes server performance through features like in-memory scanning and controls the number of active scan engines.
n Administration is simplified through centralized web-based management and automated updating of antivirus signatures and engines.
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
A guide for organizations faced with a ransomware
infection. This guide is split into several sections, with the most
critical and time-sensitive being in the initial response section.
If you are currently experiencing a ransomware incident, it is highly recommended you immediately review the containment section.
This document provides a guide for configuring a Squid proxy server. It discusses requirements like hardware specifications, choosing an operating system, and installing Squid. It then describes basic Squid configuration steps like editing configuration files, starting Squid, and configuring web browsers to use the proxy. Finally, it covers more advanced topics like designing access control lists to control which clients and sites can access the proxy server. The overall document aims to guide readers through the entire process of setting up and managing a Squid proxy server.
A presentation which you can portray to your customer. It is very difficult to put forward the Value Proposition of Windows Vista and other OS to an investor. They require very specific points.
This document contains a list of probable questions related to operating systems, file systems, networking, Windows commands, and troubleshooting. Some of the topics covered include types of operating systems, differences between FAT and NTFS file systems, Active Directory, firewall types, OSI model layers, and RAID levels. The list provides definitions and explanations for many common computer and networking concepts.
The document lists several probable questions about operating systems and computer security topics. It includes definitions and comparisons of different types of operating systems like real-time, multi-user, multi-tasking, distributed, and embedded operating systems. It also summarizes the differences between FAT and NTFS file systems, enhancements in Windows 2003, defines what an active directory is, describes types of firewalls like network-level, circuit-level, application-level, and stateful multi-level firewalls, and compares hardware and software firewalls.
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
1. Cloud storage systems store multiple copies of data across many servers in various locations so that if one system fails, the data can be accessed from another location.
2. Storage providers use virtualization software to aggregate storage assets from various devices into a single cloud storage system called StorageGRID.
3. StorageGRID creates a virtualization layer that retrieves storage from different storage devices and manages it through a common file system interface over the internet.
This document proposes a runtime behavior-based browser solution called Browser Guard to protect against drive-by download attacks. Browser Guard monitors the download behavior of files loaded in the browser and restricts execution of any automatically downloaded files without user consent. It works in two phases, first distinguishing trusted from malicious files based on download context, then prohibiting execution of files on the blacklist. The solution aims to enhance browser security without requiring file/script analysis or reputation checks.
This document reviews several security products for Macs, including avast! Free Antivirus for Mac, Avira Free Mac Security, eScan Anti-Virus for Mac, ESET Cyber Security Pro, F-Secure Anti-Virus for Mac, Kaspersky Security for Mac, and ZeoBit MacKeeper. It finds that all products detected 100% of malware samples tested, except for Kaspersky at 98.5%, ESET at 96.9%, and F-Secure at 90.6%. The document provides a brief overview of the installation process and key features of avast! Free Antivirus for Mac.
The document discusses data storage and cloud computing. It provides an overview of different types of data storage, including direct attached storage (DAS), network attached storage (NAS), and storage area networks (SANs). It also describes different classes of cloud storage, such as unmanaged and managed cloud storage. The document outlines some of the challenges of cloud storage and how cloud providers create virtual storage containers to manage data storage in the cloud.
The document discusses system security and provides seven common sense rules for security. It covers account security, file permissions, data encryption, single user security, dialup modems, security tools, and an overview of viruses, trojans, and worms. Monitoring logs, using security scanning tools, and educating yourself on security best practices are emphasized as important ways to help secure systems.
The document discusses system security and provides seven common sense rules for security. It covers account security, file permissions, data encryption, single user security, dialup modems, security tools, and an overview of viruses, trojans, and worms. Monitoring logs, using security scanning tools, and educating yourself on security best practices are emphasized as important ways to help secure systems.
The document summarizes and dispels five common myths about open source security software:
1. Open source software is too risky for IT security. However, open source is already widely used in enterprise IT infrastructure and can be more secure due to many experts reviewing code.
2. Open source software is free. While the code is free to download, significant resources are required to manage, support, and maintain open source solutions. Commercial open source vendors provide support and integration.
3. Open source vendors add little value. Vendors contribute to open source communities and add features for enterprise use cases like documentation, interfaces and integration between projects.
4. Proprietary solutions are more reliable. Experts already
This document discusses vulnerabilities in antivirus software. It begins by noting that over 165 vulnerabilities have been reported in antivirus software in the past 4 years according to the US National Vulnerability Database. It then examines why antivirus software is a target for attackers, including that users have blind faith in it and its error-prone nature in processing many file formats. The document outlines techniques used to find vulnerabilities, including source code audits, reverse engineering, and fuzzing. It also looks at exploiting found vulnerabilities, such as through weak permissions. The overall aim is to raise awareness of security issues in antivirus products.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
More Related Content
Similar to Protecting the IBM SONAS with Symantec AntiVirus for NAS
This document provides a vulnerability assessment report for a network called the Grey Network. It analyzes vulnerabilities found on 3 machines with IP addresses 172.31.106.13, 172.31.106.90, and 172.31.106.196. The report found critical vulnerabilities on all machines from outdated operating systems and software. Specific issues included an unencrypted Telnet server, outdated Apache and OpenSSL versions, and Windows XP past its end of life. Scanning tools like Nmap, Nikto, and Nessus were used to detect these vulnerabilities. The report recommends patching all systems, updating to current versions, and disabling insecure services.
SoftNAS Cloud NAS Architecture on AWS whitepaperMH Riad
SoftNAS Cloud is a software-defined NAS solution that can be deployed on Amazon EC2. This document discusses architectural considerations for deploying SoftNAS Cloud on AWS, including application security, performance optimization, high availability, and backup strategies. It provides guidance on choosing appropriate EC2 instance types and EBS volume types based on workload requirements and outlines deployment scenarios such as high availability and hybrid cloud architectures.
Network Attached Storage (NAS) software is commonly deployed to provide shared file services to users and applications. SoftNAS Cloud, a popular NAS solution that can be deployed from the Amazon Web Services (AWS) Marketplace, is designed to support a variety of market verticals, use cases, and workload types.
SoftNAS Cloud is deployed on the AWS platform to enable block and file storage services through NFS, CIFS/SMB, iSCSI and AFP.
This paper addresses architectural considerations when deploying SoftNAS Cloud on AWS. It also provides best practice guidance for security, performance, high availability, and backup.
Trend Micro: This talk examines an overarching security strategy for your deployment, pulled from the real-world experiences of top companies around the world. Paired with services like AWS Lambda, this strategy can result in a unified view of your deployment and automatically respond to incidents – regardless of scale.
Recent ransomware cyberattack on a major oil pipeline caused gas prices to surge and gas stations in multiple states to experience shortages due to a several-day outage resulting from the attack.
Patents are a good information resource for obtaining the state of the art of AI technology innovations for defending against the ransomware attacks. Patent information can provide many valuable insights that can be exploited for developing and implementing new technologies. Patents can also be exploited to identify new product/service development opportunities.
n Forefront Security for SharePoint provides comprehensive protection for SharePoint servers through multi-engine antivirus scanning and filtering of inappropriate content and file types.
n It optimizes server performance through features like in-memory scanning and controls the number of active scan engines.
n Administration is simplified through centralized web-based management and automated updating of antivirus signatures and engines.
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
A guide for organizations faced with a ransomware
infection. This guide is split into several sections, with the most
critical and time-sensitive being in the initial response section.
If you are currently experiencing a ransomware incident, it is highly recommended you immediately review the containment section.
This document provides a guide for configuring a Squid proxy server. It discusses requirements like hardware specifications, choosing an operating system, and installing Squid. It then describes basic Squid configuration steps like editing configuration files, starting Squid, and configuring web browsers to use the proxy. Finally, it covers more advanced topics like designing access control lists to control which clients and sites can access the proxy server. The overall document aims to guide readers through the entire process of setting up and managing a Squid proxy server.
A presentation which you can portray to your customer. It is very difficult to put forward the Value Proposition of Windows Vista and other OS to an investor. They require very specific points.
This document contains a list of probable questions related to operating systems, file systems, networking, Windows commands, and troubleshooting. Some of the topics covered include types of operating systems, differences between FAT and NTFS file systems, Active Directory, firewall types, OSI model layers, and RAID levels. The list provides definitions and explanations for many common computer and networking concepts.
The document lists several probable questions about operating systems and computer security topics. It includes definitions and comparisons of different types of operating systems like real-time, multi-user, multi-tasking, distributed, and embedded operating systems. It also summarizes the differences between FAT and NTFS file systems, enhancements in Windows 2003, defines what an active directory is, describes types of firewalls like network-level, circuit-level, application-level, and stateful multi-level firewalls, and compares hardware and software firewalls.
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
1. Cloud storage systems store multiple copies of data across many servers in various locations so that if one system fails, the data can be accessed from another location.
2. Storage providers use virtualization software to aggregate storage assets from various devices into a single cloud storage system called StorageGRID.
3. StorageGRID creates a virtualization layer that retrieves storage from different storage devices and manages it through a common file system interface over the internet.
This document proposes a runtime behavior-based browser solution called Browser Guard to protect against drive-by download attacks. Browser Guard monitors the download behavior of files loaded in the browser and restricts execution of any automatically downloaded files without user consent. It works in two phases, first distinguishing trusted from malicious files based on download context, then prohibiting execution of files on the blacklist. The solution aims to enhance browser security without requiring file/script analysis or reputation checks.
This document reviews several security products for Macs, including avast! Free Antivirus for Mac, Avira Free Mac Security, eScan Anti-Virus for Mac, ESET Cyber Security Pro, F-Secure Anti-Virus for Mac, Kaspersky Security for Mac, and ZeoBit MacKeeper. It finds that all products detected 100% of malware samples tested, except for Kaspersky at 98.5%, ESET at 96.9%, and F-Secure at 90.6%. The document provides a brief overview of the installation process and key features of avast! Free Antivirus for Mac.
The document discusses data storage and cloud computing. It provides an overview of different types of data storage, including direct attached storage (DAS), network attached storage (NAS), and storage area networks (SANs). It also describes different classes of cloud storage, such as unmanaged and managed cloud storage. The document outlines some of the challenges of cloud storage and how cloud providers create virtual storage containers to manage data storage in the cloud.
The document discusses system security and provides seven common sense rules for security. It covers account security, file permissions, data encryption, single user security, dialup modems, security tools, and an overview of viruses, trojans, and worms. Monitoring logs, using security scanning tools, and educating yourself on security best practices are emphasized as important ways to help secure systems.
The document discusses system security and provides seven common sense rules for security. It covers account security, file permissions, data encryption, single user security, dialup modems, security tools, and an overview of viruses, trojans, and worms. Monitoring logs, using security scanning tools, and educating yourself on security best practices are emphasized as important ways to help secure systems.
The document summarizes and dispels five common myths about open source security software:
1. Open source software is too risky for IT security. However, open source is already widely used in enterprise IT infrastructure and can be more secure due to many experts reviewing code.
2. Open source software is free. While the code is free to download, significant resources are required to manage, support, and maintain open source solutions. Commercial open source vendors provide support and integration.
3. Open source vendors add little value. Vendors contribute to open source communities and add features for enterprise use cases like documentation, interfaces and integration between projects.
4. Proprietary solutions are more reliable. Experts already
This document discusses vulnerabilities in antivirus software. It begins by noting that over 165 vulnerabilities have been reported in antivirus software in the past 4 years according to the US National Vulnerability Database. It then examines why antivirus software is a target for attackers, including that users have blind faith in it and its error-prone nature in processing many file formats. The document outlines techniques used to find vulnerabilities, including source code audits, reverse engineering, and fuzzing. It also looks at exploiting found vulnerabilities, such as through weak permissions. The overall aim is to raise awareness of security issues in antivirus products.
Similar to Protecting the IBM SONAS with Symantec AntiVirus for NAS (20)
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
2. Protecting the IBM SONAS with Symantec AntiVirus for NAS
Table of contents
Abstract.....................................................................................................................................1
Executive overview ..................................................................................................................1
IBM SONAS antivirus connector – an overview .....................................................................2
Symantec AntiVirus for NAS – an overview ...........................................................................3
Minimum system requirements...............................................................................................4
IBM SONAS ............................................................................................................................................. 4
Symantec AntiVirus for NAS.................................................................................................................... 4
Planning for integration of IBM SONAS with Symantec AntiVirus for NAS .........................5
Integration of IBM SONAS with Symantec AntiVirus for NAS...............................................7
Installing Symantec AntiVirus for NAS..................................................................................................... 7
Installing Symantec AntiVirus for NAS (Windows) .................................................................................. 7
Installing Symantec AntiVirus for NAS (Linux) ......................................................................................12
Configuring Symantec AntiVirus for NAS ..............................................................................................15
Configuring the IBM SONAS antivirus connector ..................................................................................17
Initiating a bulk scan using the SONAS antivirus connector ..............................................20
Initiating a manual bulk scan on a defined scope..................................................................................20
Scheduling bulk scan on a defined scope .............................................................................................22
Recommendations .................................................................................................................23
Summary.................................................................................................................................25
Resources...............................................................................................................................26
About the author.....................................................................................................................27
Trademarks and special notices ...........................................................................................28
3. Protecting the IBM SONAS with Symantec AntiVirus for NAS
1
Abstract
With today’s continuing explosive growth in information data, comes the need for storing the data
without compromising data integrity from potential threats that may exist in an enterprise network
environment. IBM Scale Out Network Attached Storage (IBM SONAS) has been qualified for
interoperability with the leading AntiVirus scan engines such as Symantec SAV for NAS and McAfee
Total Protection Enterprise VirusScan This technical paper describes IBM SONAS integration with
Symantec AntiVirus for network-attached storage (SAV for NAS), and guidelines for using IBM
SONAS with Symantec AntiVirus for NAS to protect the overall system and prevent security threats
caused by malware.
Executive overview
Enterprises continue to demand storage solutions that can store massive amounts of file-based data with
ease of management and that can scale on demand. Often these enterprises with fast-growing file
systems, face limitations of scalability and performance with traditional network-attached storage (NAS)
filers because of the requirement to work on millions active files in parallel. IBM® SONAS is a multi-
petabyte scale-out NAS storage offering for unstructured information storage. It is designed to scale out to
store millions and even billions of active files with superior performance and ease of management.
The IBM SONAS is designed to serve large number of users connecting to it using a variety of file-based
protocols, such as Network File System (NFS) or Common Internet File System (CIFS). The data which is
created or accessed using these protocols is vulnerable to the potential threats of viruses, worms, Trojan
horses, and other forms of malware. Computer viruses mostly target Microsoft® operating systems,
however, computers running other operating systems can be directly or indirectly affected by viruses.
IBM SONAS, when integrated with Symantec AntiVirus for NAS (henceforth called as Symantec scan
engines) provides a comprehensive solution to protect all the data stored on the SONAS. IBM SONAS
antivirus connector is a part of the SONAS management software which communicates with ISV scan
engines using Internet Content Adaptation Protocol (ICAP). There are two approaches for virus scanning:
On-access scan – It scans all the specified files on IBM SONAS when accessed or created. This method
has the benefit of ensuring that the files are scanned with the latest virus signature before being accessed.
This approach is more effective at detecting viruses before they are able to compromise data and this
method does not generate heavy network traffic between IBM SONAS and Symantec scan engines. This
approach is ideal for Customers using Windows clients and CIFS file I/O.
Bulk scan – This allows scanning of all the specified files on a file system or a part of file system. This is
typically performed at the schedule defined on the IBM SONAS. The disadvantage in using this method is
that the files recently updated might not be scanned before being used. Bulk scans can generate heavy
network traffic between SONAS and scan engines and can generate heavy load on a storage system.
Also, bulk scan can take significant time to complete, depending on the number of files to be scanned.
Storage Administrators are likely to use the Bulk scans for non-CIFS files (e.g. NFS) protection which are
less prone to Virus attacks.
4. Protecting the IBM SONAS with Symantec AntiVirus for NAS
2
IBM SONAS antivirus connector – an overview
IBM SONAS antivirus connector provides enterprise antivirus vendors such, as Symantec AntiVirus for
NAS, tighter integration and overall control of antivirus implementations by deciding strategies suitable for
the customer environment. IBM SONAS antivirus connector communicates with Symantec scan engines
using Internet Content Adaptation Protocol (ICAP). IBM SONAS can be configured with multiple Symantec
scan engines to achieve load balancing and to distribute the work load. SONAS selects a scan engine
from the pool of scan engines at scan time. If a scan engine is not reachable from SONAS, it is temporarily
removed from the pool and SONAS selects a different scan engine from the pool of available scan
engines. It periodically attempts to reinstate the removed scan engine back into the pool. Figure 1
describes the workflow of an On-Access scan session for a single file.
When user accesses a file from IBM SONAS over the network, SONAS initiates the scan of a file in real
time and opens a connection with Symantec scan engine. SONAS then passes the file to the scan engine
for scanning. The Symantec scan engine indicates the scanning results to SONAS after the file is
scanned. In case the file is infected, scan engine tries to repair the file and sends the repaired file to
SONAS. SONAS receives the scan results. If the file is infected and can be cleaned, a stored version of
the infected file is replaced on SONAS with the repaired file received from the scan engine. Only the
repaired file is passed to the requesting user.
In case virus is detected and repair of file is not possible, SONAS can be configured to quarantine or
delete the non-repairable file and user will be notified with permission denied type of error message.
User accesses
the file on IBM
SONAS from the
network
SONAS antivirus
connector
determines the
file needs to be
scanned and
transferred to
the Symantec
scan engine
Symantec scan
engine scans the
file and repair
the file if file is
infected.
Scan results and
the repaired file
returned to the
IBM SONAS.
IBM SONAS
replaces the
infected file
with the
repaired file.
User is
allowed to
access the file
CIFS User IBM
SONAS
Symantec
Scan Engine
1. 2.
3.
4.
5.
6.
Figure 1: Work flow of on-access scanning of a file from IBM SONAS using Symantec scan engine
5. Protecting the IBM SONAS with Symantec AntiVirus for NAS
3
The connector also caches antivirus scan information for each file as extended attributes to determine
whether it must be scanned or rescanned by saving the timestamps of the last scan in addition to the
antivirus definition file. This way a repeat scan might be avoided if another user tries to access the same
file later but the antivirus definitions have not changed. When new antivirus definitions are received and
updated, each file is rescanned before it is made available to the user requesting access. Bulk scans
might be configured to proactively rescan files periodically (e.g. every day) during off-peak hours when
accesses are minimal to prevent any potential performance impacts on the SONAS system or the scan
engines in the pool.
Symantec AntiVirus for NAS – an overview
Symantec AntiVirus for NAS provides remote scanning of IBM SONAS using the ICAP protocol.
Symantec scan engine scans the files received from IBM SONAS and provides real-time protection for the
massive amount of critical information that is being stored and accessed by the IBM SONAS users.
Symantec scan engine detects the virus infected files that are being accessed, read, or copied to and from
IBM SONAS. After detecting an infection in the file, it automatically cleans the file and provides the
repaired file to the IBM SONAS.
Symantec AntiVirus for NAS provides following features:
• Advanced anti-virus technology: Symantec’s award winning anti-virus technology continuously
blocks a wide range of viruses and malicious code threats, including those hidden in compressed
files.
• Detection of unwanted programs: It finds the unwanted hidden spyware programs that open
security holes.
• Centralized management: Entire Symantec security system can be managed using Symantec’s
central management system, reducing overall cost and providing ease of management.
• Continuous protection: On-access scanning provides real time protection to the data on IBM
SONAS when the files are accessed or written to the SONAS unlike traditional on-demand scans.
• Cost effectiveness: It supports connection to more than one IBM SONAS.
• Rapid notification: Whenever a virus is detected, notification can be sent to the configured
recipients. This enables recipients to react instantly to any possible virus outbreak.
6. Protecting the IBM SONAS with Symantec AntiVirus for NAS
4
Minimum system requirements
A combination of Windows, Linux, and Solaris platforms are supported as scan engines which scan the
files located on the SONAS system. Depending on the volume of the data being scanned and the
requirements for accessibility, multiple scan engines may be deployed as needed.
IBM SONAS
Software:
• Version 1.2.0.0 or higher
Symantec AntiVirus for NAS
Software:
• Version 5.2 or higher and license(s)
Supported operating systems:
• Red Hat Enterprise Linux 5.x (32-bit & 64-bit)
• Red Hat Linux Advanced Server 3 & 4 (32-bit)
• Red Hat Linux Enterprise Server 3 & 4 (32-bit)
• Solaris (SPARC) 9 & 10 (32-bit)
• SuSE Linux Enterprise Server 9 & 10 (32-bit)
• Windows 2000 Server with the latest service pack
• Windows Server 2003 (32-bit & 64-bit), R2 (32-bit)
• Windows Server 2008 (32-bit & 64-bit), R2 (64-bit)
Processor:
• 2.4 GHz Intel Pentium 4 or 1 GHz SPARC
Memory:
• 1 Gb of RAM
Disk space:
• 500 Mb hard disk space available
Additional Hardware:
• 1 network interface card (NIC) running TCP/IP with a static IP address
• Internet connection to update definitions
• 100 Mbits/s Ethernet link (1 Gbits/s or faster recommended)
7. Protecting the IBM SONAS with Symantec AntiVirus for NAS
5
Planning for integration of IBM SONAS with Symantec AntiVirus
for NAS
Planning is one of the most important areas of consideration before beginning to configure IBM SONAS
with Symantec AntiVirus for NAS. It is important that the security team and IBM SONAS administrators
work together to anticipate the scopes and type of files for which scanning is required, as well as the
number of files required to scan and number of Symantec scan engines that are required. The
administrators must define policies or settings for handling of infected files when they are detected by
configuring both the SONAS antivirus connector as well as the Symantec scan engine. In addition, the
Symantec AntiVirus for NAS Integration Guide found in the Resources section should be consulted for
SONAS specific integration information.
The following factors need to be carefully considered before integrating IBM SONAS with Symantec
AntiVirus.
Numbers of Symantec scan engines:
Antivirus scanning on SONAS requires a minimum of one scan engine configured with Symantec AntiVirus
for NA0053. However, in order to take full benefit of load balancing and high availability feature of IBM
SONAS, a minimum of two scan engines are recommended. SONAS antivirus connector automatically
performs load balancing to make sure that the workload is evenly distributed across the scan engines.
When a scan engine becomes unavailable, the workload is directed to the remaining operational scan
engines. Additional considerations listed below affect the number of scan engines which may be required:
• Total number of files stored on the SONAS requiring scanning
− Large numbers of files can be scanned by multiple scan engines using the SONAS antivirus
connector load balancing feature.
• Host processor speed and RAM configuration
− Fewer scan engines may be needed if CPU speeds are faster and more RAM is present on
each scan engine.
• Network speed
− Faster network speeds allow for reduced time in transferring larger files to the scan engine for
scanning.
Type of scopes to scan:
In SONAS, antivirus configuration options are defined on scopes. A scope is a subtree of file namespace,
identified by the path to the root of the subtree. All file accesses within that subtree share a set of antivirus
settings. You can configure the following four types of scope for antivirus scanning in IBM SONAS.
• File systems
• File sets
• Path
• Exported shares
8. Protecting the IBM SONAS with Symantec AntiVirus for NAS
6
Not all scopes are required to be configured for scanning as certain file sets, paths, or file systems are
either static in nature, or are not shared with any users. The administrator needs to ensure all scopes
which may be vulnerable to potential threats are included in their defined scanning strategy.
Types of files to scan:
In SONAS, the administrator can define which files or file types are to be scanned. Administrator can
control and decide whether to scan files by exclusion list or inclusion list, or whether to scan all the files
regardless of extensions. SONAS antivirus parameter can be set at all the scopes to specify which
extensions to be included in or excluded from a scan. The exclusion list specifies the extensions of files to
be excluded because they are not likely to contain viruses.
The inclusion / exclusion list defines following behavior:
• If the include list is empty or not defined, default is that all extensions are included in the scan.
− Excluded list is created to exclude files with specific file extensions from scanning by the
Symantec scan engine.
− Excluded list is created to exclude files with specific file extensions from scanning by the
Symantec scan engine.
• If an extension is in the include list, only files with that extension are scanned.
• If an extension is in include as well as exclude list, files with that extension are not scanned.
Careful planning is required to create the include / exclude list as this plays an important role in improving
performance of the scan process, as not all file extensions need to be scanned due to the nature of the
files and file types, which are unlikely to have viruses.
File processing strategy
It is important to plan for the action that needs to be taken in case of unrecoverable virus file is identified.
IBM SONAS provides the option to quarantine or delete the infected, unrecoverable file. For this, optional
parameter can be set to quarantine or delete the file at the defined scope. Optionally, the path by which
the file was opened for the current scan can be moved to a subdirectory created for that purpose. Only the
SONAS or Security administrator will have access to that subdirectory and can take appropriate action to
manually delete the unrecoverable virus files. If no strategy is defined, user is denied the access to the file.
9. Protecting the IBM SONAS with Symantec AntiVirus for NAS
7
Integration of IBM SONAS with Symantec AntiVirus for NAS
The scanning process requires two components: the IBM SONAS antivirus connector and the external
antivirus scan engine(s) running Symantec AntiVirus for NAS. Depending on the workload determined
during the planning stage, multiple scan engines may need to be installed and configured to the SONAS.
The minimum software and hardware requirements are documented in the “Minimum system
requirements” section of this guide.
SONAS antivirus connector communicates with Symantec AntiVirus for NAS using the industry standard
ICAP protocol. Remote scanning is performed via the ICAP protocol when a user requests access to a file
residing on a SONAS share as illustrated in Figure 2: Work flow of on-access scanning of a file from IBM
SONAS using Symantec scan engine.
Integrating SONAS with a Symantec scan engine begins with the installation of Symantec AntiVirus for
NAS on the identified server(s), followed by configuring both the SONAS antivirus connector and the
Symantec scan engine.
Installing Symantec AntiVirus for NAS
The installation package for Symantec AntiVirus for NAS is available as an ISO image which contains
Microsoft Windows® and Linux® versions of the scan engine client, or individual Windows and Linux ZIP
file packages. Installation of the scan engine can be performed locally at each individual server or remotely
depending on the level of server security implemented. The following instructions assumes that the
installer has remote access to identified scan engine hardware using the individual ZIP file packages
downloaded from Symantec website:
http://www.symantec.com/business/antivirus-for-network-attached-storage
Installing Symantec AntiVirus for NAS (Windows)
1. Copy SymantecAntiVirus_NAS_5.2.x_Win32_IN.zip to a Windows server which has been
identified to function as a scan engine and extract the ZIP file to a temporary directory.
Figure 2: Unzipping the ZIP package in a temporary directory
10. Protecting the IBM SONAS with Symantec AntiVirus for NAS
8
2. Verify that a 32-bit Java™ runtime environment (JRE) is installed on the system.
Figure 3: Checking the JRE version
If a 32-bit JRE is not installed on the system, change directory to ToolsJavaWin32 and install a
copy of the Java 6 runtime environment included with the Symantec AntiVirus for NAS ZIP
package.
Figure 4: Installing a copy of the JRE
3. Start the Symantec AntiVirus for NAS installer by typing cdstart.
Figure 5: Starting the Symantec AntiVirus for NAS CD menu
4. Click Install Symantec AntiVirus(TM) 5.2 for NAS.
Figure 6: Menu option to install Symantec AntiVirus for NAS
11. Protecting the IBM SONAS with Symantec AntiVirus for NAS
9
5. Click Next to continue the installation.
Figure 7: Symantec scan engine InstallShield Wizard
6. Accept the terms of the license agreement and click Next to continue.
Figure 8: Symantec scan engine software license agreement
12. Protecting the IBM SONAS with Symantec AntiVirus for NAS
10
7. Select a folder to install the scan engine software into, or click Next to continue and use the
default folder:
Figure 9: Selecting an installation folder
8. Enter a password which will be used to access the scan engine user interface, and click Next to
continue.
Figure 10: Specifying a password for the administrative interface
13. Protecting the IBM SONAS with Symantec AntiVirus for NAS
11
9. Select the URL filtering and definition downloads if desired, and click Next to continue.
Figure 11: Selecting URL filtering and URL definition downloading
10. If satisfied with the previous choices of configuration options, click Install to begin installation.
Figure 12: Scan engine installation confirmation
14. Protecting the IBM SONAS with Symantec AntiVirus for NAS
12
11. Click Finish to complete the installation and return to Windows.
Figure 13: Scan engine installation completed
Installing Symantec AntiVirus for NAS (Linux)
Perform the following steps to install Symantec AntiVirus for NAS (Linux).
1. Copy SymantecAntiVirus_NAS_5.2.x_Linux_IN.zip to a Linux server that has been identified to
function as a scan engine, and extract the ZIP file into a temporary directory.
Figure 14: Unzipping the ZIP package in a temporary directory
2. At the command prompt, type rpm -qa | grep sharutils-4.6.1-2.i386.rpm to verify that sharutils-
4.6.1-2.i386.rpm is installed on the system.
Figure 15: Checking for installation of the sharutils package
15. Protecting the IBM SONAS with Symantec AntiVirus for NAS
13
If the query does not return any output, download a copy of sharutils-4.6.1-2.i386.rpm and install
it by typing rpm --ivh sharutils-4.6.1-2.i386.rpm at the prompt.
Figure 16: Installing the sharutils package
3. Type rpm -qa | grep jre at the prompt to verify that the Java runtime environment is installed on
the system.
Figure 17: Checking for installation of the JRE
If the query does not return any output, change directory to SAV_NAS/Tools/Java/RedHat and
install a copy of the Java 6 runtime environment included with the Symantec AntiVirus for NAS ZIP
package by typing ./jre-6u21-linux-i586-rpm.bin at the prompt.
Figure 18: Installing a copy of the JRE
4. After sharutils and the JRE are available on the system, change directory to
SAV_NAS/Scan_Engine/RedHat and type ./ScanEngine.sh to begin installing the Symantec
Scan Engine.
Figure 19: Launching the scan engine installation script
5. Read and agree to the license terms by typing y when prompted.
Figure 20: Scan engine license agreement
16. Protecting the IBM SONAS with Symantec AntiVirus for NAS
14
6. Accept the default installation directory by pressing Enter when prompted or type in a complete
path name if another location is desired.
Figure 21: Selecting an installation directory
7. Type y and press Enter to run the scan engine as root, or type n and enter a different username.
Figure 22: Selecting a user name for the scan engine
8. Press Enter to select 8004 as the default port used to access the scan engine from a web browser
or enter a desired port number.
Figure 23: Selecting an administrator web interface port
9. Press Enter to select 8005 as the default secure sockets layer (SSL) port used to access the scan
engine from a web browser or enter a desired SSL port number.
Figure 24: Selecting an administrator SSL port
10. Enter a password which will be used to access the scan engine interface and confirm (Note: the
password will not appear on the screen):
Figure 25: Specifying a password for the administrative interface
11. Press Enter if do you not wish to enable URL filtering.
Figure 26: Selecting URL filtering and URL definition downloading
12. The scan engine will start automatically at the end of a successful installation. If any problems are
encountered during the installation, refer to the /var/log/SYMCScan-install.log log file for
additional information.
17. Protecting the IBM SONAS with Symantec AntiVirus for NAS
15
Figure 27: Scan engine installation completed
Configuring Symantec AntiVirus for NAS
Configuring the Symantec scan engine is the same across all client platforms, and therefore, the following
directions apply to both Windows and Linux:
1. Using a supported web browser, open a connection to the newly-installed scan engine and log in
with the password specified during the installation process.
Figure 28: Scan engine administrative log in screen
2. Under the Tasks subsection, click Install License.
Figure 29: Tasks subsection for license installation
18. Protecting the IBM SONAS with Symantec AntiVirus for NAS
16
3. Enter the full path and filename to the license file provided by Symantec and then click Install.
Figure 30: Scan engine license installation
4. Click the Configuration icon in the left navigation bar and ensure that Protocol is selected under
the Views subsection.
Figure 31: Configuration subsection for protocol configuration
5. Under ICAP configuration, check the Select check box for the IP address to the scan engine. In
addition, select a scan policy suitable for the environment.
Figure 32: Configuring ICAP and specifying a scan policy
Be sure to click Apply at the upper-left section of the action bar to ensure that all changes for this
19. Protecting the IBM SONAS with Symantec AntiVirus for NAS
17
page have been saved and applied.
Figure 33: Apply icon
6. Click the Policies icon in the left navigation bar and ensure that Scanning is selected under the
Views subsection.
Figure 34: Policies subsection for configuring scanning options
7. Antivirus Scanning is set to Medium by default, but if maximum detection sensitivity is needed, set
this option to High.
Figure 35: Selecting a virus scanning level
The scan engine is now ready for use with the SONAS system. For more information regarding additional
options and behaviors that can be customized to individual organizational requirements, refer to the
Symantec Scan Engine Implementation Guide for which the link is provided in the “Resources” section of
this guide.
Configuring the IBM SONAS antivirus connector
IBM SONAS command line interface (CLI) is used for configuring and displaying SONAS antivirus
parameters. It is configured using the cfgav command line utility which is accessed from the management
node. This utility controls scan behavior when files are accessed by a client as well as during bulk scan
requests. The SONAS antivirus configuration can be changed dynamically and it does not require
shutdown or restart of the antivirus service.
Before using the connector to control scanning behavior, the connector must be configured with a pool of
scan engines. Next, you need to define scopes to the connector along with a set of scan options specific
to each scope. A scope can be an entire file system, specific paths on a filesystem, a CIFS export, or a
file set.
Defining scan engine pool
At least one scan engine must be registered in order to provide virus scanning for each SONAS.
However, it is recommended to configure minimum two scan engines in a scan engine pool to avail the
load-balancing facility provided by SONAS, used for distributing the scan load. Also, it provides the
high-availability feature in case one scan engine is not available. SONAS tries to contact the failed
scan engine periodically and reinstate it for scanning after it become available.
20. Protecting the IBM SONAS with Symantec AntiVirus for NAS
18
• For defining a scan engine to the connector, use the cfgav CLI.
cfgav --set-scanner symantec:<IP Address 1>:<ICAP Port>
IP Address = IP address of a scan engine
ICAP Port = Port used for ICAP communication (Symantec default is 1344)
Figure 36: Example of set-scanner
• Additional scan engines can be specified at the same time by separating each with a comma.
cfgav --set-scanner symantec:<IP Address 1>:<ICAP Port>,symantec:<IP Address 2>:<ICAP Port>
Figure 37: Example of multiple set-scanner
• To add another scan engine at a later time, use the following command:
cfgav --add-scanner symantec:<IP Address>:<ICAP Port>
Figure 38: Example of add-scanner
Defining scopes with scan options
For configuring a scope with scan options:
cfgav --<scope> <scope arg> --<option 1> <option 1 arg> … --<option N> <option N arg>
• scope = fsys (file system), path (file system path), export (CIFS export), or fset (file set)
• scope arg = name or path to a scope
• option = multiple options can be specified together separated by a space
• option arg = specific arguments that apply to each option
Examples:
• Enable antivirus scanning on a list of scopes:
cfgav --export av00a,av01a --scan
• Set a list of extensions to scan on an export:
cfgav --export av00a --set-include exe,dll,xlsx
21. Protecting the IBM SONAS with Symantec AntiVirus for NAS
19
• Set a timeout value for accessing scan engines:
cfgav --timeout 20
• Enable file system scanning when a file is written:
cfgav --fsys gpfs0 --onwrite
• Deny access to protected files in a file set if scanning cannot occur:
cfgav --fset gpfs0:root --denyonerror
• Add an extension to a path include list:
cfgav --path /ibm/gpfs0 --add-include exe
• Set the include list for an export:
cfgav --export av00a --set-exclude txt
• Enable file quarantine by deletion for an export:
cfgav --export av00a --qdel
• Enable file quarantine by moving for an export:
cfgav --export av00a –qmove
Verifying scan options on defined scopes
Current antivirus configuration for all scopes can be listed using the lsav command.
Figure 39: Example of lsav CLI command
For a complete list of configurable options and their descriptions, consult the man page for the cfgav utility
by typing man cfgav at the command prompt on the management node. Alternatively, invoking the utility
by typing cfgav --help provides a list of options with abbreviated explanations.
22. Protecting the IBM SONAS with Symantec AntiVirus for NAS
20
Initiating a bulk scan using the SONAS antivirus connector
The antivirus connector provides a method for administrators to initiate a full scan on all the files defined
within one or more scopes on the SONAS. As previously mentioned, every time a new antivirus definition
file is downloaded by the scan engine(s), all files defined within all scopes must be rescanned prior to
access. The bulk scan feature is a method to proactively scan all of those files during a window when
access to the SONAS is at a minimum, thereby reducing the load on the system and network during peak
usage times.
The ability to perform a bulk scan is also important when new shares are created but files are copied either
through secure file transfer protocol (SFTP) or secure copy protocol (SCP) from other file systems and are
not scanned automatically. Initiating a bulk scan on these shares ensures that in the future, file accesses
will be faster.
Initiating a manual bulk scan on a defined scope
Manual bulk scans are initiated using the ctlavbulk command line utility, which is accessed from the
management node. This utility follows all settings defined by the cfgav utility, and when called with a scope
will only scan those files which are defined in that scope. If no scopes are provided, all protected files will
be scanned. Only one bulk scan can be run at a time, however multiple scan processes can be spawned
on each interface node using the --processes option. When the command is issued, it becomes a
background process, returning the control to the user. You can check the status of the current bulk scan
by issuing the --status option of the ctlavbulk command.
Starting a bulk scan on one or more defined scopes
Bulk scan can be initiated on one or more defined scopes.
ctlavbulk --<scope 1> <scope 1 arg 1>,<scope 1 arg N> --<scope 2> <scope 2 arg 1>,<scope 2 arg N>
• scope = fsys (file system), path (file system path), export (CIFS export), or fset (file set)
• scope arg = name or path to a scope
Examples:
• Initiate bulk scan on one scope:
ctlavbulk --export av00a
• Initiate bulk scan on two scopes of the same type:
ctlavbulk --export av00a,av01a
• Initiate bulk scan on two scopes of different types:
ctlavbulk --fsys gpfs0 --export av02a
Starting a bulk scan with multiple processes
Bulk scan can be initiated with multiple processes:
ctlavbulk --<scope 1> <scope 1 arg 1> --processes <processes arg>
23. Protecting the IBM SONAS with Symantec AntiVirus for NAS
21
• scope = fsys (file system), path (file system path), export (CIFS export), or fset (file set)
• scope arg = name or path to a scope
• processes arg = number of processes to spawn on each interface node (default = 1)
Examples:
• Initiate bulk scan on one scope with five processes per interface node:
ctlavbulk --export av03a --processes 5
• Initiate bulk scan on four scopes with 10 processes per interface node:
ctlavbulk --export av04a,av05a --fsys gpfs1,gpfs2 --processes 10
Checking the status of a bulk scan
Bulk scan status can be listed using the --status option.
ctlavbulk --status
Figure 40: Example of ctlavbulk --status
Note: The * in the column labeled p indicates the process has started for the displayed node.
Stopping a bulk scan
Bulk scan can be stopped using the --stop option.
ctlavbulk --stop
Figure 41: Example of ctlavbulk --stop
For a complete list of configurable options and their descriptions, consult the man page for the ctlavbulk
utility by typing man ctlavbulk at the command prompt on the management node. Alternatively, invoking
the utility by typing ctlavbulk --help provides a list of options with abbreviated explanations.
24. Protecting the IBM SONAS with Symantec AntiVirus for NAS
22
Scheduling bulk scan on a defined scope
Periodic bulk scans can be scheduled using the mktask command line utility on the management node
using the task name CtlAvBulk as one of the parameters. Tasks are run on a daily basis. The mktask
command supports additional customizable options, which are completely explained on the man page
available by typing man mktask from the management node command line interface.
Creating a bulk scan task for a defined scope
New scheduled task for bulk scanning a defined scope can be created using the mktask command
mktask CtlAvBulk --hour N --minute N --parameter “scope(s)”
• hour N = hour of the day to start the scan (24-hour clock), that is, 10, 12, 15, 20
• minute N = minute of the hour to start the scan
• scope(s) = one or more scopes to bulk scan
Example:
• Schedule a bulk scan for 2:30 a.m. every day on two CIFS exports:
mktask CtlAvBulk --hour 2 --minute 30 --parameter "--export AV1,AV2"
25. Protecting the IBM SONAS with Symantec AntiVirus for NAS
23
Recommendations
Antivirus scanning, particularly bulk scanning of large files can add significant load to several IBM SONAS
system resources and can cause performance bottlenecks. The following recommendations can help you
minimize performance impact to the system.
• If on-access or bulk scan produces timeout errors, consider increasing timeout value of scans by
using the --timeout parameter of the cfgav command. It is not recommended to increase the
timeout parameter beyond CIFS client timeout value, which can cause files becoming inaccessible
to the user.
• Avoid scanning expensive items (such as scanning inside the archive files or other containers) to
avoid timeout issues.
• Depending on the scanning performance requirements, the number of interface nodes on which
bulk scans are run can be configured using the --nodes option of the ctlavbulk command. If higher
scanning performance is desired, consider running scans on additional interface nodes. To reduce
impact to other SONAS resources, consider limiting the number of interface nodes on which bulk
scans are run.
• It is recommended to carefully decide file types for scanning. Certain classes of large files are less
likely to be prone to virus attacks. By de-configuring certain types of files using the --add-include|--
rem-include|--set-include|--set-exclude options of the cfgav command, overall antivirus scanning
performance can be greatly improved.
• Similar consideration should be given to decide scopes for scanning as some scopes might
contain files that will not be accessed and they are not likely prone to the virus attacks.
• Ensure that the storage backend has adequate capacity for the client and scan traffic. On-access
scans are less likely to add significant load to the storage backend because it is typically scanning
data that has either just been written or is just about to be read by the client and therefore can
take advantage of caching. Bulk scans on the other hand can add significant load to the storage
backend.
• After updating the antivirus signature, it is recommended to scan all protected files during off-peak
hours to minimize the impact of scanning during peak usage.
• Ensure that the network infrastructure, such as routers, switches, and network cards on both
SONAS and scan engines has adequate capacity. It is recommended to use 10 Gigabit Ethernet.
• It is recommended to use minimum of two scan engines to avail high availability and load-
balancing feature for the scanning.
• Ensure that scan nodes have adequate processor and disk performance.
• It is recommended to run bulk scan after a migration either by Hierarchical Storage Management
(HSM) recall or data restoration from backup server.
• While using multiple scan engines to support scanning of IBM SONAS, consider the following
factors:
− Configure the setting on each scan engine to be identical.
26. Protecting the IBM SONAS with Symantec AntiVirus for NAS
24
− Schedule an auto update of all Symantec scan engines to occur at the same time to
ensure that virus definitions are identical.
− Configure virus scan functionality for each identical SONAS system that uses a
particular scan engine to avoid inconsistency.
27. Protecting the IBM SONAS with Symantec AntiVirus for NAS
25
Summary
The ability to effectively protect shared file data against viruses and other malicious threats is an important
challenge for storage and security administrators who require a trusted and reliable antivirus solution. Not
only must the integrity of the data be constantly maintained, the solution must also be scalable to match
the continually expanding size and volume of data that is retained on a NAS system. The IBM SONAS
system is designed as a multipetabyte global storage platform supporting extreme scalability for business
infrastructures that demand high performance as well as high availability. IBM has thoroughly tested the
SONAS system with Symantec AntiVirus for NAS confirming their interoperability and compatibility, and is
committed to proactively providing enterprise users with one of the best solutions that can serve to reduce
time and mitigate risk during planned implementations.
The technical content contained herein is intended only as a reference for those customers who wish to
use Symantec AntiVirus for NAS to protect their data on the IBM SONAS system. It should not be treated
as a definitive implementation or solution document due to the unique configurations and case-specific
scenarios inherent in every customer’s unique environment. For solution-specific designs, contact an IBM
storage representative to arrange a discussion with an antivirus implementation specialist.
28. Protecting the IBM SONAS with Symantec AntiVirus for NAS
26
Resources
The following websites provide useful references to supplement the information contained in this paper:
• System Storage on IBM PartnerWorld®
ibm.com/partnerworld/wps/pub/overview/B8S00
• IBM Publications Center
www.elink.ibmlink.ibm.com/public/applications/publications/cgibin/pbi.cgi?CTY=US
• IBM Redbooks®
ibm.com/redbooks
• IBM developerWorks®
ibm.com/developerworks
• IBM SONAS documentation
− IBM Scale Out Network Attached Storage Concepts
http://ibm.com/redbooks/redpieces/abstracts/sg247874.html?Open
− IBM SONAS Introduction and Planning Guide (GA32-0716)
http://publib.boulder.ibm.com/infocenter/sonasic/sonas1ic/topic/com.ibm.sonas.doc/sonas
_ipg.pdf
− IBM SONAS administration and user documentation
http://publib.boulder.ibm.com/infocenter/sonasic/sonas1ic/index.jsp
− IBM Scale Out Network Attached Storage Administrator's Guide (GA32-0713)
http://publib.boulder.ibm.com/infocenter/sonasic/sonas1ic/topic/com.ibm.sonas.doc/sonas
_admin_guide.pdf
− IBM SONAS User's Guide (GA32-0714)
http://publib.boulder.ibm.com/infocenter/sonasic/sonas1ic/topic/com.ibm.sonas.doc/sonas
_user_guide.pdf
− IBM SONAS Software Configuration Guide (GA32-0718)
http://publib.boulder.ibm.com/infocenter/sonasic/sonas1ic/topic/com.ibm.sonas.doc/config
uration_guide.pdf
− IBM SONAS Troubleshooting Guide (GA32-0717)
http://publib.boulder.ibm.com/infocenter/sonasic/sonas1ic/topic/com.ibm.sonas.doc/sonas
_pd_guide.pdf
29. Protecting the IBM SONAS with Symantec AntiVirus for NAS
27
• Symantec Resources
− Symantec AntiVirus for NAS
http://www.symantec.com/business/antivirus-for-network-attached-storage
− Symantec AntiVirus for NAS Support Matrix
http://www.symantec.com/business/support/index?page=content&id=TECH147442
− Symantec AntiVirus for NAS Getting Started Guide
http://www.symantec.com/docs/DOC3402
− Symantec AntiVirus for NAS Integration Guide
http://www.symantec.com/business/support/resources/sites/BUSINESS/content/live/TECH
NICAL_SOLUTION/147000/TECH147442/en_US/SAV_for_NAS_5210.pdf
− Symantec AntiVirus for NAS Implementation Guide
ftp://ftp.symantec.com/public/english_us_canada/products/symantec_antivirus/network_att
ached_storage/5.2/manuals/Implementation_Guide.pdf
− Symantec AntiVirus for NAS with IBM SONAS Configuration Document
http://www.symantec.com/business/support/resources/sites/BUSINESS/content/live/TECH
NICAL_SOLUTION/147000/TECH147442/en_US/IBM%20Scale%20Out%20Network%20
Attached%20Storage.PDF
About the author
Howard Jiang is a Storage Technical Consultant in the IBM SONAS ISV Enablement group. He has more
than 12 years of experience working with various storage and systems technologies. Howard holds a
Bachelor of Science degree in Management Information Systems from the University of Arizona in Tucson,
Arizona. You can reach Howard at hjiang@us.ibm.com.
31. Protecting the IBM SONAS with Symantec AntiVirus for NAS
29
presented here to communicate IBM's current investment and development activities as a good faith effort
to help with our customers' future planning.
Performance is based on measurements and projections using standard IBM benchmarks in a controlled
environment. The actual throughput or performance that any user will experience will vary depending upon
considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the
storage configuration, and the workload processed. Therefore, no assurance can be given that an
individual user will achieve throughput or performance improvements equivalent to the ratios stated here.
Photographs shown are of engineering prototypes. Changes may be incorporated in production models.
Any references in this information to non-IBM websites are provided for convenience only and do not in
any manner serve as an endorsement of those websites. The materials at those websites are not part of
the materials for this IBM product and use of those websites is at your own risk.