The Advantages of a Multi-core Architecture in Network Security Appliances
Network security has become increasingly complex. Network communications no longer rely simply on store-and-forward applications like email, but have expanded to include real-time collaboration tools, Web 2.0 applications, Instant Messenger (IM) and peer-to-peer applications, Voice over IP (VoIP), streaming media and telepresence conferencing, each presenting conduits for potential attack. The complexity of securing today's networks demands a Unified Threat Management (UTM) approach. To be truly effective, UTM requires Deep Packet Inspection (DPI) in real time. Sophisticated malicious attacks can penetrate traditional stateful packet inspection products. To maintain acceptable network performance, traditional solutions focus on scanning only the packet headers, missing threats hidden within the data portion of packets.