Feeds

ABIT puts security on the motherboard

Taking on NITROX

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

ABIT today launched server motherboards featuring integrated security processors, with a promise to slash the cost of building security appliances.

The Taiwanese manufacturer's SI-1N Pentium 4 processor-based server motherboard comes with Cavium Network's NITROX Security Macro Processor, designed to gear their deployment towards security applications, such as VPN gateways, Integrated Firewall/ VPNs, SSL Webservers, and SSL VPNs. It hopes to sell these security-enhanced motherboards to security appliance OEMs.

Syed Ali, president and chief executive of Cavium Networks, told us integrating its programmable network processors rather than using add-on boards or running security software on standard servers can reduce product cost for OEMs while increasing performance and flexibility.

Quite how much this will result in lowered costs to end-users is so far unclear but Cavium reckons adding security processors only increases mobo manufacturing prices by around 10 per cent, so the savings could be very substantial.

Cavium's NITROX processor family can switch between IPsec, SSL processing (key for the deployment of increasing popular SSL-based VPNs fro the likes of Aventail) or handle both protocols at the same time with a simple software change.

According to Cavium, the NITROX Lite CN1005 processor integrated onto ABIT's SI-1N server motherboard can process up to 400Mbps of IPsec traffic or 3,500 RSA operations per second.

In a statement, ABIT said it believed over time security will become a standard feature in server motherboards for PC based security appliances.

ABIT's product plans include multi-processor server motherboards with multiple Gigabit Ethernet controllers and Cavium's NITROX CN1120 processor. The NITROX CN1120 can process up to 1Gbps of IPsec traffic or 14,000 RSA operations per second.

Silicon-valley start up Cavium, whose clients include Array Networks as well as ASUS, competes with the likes of Broadcom and Hifn in the growing security co-processor market. ®

Bootnote

In diver parlance, Nitrox is a mixture of nitrogen and oxygen with a higher percentage of Oxygen than found in atmospheric air. It's not the same as the compound Nitrous Oxide (aka laughing gas).

Divers use Nitrox mixes in preference to compressed air because it helps prevent nitrogen narcosis, the dangerous intoxicated condition caused when nitrogen dissolves in the blood.

Another advantage of high-O2 Nitrox mixes is reduced susceptibility to decompression sickness (the bends) due to a lower level of nitrogen absorbed during a dive.

As readers point out, Oxygen itself becomes toxic at higher partial pressures hence divers use helium oxygen mixes at greater depths.

Related Stories

Broadcom preps networking crypto acceleration
Transmeta builds crypto into Crusoe
Intel touts security on a chip
Who's doing what with enhanced Intel PIIIs
Meet the one shop stop security appliance

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.