SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Published on Your Electronics Open Source (http://dev.emcelettronica.com)


Home > My blog > Contenuti




Accelerated Antivirus Solution Platform from
Freescale & Kaspersky
By Ionela
Created Apr 7 2009 - 07:40


Accelerated AV (Accelerated Antivirus) is a high-performance network antivirus solution platform offered
by Freescale Semiconductor and Kaspersky Lab to OEM vendors. Accelerated Antivirus is based on
Freescale's MPC8572E PowerQUICC III processor [1] built on Power Architecture technology and
Kaspersky's SafeStream signatures database.

[If you want to know more about this Freescale product, please submit your request to Arrow Italy using
this form [2] (this form is valid ONLY for Companies or Customers based in Italy and working in the Italian
area)]

The platform enables the rapid development of competitive, high-performance, cost-effective network AV
devices that are highly effective in the mitigation of the impact of dangerous and widespread malware
(viruses, worms and trojans) and malware outbreaks.

Network Antivirus Landscape and Trends
The damage caused by computer malware is very significant. Today, most computers in enterprises are
protected by antivirus software to minimize the damage potentially caused by malicious programs. The
graph illustrates the speed of infection of major malware outbreaks in recent years.
Unfortunately, it may take days, if not weeks, to apply software patches and malware signature updates to
all PCs and servers in a large enterprise to defend against a new malware. A network-based solution is
inherently more effective than a host-based solution to control malware propagation?applying updates to
the much fewer number of network AV devices takes less time (and consumes less network bandwidth). A
suitably positioned network-based AV device stops malware before it gets to the host computers. Most
enterprises are therefore using network-based AV solutions to mitigate the impact of malware outbreaks to
complement a host-based AV solution for in-depth defense.

Traditional network AV is proxy based. In a typical deployment scenario, the mail relay receives the
complete e-mail, invokes the antivirus function and forwards the e-mail on to the mail server if it is checked
out to be clean. This is a store-and-forward operation. Real time is not a primary concern. Only e-mail
traffic?a fraction of the total traffic going into or out of the enterprise network?goes through the mail relay. If
there is a delay of a few seconds or even a few minutes, the end-user does not notice.

Traditional Network AV Deployment




Design Challenges
OEM vendors are faced with a number of design challenges in order to develop and support an effective
product to win in the network-based antivirus marketplace. These include:

        ? Cost effectiveness
        ? High performance
        ? Guaranteed, continual, timely availability of accurate malware signatures coupled with fast, in-
        service, incremental updates of signatures
        ? High accuracy

To compete successfully in the market, the network AV device has to be cost effective. A device built from
several discrete processors and hardware components may achieve the performance and accuracy
required, but the bill of materials and development costs will likely become too high for the marketplace.


Accelerated AV Solution Platform

The solution platform consists of components from Freescale and Kaspersky.
Freescale Components

       ? MPC8572E PowerQUICC III processor [3] with integrated pattern matcher
       ? Associated software
       ? Associated documentation

Software includes drivers and board support packages that are typical of Freescale processors. In addition,
specific to the MPC8572E and other future processors with a built-in Pattern Matcher, it also includes
Pattern Matcher-specific software for Linux:

       ? Pattern management software:
              o RegEx compiler
              o Stateful rule compiler
              o Linker loader
              o Sample Pattern Matcher management application

       ? Pattern Matcher driver
       ? Sample Pattern Matcher data scan application


With these, the OEM will be able to develop its product hardware and software.

Kaspersky Components
The solution platform components available through Kaspersky are:

       ? Kaspersky SafeStream signatures database in binary Freescale Pattern Matcher format
       ? Regular daily updates and urgent (in case of malware outbreaks) updates of Kaspersky
       SafeStream
       signatures database, also in binary Freescale Pattern Matcher format

In other words, before delivery to the OEM, native Kaspersky SafeStream signatures are:

       ? Pre-converted to Freescale format
       ? Pre-compiled to Freescale binary format
       ? Verified to work with Freescale's Pattern Matcher

OEM Responsibility
It is the responsibility of the OEM to develop the following:

       ? Proprietary system hardware powered by the MPC8572E PowerQUICC III
       ? Proprietary management and scanning software utilizing the Pattern Matcher
       ? Mechanism to deliver the signatures in Freescale binary format to its customers, who will link and
       load the signatures into the network AV device. It is the OEM's choice whether to incorporate the
       linking and loading of signatures into its security policy management framework.

The OEM may choose to use products and services from other ODMs to develop the complete solution.


Designing Network-Based AV with the Accelerated AV Platform

In order to understand what an ideal network AV platform looks like, let's examine the key operations
performed in a typical network AV device. Note that while SMTP is used in the example, other application
protocols carrying the file/object to be inspected are also applicable. The Accelerated AV solution is
independent of the application protocol.




The key data path operations in a typical network AV device are as follows:

        ? Allow traffic not of interest to flow through transparently
        ? Reassemble (with or without transparent TCP termination) traffic of interest?SMTP is used in the
        above diagram, but other traffic such as HTTP and FTP are also applicable
        ? Observe end-to-end SMTP protocol exchange and capture e-mails on the fly
        ? MIME decode, separate e-mail into component parts, e. g. attachments
        ? Additional unpacking/decompression (for example, unzipping) processing of message

Read the Italian version: Piattaforma Accelerated Antivirus da Freescale & Kaspersky [4]

CONTACT REQUEST
If you want to know more about this Freescale product, please submit your request to Arrow Italy using
this form [2].

NOTE: this form is valid ONLY for Companies or Customers based in Italy and working in the Italian area.

                                                                                     Technology antivirus solution

                                                   Trademarks


Source URL: http://dev.emcelettronica.com/accelerated-antivirus-solution-platform-freescale-kaspersky

Links:
[1] http://www.freescale.com/webapp/sps/site/overview.jsp?code=DRPQMPC8572RSC&fsrch=1
[2] http://it.emcelettronica.com/contact/freescale
[3] http://www.freescale.com/webapp/sps/site/prod_summary.jsp?code=MPC8572E&fsrch=1
[4] http://it.emcelettronica.com/piattaforma-accelerated-antivirus-da-freescale-kaspersky

Más contenido relacionado

Destacado

Addressing structural barriers to care for key populations: access, stigma, a...
Addressing structural barriers to care for key populations: access, stigma, a...Addressing structural barriers to care for key populations: access, stigma, a...
Addressing structural barriers to care for key populations: access, stigma, a...LINKAGES
 
Concurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud DatabasesConcurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud DatabasesEditor IJMTER
 
Rise of big business 1860 1900
Rise of big business 1860 1900Rise of big business 1860 1900
Rise of big business 1860 1900Fredrick Smith
 
Successfully Extending Your Brand
Successfully Extending Your BrandSuccessfully Extending Your Brand
Successfully Extending Your BrandFullSurge
 
信息系统架构设计
信息系统架构设计信息系统架构设计
信息系统架构设计Weijun Zhong
 
Michael_T7
Michael_T7Michael_T7
Michael_T7Comm202
 

Destacado (9)

tarea sobre la educacion
tarea sobre la educacion tarea sobre la educacion
tarea sobre la educacion
 
alphabet
alphabet alphabet
alphabet
 
Addressing structural barriers to care for key populations: access, stigma, a...
Addressing structural barriers to care for key populations: access, stigma, a...Addressing structural barriers to care for key populations: access, stigma, a...
Addressing structural barriers to care for key populations: access, stigma, a...
 
Concurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud DatabasesConcurrent And Independent Access To Encrypted Cloud Databases
Concurrent And Independent Access To Encrypted Cloud Databases
 
Rise of big business 1860 1900
Rise of big business 1860 1900Rise of big business 1860 1900
Rise of big business 1860 1900
 
Successfully Extending Your Brand
Successfully Extending Your BrandSuccessfully Extending Your Brand
Successfully Extending Your Brand
 
信息系统架构设计
信息系统架构设计信息系统架构设计
信息系统架构设计
 
Michael_T7
Michael_T7Michael_T7
Michael_T7
 
Servicio de Recolocación. Cámara de Comercio de Castellón
Servicio de Recolocación. Cámara de Comercio de CastellónServicio de Recolocación. Cámara de Comercio de Castellón
Servicio de Recolocación. Cámara de Comercio de Castellón
 

Más de Ionela

IoT with OpenPicus Flyport
IoT with OpenPicus FlyportIoT with OpenPicus Flyport
IoT with OpenPicus FlyportIonela
 
Flyport wifi webserver configuration page
Flyport wifi webserver configuration pageFlyport wifi webserver configuration page
Flyport wifi webserver configuration pageIonela
 
openPicus Proto Nest Datasheet
openPicus Proto Nest DatasheetopenPicus Proto Nest Datasheet
openPicus Proto Nest DatasheetIonela
 
How to Integrate Internet of Things with Webserver with
How to Integrate Internet of Things with Webserver with How to Integrate Internet of Things with Webserver with
How to Integrate Internet of Things with Webserver with Ionela
 
Openpicus Flyport interfaces the cloud services
Openpicus Flyport interfaces the cloud servicesOpenpicus Flyport interfaces the cloud services
Openpicus Flyport interfaces the cloud servicesIonela
 
Flyport openPicus datasheet
Flyport openPicus datasheetFlyport openPicus datasheet
Flyport openPicus datasheetIonela
 
Windows phone 7 è l’ultima occasione di microsoft 2010-10-18
Windows phone 7 è l’ultima occasione di microsoft   2010-10-18Windows phone 7 è l’ultima occasione di microsoft   2010-10-18
Windows phone 7 è l’ultima occasione di microsoft 2010-10-18Ionela
 
Videocamera cam ball un mare di caratteristiche nella piccola videocamera a ...
Videocamera cam ball  un mare di caratteristiche nella piccola videocamera a ...Videocamera cam ball  un mare di caratteristiche nella piccola videocamera a ...
Videocamera cam ball un mare di caratteristiche nella piccola videocamera a ...Ionela
 
Utente premium 2010-10-17
Utente premium   2010-10-17Utente premium   2010-10-17
Utente premium 2010-10-17Ionela
 
Unity sostituisce gnome su ubuntu 11.04 2010-11-01
Unity sostituisce gnome su ubuntu 11.04   2010-11-01Unity sostituisce gnome su ubuntu 11.04   2010-11-01
Unity sostituisce gnome su ubuntu 11.04 2010-11-01Ionela
 
Una retina artificiale per ridare la vista 2010-11-10
Una retina artificiale per ridare la vista   2010-11-10Una retina artificiale per ridare la vista   2010-11-10
Una retina artificiale per ridare la vista 2010-11-10Ionela
 
Un orologio elettronico completo basato su i2 c rtcc mcp79410 2010-10-29
Un orologio elettronico completo basato su i2 c rtcc mcp79410   2010-10-29Un orologio elettronico completo basato su i2 c rtcc mcp79410   2010-10-29
Un orologio elettronico completo basato su i2 c rtcc mcp79410 2010-10-29Ionela
 
Ultimo lancio discovery delle perdite rinviano l’ultimo lancio dello shuttle...
Ultimo lancio discovery  delle perdite rinviano l’ultimo lancio dello shuttle...Ultimo lancio discovery  delle perdite rinviano l’ultimo lancio dello shuttle...
Ultimo lancio discovery delle perdite rinviano l’ultimo lancio dello shuttle...Ionela
 
Ubuntu passa a wayland 2010-11-08
Ubuntu passa a wayland   2010-11-08Ubuntu passa a wayland   2010-11-08
Ubuntu passa a wayland 2010-11-08Ionela
 
Touchatag un'applicazione di internet delle cose 2010-11-10
Touchatag  un'applicazione di internet delle cose   2010-11-10Touchatag  un'applicazione di internet delle cose   2010-11-10
Touchatag un'applicazione di internet delle cose 2010-11-10Ionela
 
Tianhe 1, il supercomputer cinese - 2010-11-05
Tianhe 1, il supercomputer cinese - 2010-11-05Tianhe 1, il supercomputer cinese - 2010-11-05
Tianhe 1, il supercomputer cinese - 2010-11-05Ionela
 
Thread o processo quale usare - 2010-11-02
Thread o processo  quale usare  - 2010-11-02Thread o processo  quale usare  - 2010-11-02
Thread o processo quale usare - 2010-11-02Ionela
 
Termometro digitale usando pic16 f84a schema elettrico - 2010-11-03
Termometro digitale usando pic16 f84a   schema elettrico - 2010-11-03Termometro digitale usando pic16 f84a   schema elettrico - 2010-11-03
Termometro digitale usando pic16 f84a schema elettrico - 2010-11-03Ionela
 
Telescopio webb il sistema di engineering del telescopio webb della nasa si ...
Telescopio webb  il sistema di engineering del telescopio webb della nasa si ...Telescopio webb  il sistema di engineering del telescopio webb della nasa si ...
Telescopio webb il sistema di engineering del telescopio webb della nasa si ...Ionela
 
Tecnologia light peak intel potrebbe adottarla da inizio 2011, apple a segui...
Tecnologia light peak  intel potrebbe adottarla da inizio 2011, apple a segui...Tecnologia light peak  intel potrebbe adottarla da inizio 2011, apple a segui...
Tecnologia light peak intel potrebbe adottarla da inizio 2011, apple a segui...Ionela
 

Más de Ionela (20)

IoT with OpenPicus Flyport
IoT with OpenPicus FlyportIoT with OpenPicus Flyport
IoT with OpenPicus Flyport
 
Flyport wifi webserver configuration page
Flyport wifi webserver configuration pageFlyport wifi webserver configuration page
Flyport wifi webserver configuration page
 
openPicus Proto Nest Datasheet
openPicus Proto Nest DatasheetopenPicus Proto Nest Datasheet
openPicus Proto Nest Datasheet
 
How to Integrate Internet of Things with Webserver with
How to Integrate Internet of Things with Webserver with How to Integrate Internet of Things with Webserver with
How to Integrate Internet of Things with Webserver with
 
Openpicus Flyport interfaces the cloud services
Openpicus Flyport interfaces the cloud servicesOpenpicus Flyport interfaces the cloud services
Openpicus Flyport interfaces the cloud services
 
Flyport openPicus datasheet
Flyport openPicus datasheetFlyport openPicus datasheet
Flyport openPicus datasheet
 
Windows phone 7 è l’ultima occasione di microsoft 2010-10-18
Windows phone 7 è l’ultima occasione di microsoft   2010-10-18Windows phone 7 è l’ultima occasione di microsoft   2010-10-18
Windows phone 7 è l’ultima occasione di microsoft 2010-10-18
 
Videocamera cam ball un mare di caratteristiche nella piccola videocamera a ...
Videocamera cam ball  un mare di caratteristiche nella piccola videocamera a ...Videocamera cam ball  un mare di caratteristiche nella piccola videocamera a ...
Videocamera cam ball un mare di caratteristiche nella piccola videocamera a ...
 
Utente premium 2010-10-17
Utente premium   2010-10-17Utente premium   2010-10-17
Utente premium 2010-10-17
 
Unity sostituisce gnome su ubuntu 11.04 2010-11-01
Unity sostituisce gnome su ubuntu 11.04   2010-11-01Unity sostituisce gnome su ubuntu 11.04   2010-11-01
Unity sostituisce gnome su ubuntu 11.04 2010-11-01
 
Una retina artificiale per ridare la vista 2010-11-10
Una retina artificiale per ridare la vista   2010-11-10Una retina artificiale per ridare la vista   2010-11-10
Una retina artificiale per ridare la vista 2010-11-10
 
Un orologio elettronico completo basato su i2 c rtcc mcp79410 2010-10-29
Un orologio elettronico completo basato su i2 c rtcc mcp79410   2010-10-29Un orologio elettronico completo basato su i2 c rtcc mcp79410   2010-10-29
Un orologio elettronico completo basato su i2 c rtcc mcp79410 2010-10-29
 
Ultimo lancio discovery delle perdite rinviano l’ultimo lancio dello shuttle...
Ultimo lancio discovery  delle perdite rinviano l’ultimo lancio dello shuttle...Ultimo lancio discovery  delle perdite rinviano l’ultimo lancio dello shuttle...
Ultimo lancio discovery delle perdite rinviano l’ultimo lancio dello shuttle...
 
Ubuntu passa a wayland 2010-11-08
Ubuntu passa a wayland   2010-11-08Ubuntu passa a wayland   2010-11-08
Ubuntu passa a wayland 2010-11-08
 
Touchatag un'applicazione di internet delle cose 2010-11-10
Touchatag  un'applicazione di internet delle cose   2010-11-10Touchatag  un'applicazione di internet delle cose   2010-11-10
Touchatag un'applicazione di internet delle cose 2010-11-10
 
Tianhe 1, il supercomputer cinese - 2010-11-05
Tianhe 1, il supercomputer cinese - 2010-11-05Tianhe 1, il supercomputer cinese - 2010-11-05
Tianhe 1, il supercomputer cinese - 2010-11-05
 
Thread o processo quale usare - 2010-11-02
Thread o processo  quale usare  - 2010-11-02Thread o processo  quale usare  - 2010-11-02
Thread o processo quale usare - 2010-11-02
 
Termometro digitale usando pic16 f84a schema elettrico - 2010-11-03
Termometro digitale usando pic16 f84a   schema elettrico - 2010-11-03Termometro digitale usando pic16 f84a   schema elettrico - 2010-11-03
Termometro digitale usando pic16 f84a schema elettrico - 2010-11-03
 
Telescopio webb il sistema di engineering del telescopio webb della nasa si ...
Telescopio webb  il sistema di engineering del telescopio webb della nasa si ...Telescopio webb  il sistema di engineering del telescopio webb della nasa si ...
Telescopio webb il sistema di engineering del telescopio webb della nasa si ...
 
Tecnologia light peak intel potrebbe adottarla da inizio 2011, apple a segui...
Tecnologia light peak  intel potrebbe adottarla da inizio 2011, apple a segui...Tecnologia light peak  intel potrebbe adottarla da inizio 2011, apple a segui...
Tecnologia light peak intel potrebbe adottarla da inizio 2011, apple a segui...
 

Último

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Último (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Accelerated Antivirus Solution Platform From Freescale & Kaspersky

  • 1. Published on Your Electronics Open Source (http://dev.emcelettronica.com) Home > My blog > Contenuti Accelerated Antivirus Solution Platform from Freescale & Kaspersky By Ionela Created Apr 7 2009 - 07:40 Accelerated AV (Accelerated Antivirus) is a high-performance network antivirus solution platform offered by Freescale Semiconductor and Kaspersky Lab to OEM vendors. Accelerated Antivirus is based on Freescale's MPC8572E PowerQUICC III processor [1] built on Power Architecture technology and Kaspersky's SafeStream signatures database. [If you want to know more about this Freescale product, please submit your request to Arrow Italy using this form [2] (this form is valid ONLY for Companies or Customers based in Italy and working in the Italian area)] The platform enables the rapid development of competitive, high-performance, cost-effective network AV devices that are highly effective in the mitigation of the impact of dangerous and widespread malware (viruses, worms and trojans) and malware outbreaks. Network Antivirus Landscape and Trends The damage caused by computer malware is very significant. Today, most computers in enterprises are protected by antivirus software to minimize the damage potentially caused by malicious programs. The graph illustrates the speed of infection of major malware outbreaks in recent years.
  • 2. Unfortunately, it may take days, if not weeks, to apply software patches and malware signature updates to all PCs and servers in a large enterprise to defend against a new malware. A network-based solution is inherently more effective than a host-based solution to control malware propagation?applying updates to the much fewer number of network AV devices takes less time (and consumes less network bandwidth). A suitably positioned network-based AV device stops malware before it gets to the host computers. Most enterprises are therefore using network-based AV solutions to mitigate the impact of malware outbreaks to complement a host-based AV solution for in-depth defense. Traditional network AV is proxy based. In a typical deployment scenario, the mail relay receives the complete e-mail, invokes the antivirus function and forwards the e-mail on to the mail server if it is checked out to be clean. This is a store-and-forward operation. Real time is not a primary concern. Only e-mail traffic?a fraction of the total traffic going into or out of the enterprise network?goes through the mail relay. If there is a delay of a few seconds or even a few minutes, the end-user does not notice. Traditional Network AV Deployment Design Challenges OEM vendors are faced with a number of design challenges in order to develop and support an effective product to win in the network-based antivirus marketplace. These include: ? Cost effectiveness ? High performance ? Guaranteed, continual, timely availability of accurate malware signatures coupled with fast, in- service, incremental updates of signatures ? High accuracy To compete successfully in the market, the network AV device has to be cost effective. A device built from several discrete processors and hardware components may achieve the performance and accuracy required, but the bill of materials and development costs will likely become too high for the marketplace. Accelerated AV Solution Platform The solution platform consists of components from Freescale and Kaspersky.
  • 3. Freescale Components ? MPC8572E PowerQUICC III processor [3] with integrated pattern matcher ? Associated software ? Associated documentation Software includes drivers and board support packages that are typical of Freescale processors. In addition, specific to the MPC8572E and other future processors with a built-in Pattern Matcher, it also includes Pattern Matcher-specific software for Linux: ? Pattern management software: o RegEx compiler o Stateful rule compiler o Linker loader o Sample Pattern Matcher management application ? Pattern Matcher driver ? Sample Pattern Matcher data scan application With these, the OEM will be able to develop its product hardware and software. Kaspersky Components The solution platform components available through Kaspersky are: ? Kaspersky SafeStream signatures database in binary Freescale Pattern Matcher format ? Regular daily updates and urgent (in case of malware outbreaks) updates of Kaspersky SafeStream signatures database, also in binary Freescale Pattern Matcher format In other words, before delivery to the OEM, native Kaspersky SafeStream signatures are: ? Pre-converted to Freescale format ? Pre-compiled to Freescale binary format ? Verified to work with Freescale's Pattern Matcher OEM Responsibility It is the responsibility of the OEM to develop the following: ? Proprietary system hardware powered by the MPC8572E PowerQUICC III ? Proprietary management and scanning software utilizing the Pattern Matcher ? Mechanism to deliver the signatures in Freescale binary format to its customers, who will link and load the signatures into the network AV device. It is the OEM's choice whether to incorporate the linking and loading of signatures into its security policy management framework. The OEM may choose to use products and services from other ODMs to develop the complete solution. Designing Network-Based AV with the Accelerated AV Platform In order to understand what an ideal network AV platform looks like, let's examine the key operations performed in a typical network AV device. Note that while SMTP is used in the example, other application
  • 4. protocols carrying the file/object to be inspected are also applicable. The Accelerated AV solution is independent of the application protocol. The key data path operations in a typical network AV device are as follows: ? Allow traffic not of interest to flow through transparently ? Reassemble (with or without transparent TCP termination) traffic of interest?SMTP is used in the above diagram, but other traffic such as HTTP and FTP are also applicable ? Observe end-to-end SMTP protocol exchange and capture e-mails on the fly ? MIME decode, separate e-mail into component parts, e. g. attachments ? Additional unpacking/decompression (for example, unzipping) processing of message Read the Italian version: Piattaforma Accelerated Antivirus da Freescale & Kaspersky [4] CONTACT REQUEST If you want to know more about this Freescale product, please submit your request to Arrow Italy using this form [2]. NOTE: this form is valid ONLY for Companies or Customers based in Italy and working in the Italian area. Technology antivirus solution Trademarks Source URL: http://dev.emcelettronica.com/accelerated-antivirus-solution-platform-freescale-kaspersky Links: [1] http://www.freescale.com/webapp/sps/site/overview.jsp?code=DRPQMPC8572RSC&fsrch=1 [2] http://it.emcelettronica.com/contact/freescale [3] http://www.freescale.com/webapp/sps/site/prod_summary.jsp?code=MPC8572E&fsrch=1 [4] http://it.emcelettronica.com/piattaforma-accelerated-antivirus-da-freescale-kaspersky