SSH ANNOUNCES INTERNET SECURITY SOLUTION OPTIMIZED FOR NETWORK EDGE
AND NETWORK ACCESS DEVICES
SUPERCOMM- Atlanta - June 04, 2002 - SSH Communications Security
(HEX:SSH1V), a world-leading developer of Internet security
solutions, today announced the industry´s first integrated VPN &
firewall security toolkit optimized for network edge and network
access devices, the SSH QuickSec(TM) Toolkit for Access Networks.
The SSH QuickSec Toolkit for Access Networks, designed with embedded
devices´ special requirements in mind, supports market leading
embedded operating systems and is readily portable to others,
allowing fast and easy implementation and integration to secure both
wireline and wireless IP based communication.
Building on the proven strength and reliability of SSH´s
industry-leading IPSec technologies that have led the industry since
1998, the new SSH QuickSec Toolkit for Access Networks is a complete
solution to meet all the security needs found in today´s access and
edge network devices. It includes full IPSec based VPN functionality,
an integrated stateful inspection firewall with support for multiple
Application Level Gateways, dynamic addressing & configuration,
integration to existing AAA (Authorization Authentication Accounting)
infrastructures. To ensure easy integration into robust network
environments, it also includes support for legacy tunneling
technologies such as L2TP (Layer Two Tunneling Protocol) and NAT
(Network Address Translation). It is the industry´s only toolkit to
include NAT Traversal, which is essential for full end-to-end network
security in real world network environment. NAT Traversal is the IETF
endorsed method SSH pioneered for overcoming IPSec and NAT
compatibility problems.
Developer Friendly
SSH QuickSec Toolkits have been designed to be developer friendly;
the code is compact and portable to a number of key RTOS (Real Time
Operating System) and hardware environments. Embedded systems
typically set hard constraints for memory usage. SSH QuickSec Toolkit
minimizes the amount of dynamic, runtime memory allocations and
allows developers to fully parameterize the system for different
usage patterns. Specific offloading APIs are also included to allow
engineers to take full advantage of cryptographic coprocessors and
Network Processing Unit (NPU) hardware when available.
Lesen Sie auch
"As one of the earliest innovators and leaders in developing IPSec
based VPN technologies for OEMs and ISVs, we have seen organizations
across all industries adopt IPSec-based security technologies to meet
their communication security needs, " said George Adams, president and