Major upgrade! AsiaInfo Security releases the high-performance AE 40G antivirus software, creating the first level of border protection

Major upgrade! AsiaInfo Security releases the high-performance AE 40G antivirus software, creating the first level of border protection

At 2 pm on April 17, AsiaInfo Security's AE V7.0 high-performance antivirus wall was officially released. The upgraded firewall has achieved a high throughput of 40G threat detection, can implement traffic cleaning on the network boundary side, converge the attack surface, effectively respond to special network environments and needs, improve users' operational management efficiency, and create the first line of defense for border threat protection.

Digital transformation, security first

Under the wave of digital economy, enterprises have started digital transformation. With the popularization of cloud, big data, Internet of Things and other technologies in digital transformation, enterprises are more affected by cyber attacks while reducing costs and increasing efficiency. As enterprises are increasingly connected to external systems through the network, data interaction is becoming more efficient, and viruses are mutating faster. Once they break into the enterprise, the consequences will be disastrous. Border security faces three "mountains" on the digital fast track.

High-volume risk. From less than 500 viruses in the world in the 1990s to nearly 20,000 new viruses added each year after 2000, the number of viruses has continued to surge. The total number of malicious samples intercepted by AsiaInfo Security in 2022 will exceed 300 million, with an average of 820,000 interceptions per day. For enterprises, their network boundaries bear 95% of the intrusion defense pressure. As the number continues to increase, the attack situation is becoming more severe.

High-difficulty attack situation. As network attacks on the enterprise border continue to advance, they are becoming more diverse and concealed. Supply chain attacks target open source applications and third-party middleware in business systems, forming a chain of penetration and control that affects upstream and downstream parties; second-dial attacks use the same IP pool as normal users, switch IPs in seconds, and form a large number of low-frequency attacks that are difficult to identify; saturation attacks create millions of false attacks in a short period of time, and virtual and real traffic interferes with audio and video; multi-source attacks are not limited to breakthroughs on the border side, but instead attack from all aspects of the IoT terminal and invade in depth.

High-level business requirements. Business continuity is crucial for the country's critical information infrastructure industry and large government and enterprises, but enterprises are facing dual pressures from both inside and outside. "Defending against external threats", ransomware attacks have undoubtedly become the biggest threat, which can cause serious impacts, leading to business shutdowns and supply interruptions; "Controlling internal threats", a large number of security products are deployed in a chimney-like manner, which will cause jams and delays during business traffic peaks, affecting business continuity and putting pressure on overall security operations.

With the deepening of business digital transformation and changes in IT infrastructure, network boundaries are constantly expanding and blurring. At the same time, with the diversification of network access, enterprise exposure is also increasing. Especially for key industries, the network boundary side faces normalized and massive attack threats, which seriously affects the effective operation of the business.

The traditional firewall-based protection system and protection technology are no longer sustainable and unable to cope with the rich and varied new attack methods. How can network security products meet the changing needs of customers and provide effective threat protection capabilities while constantly adapting to the evolution of new technologies? AsiaInfo Security has provided a feasible solution.

Start from the border to prevent problems before they happen

Provide protection on network nodes, take on larger virus signature library resources, and improve detection efficiency. Based on the pre-threat protection management idea, the antivirus wall, as the first line of defense for border protection, can achieve fast and effective virus protection.

As the industry's first antivirus wall that truly adapts to the 40G network environment , AsiaInfo Security's AE V7.0 40G high-performance antivirus wall is not only a traditional antivirus, but also has its own special mission: to solve the difficulty of protecting against new threats when network bandwidth increases; to solve the gap in high-performance professional antivirus gateway equipment after the popularization of 40G networks.

AsiaInfo Security's AE V7.0 40G high-performance antivirus wall has doubled its performance based on its original powerful defense capabilities. With its technical advantages of high detection, high performance, and high reliability, it has effectively improved the efficiency of border threat management, reduced operating costs, and more effectively guaranteed the continuity of user services , bringing new deployment ideas for border protection in digital environments.

High detection, billion-level virus database + hierarchical and domain management. AE Antivirus integrates the capabilities of the three self-developed scanning engines "Dream Butterfly + Angry Lion + Magic Dragon", vulnerability protection engine and network threat detection engine. Based on a billion-level virus sample library, it covers 100% of the most popular CVE vulnerabilities and popular IOC intelligence in the past five years, with a virus detection rate of 99%; at the same time, it can effectively prevent and block network event intrusion, vulnerability exploitation attacks, brute force cracking, APT attacks such as ransomware, and C&C external connections and other malicious behaviors; in addition, in response to the evolution of complex network architecture, a hierarchical and domain management mechanism is adopted to effectively control the spread of new viruses.

High performance, low latency + low consumption. Xinxiang AE uses independent memory pooling technology and zero-copy technology, combined with hardware feature-oriented tuning, to effectively accelerate the collaboration between the operating system kernel and the business analysis process, maximize the multi-core CPU parallel processing performance, and maximize the use of the CPU for malicious code detection. In addition, based on the plug-in protocol parsing architecture, streaming file restoration engine, and segmented pre-scanning technology, AE can achieve real-time analysis and detection with short time consumption, fast interaction, and high accuracy during network protocol parsing and upper-layer data processing, effectively solving the problem of excessive latency affecting user business efficiency.

High reliability, microsecond-level deployment, and smooth business. Based on an adaptive multi-layer bypass mechanism, AE can maintain smooth network operation in extreme situations such as power outages, equipment anomalies, and business processing program crashes, ensuring that user services are not interrupted to the greatest extent; at the same time, through microsecond-level real-time monitoring, priority scheduling technology, and targeted optimization based on traffic characteristics, it further improves the adaptability of equipment and customer business traffic, ensuring the smoothness and continuity of user services.

Focus on key industries and lead the cybersecurity market

Based on 20 years of technological accumulation in the field of border protection, AsiaInfo Security has created a 40G high-performance antivirus wall; focusing on users' future network changes and business upgrade needs, AsiaInfo Security uses the high-performance technical advantages of 40G to bring real digital improvements to users' border protection efficiency, operating costs, and business continuity. With a 200% increase in threat throughput and up to 95% effective traffic cleaning, it helps users upgrade their security operation efficiency, completes an "exponential" upgrade of network security, and builds the first barrier of border threat protection.

At present, AsiaInfo Security's AE anti-virus wall comprehensively covers the border Internet exit, DMZ exit, data center exit, and between branches and headquarters. It can efficiently link advanced threat detection products with terminal security products to form in-depth threat management capabilities, improve security operation efficiency, and reduce labor costs. At the same time, AE's core capabilities against stubborn threats such as ransomware and mining have made it successfully applied in key industries such as electricity, energy, and finance.

The challenges of digital transformation are constantly increasing, and AsiaInfo Security has not stopped innovating. Looking to the future, I believe that AsiaInfo Security will continue to innovate in technology and provide a variety of security products and services that meet the demands of enterprises for digital transformation.

<<:  Smart Encyclopedia | Why are optical cables better than copper cables?

>>:  How does network monitoring work?

Blog    

Recommend

How remote work is changing the future of network management

During the COVID-19 pandemic, businesses have und...

Remember 3 parts, 2 addresses, and 1 formula, and you can easily divide subnets

Overview Subnetting is a basic skill that any net...

Ten major challenges facing 5G network technology

[[312884]] On January 9, 2020, China released the...

Don't use WiFi randomly, be careful with the bank card bound to your phone

Many people have Wi-Fi installed at home. However...