• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Broadcom Delivers Quantum Resistant Network Encryption for Real-time Ransomware Detection

Nomad76

News Editor
Staff member
Joined
May 21, 2024
Messages
862 (3.38/day)
Broadcom Inc. today announced an industry-first—the new, innovative Emulex Secure Fiber Channel Host Bus Adapters (HBA)—a cost-effective, easy-to-manage solution that encrypts all data as it moves between servers and storage.

Encrypting mission-critical data is no longer a nice-to-have, but a must-have. The cost of ransomware attacks continues to rise with attacks in 2024 costing USD $5.37 million on average per attack. Upcoming generative AI and quantum computers magnify the risk if data is not encrypted at all points in the data center including the network.



To address these cybersecurity issues, governments have responded with mandates, including the United States' Commercial National Security Algorithm (CNSA) 2.0, the European Union's Network and Information Security (NIS) 2, Digital Operational Resilience Act (DORA) and more that require enterprises to modernize their IT infrastructures with post-quantum cryptographic encryption algorithms and zero trust architecture.

Today, data centers have the option of deploying application encryption or network encryption to protect their data. Network encryption offers several important advantages versus application-based encryption including preserving storage array services such as dedupe and compression, which is destroyed when using application-based encryption. Network encryption also enables real-time ransomware detection while application-based encryption hides ransomware attacks. Additional highlights of this solution include no encryption performance penalty and simple, session-based key management.

"Customers are seeking ways to protect themselves against crippling and expensive ransomware attacks as well as complying with new government regulations mandating all data be encrypted," said Jeff Hoogenboom, vice president and general manager, Emulex Connectivity Division, Broadcom. "The Emulex Secure Host Bus Adapter meets these needs by providing an elegantly simple solution that once installed, encrypts all data across all applications."

"As enterprises face an ever-growing wave of cybersecurity threats, the Emulex Secure HBA stands out as a simple drop-in solution that enhances SAN security without compromising performance," said Brian Beeler, president, StorageReview.com. "In our testing, we found these HBAs excelled at securing in-flight SAN data encryption while seamlessly complementing existing security technologies. We're excited to see these adapters become a standard layer of improved SAN security in 2025, providing enterprises with an essential tool to safeguard their critical data."

Emulex Secure HBAs Feature:
  • Security Built on Zero Trust, Post-Quantum Cryptography
  • Encryption algorithms support CNSA 2.0, DORA and NIS 2 mandates.
  • Secures data in-flight between host servers and storage arrays.
  • Zero Trust platform with Security Protocol and Data Model (SPDM) cryptographic authentication of endpoints, and silicon root-of-trust authentication.
  • Compliance with the NIST 800-193 framework—secure boot, digitally signed drivers, T10-DIF, and more.
  • Cost-effective encryption: Dedupe/compression storage services remain intact; protects all data across all applications versus application-specific solutions.
  • Runs on existing Fiber Channel infrastructure.
  • Maximum application performance: Cryptography offloaded to hardware, providing encryption with no performance impact.
  • Easy to manage and deploy: Simple session-based key management with on-demand key generation; transparent runs with existing operating systems, applications and SAN management tools.
Emulex 32G and 64G Secure HBAs are available in 1, 2, and 4 port configurations and are shipping now.



View at TechPowerUp Main Site | Source
 
Joined
Jun 29, 2018
Messages
555 (0.23/day)
Network encryption also enables real-time ransomware detection while application-based encryption hides ransomware attacks.
Total network encryption also includes ransomware traffic. What mechanism is used to achieve this detection, and where is it running?
 

Nomad76

News Editor
Staff member
Joined
May 21, 2024
Messages
862 (3.38/day)
Total network encryption also includes ransomware traffic. What mechanism is used to achieve this detection, and where is it running?
"Emulex HBAs process all encrypted data in-flight (EDIF) in hardware. The HBAs have 8-core SoCs, which manage the workload and direct the data packets through the encryption offload engine. Since the encryption is offloaded, the host CPU is unaffected by those encryption operations."

2.png

1.png


More technical details and benchmarks here https://docs.broadcom.com/doc/storagereview-emulex-secure-fc-hba
 
Joined
Jun 29, 2018
Messages
555 (0.23/day)
"Emulex HBAs process all encrypted data in-flight (EDIF) in hardware. The HBAs have 8-core SoCs, which manage the workload and direct the data packets through the encryption offload engine. Since the encryption is offloaded, the host CPU is unaffected by those encryption operations."

[...]

More technical details and benchmarks here https://docs.broadcom.com/doc/storagereview-emulex-secure-fc-hba
This doesn't answer my question since the document deals exclusively with encryption, and that part I understand. I wish to know how they detect ransomware in encrypted (or even not encrypted) networks.
 
Joined
May 13, 2024
Messages
31 (0.12/day)
Processor Ryzen 7 5800X3D
Motherboard MSI Pro B550M-VC Wifi
Cooling Thermalright Peerless Assassin 120 SE
Memory 2x16GB G.Skill RipJaws DDR4-3600 CL16
Video Card(s) Asus DUAL OC RTX 4070 Super
Storage 4TB NVME, 2TB SATA SSD, 4TB SATA HDD
Display(s) Dell S2722DGM 27" Curved VA 1440p 165hz
Case Fractal Design Pop Air MIni
Power Supply Corsair RMe 750W 80+ Gold
Mouse Logitech G502 Hero
Keyboard GMMK TKL RGB Black
VR HMD Oculus Quest 2
Broadcom delivers new fiber cards with 10x more buzzwords and 80% more calls to your rep for help when it breaks your network.
 
Joined
Jun 29, 2018
Messages
555 (0.23/day)
Quantum resistant?

Hos can this even be tested?
It can't. This is based on the so-called post-quantum algorithms not being vulnerable to Shor's algorithm or other (known) quantum algorithms. Mind you we're not able to actually run Shor's on any usable numbers despite all the quantum hype.
 
Joined
May 13, 2010
Messages
6,109 (1.14/day)
System Name RemixedBeast-NX
Processor Intel Xeon E5-2690 @ 2.9Ghz (8C/16T)
Motherboard Dell Inc. 08HPGT (CPU 1)
Cooling Dell Standard
Memory 24GB ECC
Video Card(s) Gigabyte Nvidia RTX2060 6GB
Storage 2TB Samsung 860 EVO SSD//2TB WD Black HDD
Display(s) Samsung SyncMaster P2350 23in @ 1920x1080 + Dell E2013H 20 in @1600x900
Case Dell Precision T3600 Chassis
Audio Device(s) Beyerdynamic DT770 Pro 80 // Fiio E7 Amp/DAC
Power Supply 630w Dell T3600 PSU
Mouse Logitech G700s/G502
Keyboard Logitech K740
VR HMD Linktr.ee/remixedcat // for my music ♡♡
Software Linux Mint 20
Benchmark Scores Network: APs: Ubiquiti Unifi AP-AC-LR and Lite Router/Sw:Meraki MX64 MS220-8P
I don't want broadcom anywhere near AI or quantum anything
 
Top