As an in-line network security gateway, network throughput and latency is very important. Our BlackRidge TAC Gateway authenticates and network sessions at the earliest possible time, on the first packet, and applies security policy. You know this. We’ve been talking about it for years. And if you have joined us late, we’ll be happy to tell you all about it.
What we do want to tell you here is that we achieved a major milestone in validating that our Transport Access Control (TAC) technology provides high network throughput and low latency network security. We recently announced the success of our 100G TAC Gateway demonstration done in in an independent, third party lab, the Continuous Transformation Environment (CTE) Lab at the Quality Technical Services (QTS) facility in Sandston, VA. This demonstration was externally monitored by QTS and i2 Sentinel Associates.
The demonstration showed the 100G TAC Gateway’s high throughput and low latency capabilities, confirming that our gateway can be placed in-line in front of network security stacks at data center ingress points. Industry experience has shown that networks typically operate at 60% to 70% of their maximum capacity, and that security gateways can degrade that by another 50%. During the demonstration at CTE Lab, a fully integrated 100G TAC Gateway operated at full interface speed with a traffic throughput of significantly more than the industry standard, with zero packet loss.
Our demonstration was also supported by IBM and Cisco networking hardware, and Ixia test equipment. We’d like to thank the extended team for their valuable support.
We know that achieving high performance is not measured by one demonstration, but it is gratifying, if not exciting, to see the BlackRidge TAC technology operating at high line speeds. The first deployed 100G TAC Gateway will ship with trunked 10GbE Ethernet interfaces, followed by native 40GbE and 100GbE. Along with our 1G, 10G, and VMware virtual appliance gateways, these configurations allow the Eclipse Gateway to be deployed in a variety of security stack and infrastructure configurations, from virtual and cloud environments to network backbones.