Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 10

Stream Scanning for Content Filtering, network protocols: HTTP, HTTPS, FTP, SMTP, POP3, and IMAP.

Page 10 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance - Up to 239 MB/s HTTP throughput - Up to 960,000 emails per hour SMTP throughput • Stream Scanning technology that enables scanning of real-time protocols such as HTTP. • Comprehensive Web and email inbound and outbound security, covering six major network protocols: HTTP, HTTPS, FTP, SMTP, POP3, and IMAP. • URL content filtering with 64 categories. • Malware database containing hundreds of thousands of signatures of spyware, viruses, and other malware threats. • Very frequently updated malware signatures, hourly if required. The STM can automatically check for new malware signatures as frequently as every 15 minutes. • Multiple antispam technologies to provide extensive protection against unwanted emails. • Spam and malware quarantine for easy analysis. • Web application control, including access control for instant messaging, media applications, peer-to-peer applications, and Web-based tools and toolbars. • User management with LDAP, Active Directory, and RADIUS integration, allowing you to configure access policies per user and per group. • Easy, Web-based wizard setup for installation and management. • SNMP-manageable. • Dedicated management interface. (This feature is model dependent; see STM Model Comparison on page 12.) • Hardware bypass port to prevent network disruption in case of failure. (This feature is model dependent; see STM Model Comparison on page 12.) • Front panel LEDs for easy monitoring of status and activity. • Internal universal switching power supply. Stream Scanning for Content Filtering Stream Scanning is based on the simple observation that network traffic travels in streams. The STM scan engine starts receiving and analyzing traffic as the stream enters the network. As soon as a number of bytes are available, scanning starts. The scan engine continues to scan more bytes as they become available, while at the same time another thread starts to deliver the bytes that have been scanned. This multithreaded approach, in which the receiving, scanning, and delivering processes occur concurrently, ensures that network performance remains unimpeded. The result is file scanning that is up to five times faster than with traditional antivirus solutions-a performance advantage that you will notice. Stream Scanning also enables organizations to withstand massive spikes in traffic, as in the event of a malware outbreak. The scan engine has the following capabilities: • Real-time protection. The Stream Scanning technology enables scanning of previously undefended real-time protocols, such as HTTP. Network activities susceptible to latency (for example, Web browsing) are no longer brought to a standstill. 10 | Chapter 1. Introduction

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

10
|
Chapter 1.
Introduction
ProSecure Web/Email Security Threat Management (STM) Appliance
-
Up to 239 MB/s HTTP throughput
-
Up to 960,000 emails per hour SMTP throughput
Stream Scanning technology that enables scanning of real-time protocols such as HTTP.
Comprehensive Web and email inbound and outbound security, covering six major
network protocols: HTTP, HTTPS, FTP, SMTP, POP3, and IMAP.
URL content filtering with 64 categories.
Malware database containing hundreds of thousands of signatures of spyware, viruses,
and other malware threats.
Very frequently updated malware signatures, hourly if required. The STM can
automatically check for new malware signatures as frequently as every 15 minutes.
Multiple antispam technologies to provide extensive protection against unwanted emails.
Spam and malware quarantine for easy analysis.
Web application control, including access control for instant messaging, media
applications, peer-to-peer applications, and Web-based tools and toolbars.
User management with LDAP, Active Directory, and RADIUS integration, allowing you to
configure access policies per user and per group.
Easy, Web-based wizard setup for installation and management.
SNMP-manageable.
Dedicated management interface. (This feature is model dependent; see
STM Model
Comparison
on page 12.)
Hardware bypass port to prevent network disruption in case of failure. (This feature is
model dependent; see
STM Model Comparison
on page 12.)
Front panel LEDs for easy monitoring of status and activity.
Internal universal switching power supply.
Stream Scanning for Content Filtering
Stream Scanning is based on the simple observation that network traffic travels in streams.
The STM scan engine starts receiving and analyzing traffic as the stream enters the network.
As soon as a number of bytes are available, scanning starts. The scan engine continues to
scan more bytes as they become available, while at the same time another thread starts to
deliver the bytes that have been scanned.
This multithreaded approach, in which the receiving, scanning, and delivering processes
occur concurrently, ensures that network performance remains unimpeded. The result is file
scanning that is up to five times faster than with traditional antivirus solutions—a performance
advantage that you will notice.
Stream Scanning also enables organizations to withstand massive spikes in traffic, as in the
event of a malware outbreak. The scan engine has the following capabilities:
Real-time protection
. The Stream Scanning technology enables scanning of previously
undefended real-time protocols, such as HTTP. Network activities susceptible to latency
(for example, Web browsing) are no longer brought to a standstill.