Britestream Applied: Solution
for Microsoft ISA
 |
 |
 |
| |
Key Benefits
- Frees valuable server resources by offloading 100% of SSL processing
- Tamper resistant, hardware-based solution protects encryption
keys and certificates
- Lowers TCO by eliminating the need for additional servers and
licensing fees
| |
 |
|
 |
The
award-winning Britestream data privacy technology provides a secure, scalable
and simple solution for processing SSL-encrypted network traffic in the
Microsoft Internet Security Accelerator (ISA) Server. SSL can often impose
a significant performance burden on an ISA server. This often means deploying
more server hardware than necessary just to implement SSL. The Britestream
SSL security NIC provides 100% SSL offload while also enhancing security.
This allows for a highly secure ISA Server application that maximizes performance
for its primary function, application layer packet inspection. Now SSL
security can be turned on by default.
Scalable Performance and Easy Integration for a Secure ISA Server
ISA Server is commonly used as an application firewall for remote Exchange
access, high volume transaction web sites, or SharePoint portals. SSL encryption
is the default method to secure transmissions across the Internet, whether
it’s from a browser or an Outlook client. The Britestream SSL security
NIC offers 100% offload for this extremely processor intensive function
with the ISA server, thereby allowing it to do its routing and deep packet
inspection of the data at full speed. Together, Britestream and ISA Server
offer superior SSL security and performance, with no penalty for simply
activating SSL.

Enhanced Security
The Britestream BN1200 SSL security NIC allows private keys and certificates
to be stored within tamper-resistant hardware. It also supports
advanced cryptographic functions by allowing the use of 1K, 2K or 4K
RSA key sizes and supporting a variety of encryption algorithms, including
AES-256. And for environments that process only secure traffic
on specific ports, the BN1200 can essentially reject traffic on any other
port, thereby preventing the host application from having to deal with
it. |