Curveball Networks is here to provide guidance in developing truly scalable cybersecurity solutions based on the packet-based approach we call ‘contextual forwarding’Read More Welcome to Curveball Networks!
In the first part of this series, we looked at how the CPU/RAM resource limitations of security middleboxes severely restrict their ability to scale and migrate from perimeter defense to datacenter-based architectures. When aggregating large numbers of networked assets and/or the traffic from large numbers of endpoints into the cloud, even the most basic stateful […]Read More The Trouble With Middleboxes – Part 2
According to RFC-3234, “A middlebox is defined as any intermediary device performing functions other than the normal, standard functions of an IP router on the datagram path between a source host and destination host”. The overwhelming number of network security appliances such as firewalls (FW) and intrusion prevention systems (IPS) are middleboxes. Unlike routers and switches […]Read More The Trouble With Middleboxes – Part 1