comment on this article

Mellanox acquires Titan IC to strengthen security and data analytics

Mellanox Technologies is to acquire Titan IC, a leading developer of network intelligence (NI) and security technology to accelerate search and big data analytics across a broad range of applications in data centres.

The acquisition will strengthen Mellanox’s network intelligence capabilities delivered through the company’s advanced ConnectX and BlueField families of SmartNIC and I/O Processing Unit (IPU) solutions.

Titan IC’s world class team in Belfast, Northern Ireland will become the centre of advanced network intelligence research and development for Mellanox.

“Network Intelligence is an important technology when combined with our industry-leading networking portfolio of switches, SmartNICs, and IPUs,” explained Eyal Waldman, president and CEO Mellanox Technologies.

“Our customers will benefit from the deep analytics and enhanced security that will be delivered by the integration of our best-in-class Ethernet and InfiniBand products and world-leading deep packet inspection and analytics technologies from Titan IC.”

Titan IC, which has worked with Mellanox over many years, is a world leader in high-speed complex pattern matching and real-time Internet traffic inspection for advanced cyber security and data analytics applications.

Its highly sophisticated RXP hardware network intelligence acceleration engine, offloads regular expressions (RegEx) string and malware matching, freeing up CPU cores and delivering faster throughput and increased efficiency. The RXP engine’s ability to simultaneously handle high throughput, rule depth, and complexity is seen as complementing Mellanox's high performance BlueField IPU based solutions, which include line-rate network, storage, and crypto accelerators at speeds up to 200 Gb/s.

The combination delivers network intelligence capabilities making BlueField solution suitable for a wide range of applications such as stateful firewalls, load balancers, intrusion detection and prevention, deep packet inspection, application recognition, lawful interception, government, logfile analytics, in-storage search and many more.

Author
Neil Tyler

Comment on this article


This material is protected by MA Business copyright See Terms and Conditions. One-off usage is permitted but bulk copying is not. For multiple copies contact the sales team.

What you think about this article:


Add your comments

Name
 
Email
 
Comments
 

Your comments/feedback may be edited prior to publishing. Not all entries will be published.
Please view our Terms and Conditions before leaving a comment.

Related Articles