Delivering The Security Service Edge: High-Performance & Zero Trust

Transcription

Delivering the Security Service Edge:High-Performance & Zero TrustApril 5, 2022

Notices and Disclaimers Intel technologies may require enabled hardware, software or service activation. No product or component can be absolutely secure. Your costs and results may vary. Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or itssubsidiaries. Other names and brands may be claimed as the property of others.Webinar: Building On-Demand Edge Clouds with Mixed Infrastructure2

WelcomeJeff SharpeDr. Ken UrquhartSenior Director5G/IoT Edge AI SolutionsGlobal Vice-President5G StrategyJay VincentSenior SolutionArchitect5G IoT Edge CloudAI/ML/DL Enterprisehttps://linkedin.com/in/jeffbsharpeEdge Cloud Cybersecurity Enterprise HPChttps://linkedin.com/in/jay-vincent5G Cybersecurity AI Engineering Quantum Computing Catshttps://linkedin.com/in/kenu 2022 Zscaler, Inc. SuperMicro, Inc. All rights reserved.Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.3

5GFAST mmWave 1. FAST2. LIVE3. MASSIVE More bits per secondUp to 10 Gbps10 to 100x 4G-LTENetwork slicingSource: Intel “5G Technology Overview”Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. 2022 Zscaler, Inc. All rights reserved.4

5G1. FAST2. LIVE3. MASSIVELIVE Ultra-low latency ( 1 ms) Edge compute is the 5Gnetwork cloud upgrade forMobile & Interneto Compute & data resourcesavailable at nearest node possibleo Enables new & existingapps/services to run efficiently andcost effectivelySource: Intel “5G Technology Overview”Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. 2022 Zscaler, Inc. All rights reserved.5

5GMASSIVE 1. FAST2. LIVE3. MASSIVE 1,000,000 devices per km21000x bandwidth/areaAND radios: 1/10th energy usageultra-precise location infoSource: Intel “5G Technology Overview”Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. 2022 Zscaler, Inc. All rights reserved.6

Top Enterprise EdgeUse Cases 2022 Zscaler, Inc. All rights reserved.7

Enterpriseedge usecases Industrial IoT Facilities Management Smart Cities Energy Optimization Smart Grid Machine to Machine Comms Smart Metering Autonomous Driving Smartphones Content Delivery Connected Health Medication Management Telehealth / Telemedicine Streaming media Retail Immersion Connected HVAC Disaster Management Precision Asset Tracking Emergency Management Surveillance Systems Digital Logistics Augmented Reality Remote Monitoring Virtual Reality Intelligent Navigation Automated Parking Management 2022 Zscaler, Inc. and SuperMicro, Inc. All rights reserved.8

5G use cases inproductiontoday 2022 Zscaler, Inc. and SuperMicro, Inc. All rights reserved.9

Where we are today Any Device / Data Source The Internet is no longer justfor humans – expect a surgeof IoT, XR, and other devicesThese devices have limitedCPU, GPU, Memory, Storage,Limited Power, etc.Ultra-low latency forworkloads on the device(Mostly) secure whenisolated from the InternetPublic/Private Clouds 2022 Zscaler, Inc. All rights reserved.10

Where we are today Private Enterprise Clouds and HyperscalerClouds (AWS, Azure, GCP)Great toolsets to develop, build, anddeploy solutions (to each cloud)Lots of compute power, memory, storage,and high-throughput networksAll the scalability you needAny Device / Data SourcePublic/Private Clouds 2022 Zscaler, Inc. All rights reserved.11

Where we are today Security is a concern as your trafficcrosses multiple networks you don’tcontrol (and can’t verify as secure)Any network(s)Any Device / Data SourcePublic/Private Clouds 2022 Zscaler, Inc. All rights reserved.12

Where we are today Any network(s)Any Device / Data SourceReal TimePublic/Private Clouds 2022 Zscaler, Inc. All rights reserved.13

Where we are today Any network(s)Any Device / Data SourceReal TimePublic/Private CloudsNon-Real Time 2022 Zscaler, Inc. All rights reserved.14

Where we are today Compute Power: CPU, GPU, Memory, Storage, Power ConsumptionAny network(s)Any Device / Data SourceReal TimePublic/Private CloudsNon-Real Time 2022 Zscaler, Inc. All rights reserved.15

Where we are today Compute Power: CPU, GPU, Memory, Storage, Power ConsumptionAny network(s)Any Device / Data SourceReal TimePublic/Private CloudsNon-Real TimeLatency: Time to round-trip data from device to workload and return results 2022 Zscaler, Inc. All rights reserved.16

Where we are going Compute Power: CPU, GPU, Memory, Storage, Power ConsumptionAny Device / Data SourceReal TimeMECMECMEC 1 msDeep Edge1-5 msFar Edge5-20 msNear EdgePublic/Private CloudsNon-Real TimeLatency: Time to round-trip data from device to workload and return results 2022 Zscaler, Inc. and SuperMicro, Inc. All rights reserved.17

Use case: Augmented RealityTaqTile AR for Robotics No-code robot programing Delivers AR for training,preventative maintenance& improved performance 12 ms or less latencyLidar forrecognition/tracking: Detects objects in avolume of space Track objects enteringand exiting Low latency Near realtime observation Multiple verticals 2022 Zscaler, Inc. and SuperMicro, Inc. All rights reserved.18

New Edge Servers & NewOptimizations from SuperMicro 2022 Zscaler, Inc. SuperMicro, Inc. All rights reserved.19

Market Evolution Snapshot Momentum into Wireless & High Throughput Merging of common elements for heavy workloads Network Architecture for Edge-to-Cloud platforms Nano-clouds / Edge devices for low latency apps Increased use of AI inferencing and training Network & Device security for Zero-Trust/SASE network is a critical element Video/CDN increases the need for higher bandwidth and edge security Distributed Automated, Self Healing/Managing Intelligent platforms “Killer-Apps” driving the need for increased AI/ML/DL based systems 2022 SuperMicro, Inc. All rights reserved.20

Edge-to-Cloud AI dgeIndustry 4.0AR/VRRetailVenues / Smart PlacesSmart CitiesTransportation (V2X)HealthcareTelecom MECSecureOperational Data StoresOperational AppsEdge of NetworkAnalytics,AI &VisionCloud Cloud, On PremiseData ModelsOTITPrivatePublicHybridAnalytic Models 2022 SuperMicro, Inc. All rights reserved.21

Core Requirements of Edge-to-Cloud ResourcesHigh ThroughputDPIBackhaulSwitchingPolicyPrivacy & SecurityDDOSNGFWIPSecDLPIntrusionSpectral EfficiencySlicingMeshDASMicro/Macro CellsMIMOPrivate 5GLow Latency ServicesAutonomous xxAR/VRRecovery/HASafety/ResponseSpeech Rec. 2022 SuperMicro, Inc. All rights reserved.Exponential Data GrowthTransportationSmart PlacesRenewable EnergyMedia/VideoQoExperience22

Edge Service Delivery (GPU/CPU/FPGA)WebTv/VideoVideo CommunicationFlickrResolutionContent SASEDedicated RoutingEnterprise NetworksSocial EventsLocal AidesAlertsGPSCryptographyCloudletsLocal ConnectivityEdgeBroadcastingHCIEdgeComputeEdge ContentDeliveryContentAugmented RealityFace RecognitionSite RecognitionProactiveCachingEdge Based CDNGeo InformationPreloadingDistributed eoAudioProximity ProofGeolocationBandwidth tworkingUserRequestsTranscoding 2022 SuperMicro, Inc. All rights reserved.Proximity CachingBig DataCar2CarRAN DataSensorDataMonitoringIoTAggregation23

Edge Appliance PrerequisitesSelf Healing and Resiliency at the EdgeEdge Systems are remotely managed and unmanned.Provides low latency and high throughput delivery forVM’s & Containers – some of which are expected to beup 99.9999% of the timeSecure and Zero-TrustExpanding the abilities of multiple compute devicesattached in a hybrid environment of public and privatenetworks increases a security risk. Key areas include:assume breach is inevitable or has already occurred;Always limit access to only what is needed;Looks for anomalous/malicious activity everywhereCloud native approach and DevOps enablementService Providers & NFV vendors are driving a cloudnative approach. Service providers acknowledge theevolvement of software in every part of the networkallowing cloud-based automation for infrastructuredeployment, operations and VM/Containermanagement.Role of Open Software and Hardware ArchitecturesOpen Architectures for software and hardwareinfrastructure to develop, deploy and manage vNFs,containers and APIs for services – enablement ofmultiple, integrated partnersproviding guidance and standards for delivery. 2022 SuperMicro, Inc. All rights reserved.24

Enabling Edge to CloudEdge PlatformsCPEEdge DC 1ms/RealtimeCustomer PremisesNetwork EdgeCentral Office /Edge CloudRegional DCRemote DC2-5ms 10ms 20ms 50msEdge-OptimizedNetworkOptimizedResource Management ML/Analytics/Archive 2022 SuperMicro, Inc. All rights reserved.25

Edge requirements Built for Net/Comms2x workloadsPower NeedsIncreased bleRackmount orstandaloneNEBS and harshercertifications Cost Effective Enterprise driven NormalizedWorkloads uCPE & Intel Selectsolutions SMB capable Lower powerconsumptionvNF Workloads SYS-210SESYS-220HEX-Large(Dual Socket Xeon-SP3 or more GPU/VPU)SYS-E403PLarge(Single Socket Core / Xeon-SP1 - 3 GPU/VPU & I/O options)SYS-110PSYS-510DMedium(Single Socket Core / Xeon-D1 GPU/VPU & I/O options)SYS-E50/100/302Minimal Port / mum Port / Throughput 2022 SuperMicro, Inc. All rights reserved.Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.26

Intel Powers the Edge toUnlock Value of New Use Cases 2022 Zscaler, Inc. SuperMicro, Inc. All rights reserved.Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.27

Enterprise Edge-Cloud LandscapeEnterprise Edge (On Prem.)Public CloudEdge/POPAnywhereSaaSHomeZero TrustNetwork AccessAntiMalwareMicro-uCPESD-WANIaaSWebAIOpsData center/HQSecure Access/Service EdgeThin EdgeThick Edge64% of companies have either adoptedSASE/SSE or are thinking of adopting withinthe next year.Mckinsey Global Post-COVID Workforce Survey, Feb 2021Webinar: Delivering the Secure Service Edge: High Performance and Zero-Trust28

Edge to Cloud ArchitectureEdge/POPEdge POPEnterprise Edge(On Prem.)CustomerPremiseNW andSecHW andSW ACCCPU SaaSNICDCThickTORBranchMediumCloud EdgeWFHThinNW andSecHW andSW ACCCPUNICPublic CloudCo-los (e.g. Equinix)IaaSWebData center/HQ HyperscalerTORWebinar: Delivering the Secure Service Edge: High Performance and Zero-Trust29

Edge/POP Platform ArchitecturePOPHyperscanCryptoNW andSecHW andSW ACCCPUIntel Deep Learning Boost (Intel DLBoost), Intel QuickAssistTechnology (Intel QAT)AI and AnalyticsHypervisor e.g. ESXi/KVM/OtherIANICTORCrypto ISA, Intel QAT,Intel DL BoostSDWAN, NGFW,Service Mesh, SDNIntel Software Guard Extensions(Intel SGX)/ Intel Trust DomainExtension (Intel TDX)ZTNA (ex: Service Mesh)Confidential ComputingHyperscanNGFW / IPS / IDSInfrastructureProgrammerDevelopment Kit (IPDK)ProgrammabilityHypervisor e.g. ESXi / KVM / OtherFoundational NICIALower TCO with a consistent cloud -focusedplatform approach across edge locationsApplications and ServicesMiddlewareResource and service orchestrationOperating systemEdge hardware platformFoundational NIC / Intel SmartNIC /Intel Image Processing Unit (Intel IPU)Key challenges to overcome Deliver platform consistency &scalability across diverse edge locationrequirementsIntel Tofino based switchIntel Xeon D switch Optimize cloud native frameworks tomeet stringent edge KPIs and networkcomplexity Leverage a broad ecosystem andevolving standards for edge computingWebinar: Building On-Demand Edge Clouds with Mixed Infrastructure30

Intel Xeon Scalable ProcessorsIntel DL BoostTechnologiesMicroarchitecturedata center CPU optimized for AIINTEL ADVANCED VECTOR EXTENSIONS 512 (INTEL AVX-512)INTEL DEEP LEARNING BOOST (INTEL DL BOOST)INTEL OPTANE DC PERSISTENT MEMORY20192020AVX512 VNNIXeon SP Gen 214NMNEW AI ACCELERATION (VNNI)NEW MEMORY STORAGE HIERARCHYAMX ClientCore 10th Gen ServerXeon SP Gen 2 Xeon SP Gen 3H Xeon SP Gen 3 Next Gen Xeon SP 20222021Xeon SP Gen 3 H14NMNEXT GEN INTEL DL BOOST (BFLOAT16)AVX512 BF16Next Gen Xeon SPXeon SP Gen 3NEXT-GENERATION TECHNOLOGIES(Intel Advanced Matrix Extensions (Intel AMX)10NMSUPPORTING INTEL DL BOOST (VNNI)Leadership PerformanceWebinar: Delivering the Secure Service Edge: High Performance and Zero-Trust31

IA Powers the SASEApril’2021 Launched2S Intel Xeon Scalable processor Gen 32S Intel Xeon Scalable processor Gen 2 PlatformIntel Xeon -SPGen 2DMILBG**Intel UPIIntel UPIIntel Xeon -SPUp to 38cores/CPUGen 2up to 112 logicalcoresNext Gen Intel Optane DCPMEM8x Memorychannels@3200MTs128 Lanes PCIeGen 4 IO BW2048Gbpsx43x16PCIe*Intel Xeon -SPGen 3DMI3x16PCIe*Higher Performance SolutionLBGTotal Memory EncryptionXeon-SP Gen2Xeon-SP Gen3Max TDP205W270WNew instructionsVNNIVNNI, Vector AES, VBMI,SHA extensions, VPMADD52NoYes,Confidential ComputingDDR4/Intel Optane Persistent Memory# DDR4 channels/ Max Speeds6 x 29338 x 3200PCIe* uplink connection for Intel QuickAssist Technology and Intel EthernetOptane memorysupportIntel Optane DCPersistent Memory Module(Apache Pass)Next generation Intel Optane DC persistentmemory modulePCIe 3.0,48 lanes (x16, x8,x4)PCIe 4.0,64 lanes (x16, x8,x4)Intel QuickAssistTechnologyNICs: XXV710-DA2 2x25GbeIO Density: 400Gbps Network IO Per 2RUDDR4 DIMMsKey featuresIntel SGXPCIE IOWebinar: Building On-Demand Edge Clouds with Mixed Infrastructure**Intel Xeon -SPGen 3x44x16PCIe*4x16PCIe*Intel QuickAssistTechnologyNIC’s: E810 1x100, 2x50, 4x25 & 2X 100IO Density Possible: 800GbpsNetwork IO Per 2RUXeon-Sp Hero features SGX : Confidential Computing Crypto:IPsec/TLS/QUIC/WireGuard Intel DL Boost: Analytics and AIuse case32

SSE POP Reference Configurations . Downlink ports25 GIntel E810NICNIC /25 GbeNIC /25 GbeXeon 24cXeon 24cXeon 24cXeon 24cXeon 24cXeon 24cXeon 24cNIC /25 GbeNIC /25 GbeXeon 24cIntel Xeon Scalable processor Gen3 Gold 5318N SKU w/SSTOption 1Option 224 Core per Socket20 Core per Socket2.1 Ghz2.0 Ghz150 Watt TDP135 Watt TDPSmall point of presenceWebinar: Building On-Demand Edge Clouds with Mixed InfrastructureIntel Xeon Scalable processorGen 3Intel QuickAssistTechnologyIntel Tofino switch: 64 x 25 Gbe portsUp to 20 serversUp to 20 serversIntel Tofino switch: 64 x 25 Gbe ports . Downlink ports100 GIntel E810NICNIC /100 GbeNIC /100 GbeXeon 32cXeon 32cXeon 36cXeon 36cXeon 32cXeon 32cXeon 36cXeon 36cIntel Xeon Scalable processor Gen3 Gold 6338N SKU32 Core per Socket2.2 Ghz185 Watt TDPIntel Ultra Density Platform (100Gbps)Large point of presenceNIC /100 GbeNIC /100 GbeIntel Xeon Scalable processorGen 3Intel QuickAssistTechnology33

Extensive Intel Software ValueSWG/DNSDNS Security,DNSoHttpsURL filtering ( Hyperscan), FQDNZTNA/VPNaaSVault, IAM,Wireguard/IPSecVPNaaS, VPP/IPSecSecurity AI/ CPUInferenceTADK, Intel OneDNN,TensorFlow,OpenVINO, ONNXTensorFlow Lite /XNNPackEncryptedtrafficanalysis,Https2.0 / olationHyperscan, AESPatternmatching forDPI, IPS, WAFUser planeStackI/O, LibsLoad balancingHDSLB Webinar: Delivering the Secure Service Edge: High Performance and Zero-TrustuService/Service MeshVM/IaaS, Power SavingPlatform/Data SecurityConfidential Computing34

What About Cyber-Security? 2022 Zscaler, Inc. SuperMicro, Inc. All rights reserved.35

2022 Zscaler, Inc. SuperMicro, Inc. All rights reserved. May 2021: Executive Order on Improving the Nation’s Cybersecurity ial-actions/Zero proving-the-nationscybersecurity/ March 2022: Statement by President Biden on our Nation’s Cybersecurity on-ournations-cybersecurity/ Zero Trust approach Assume breach is inevitable or has already occurred Constantly limit access to only what is needed Looks for anomalous/malicious activity everywhere36

From: U.S. Cybersecurity and Infrastructure Security Agency (CISA)37

1. connect a user2. from their device3. over any networkIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)What doesZero Trustreally mean?4. to a specific application5. to exchange data 2022 Zscaler, Inc. All rights reserved.38

1. connect a userIDENTITYDo I know you?Employee/partner/device identity(Microsoft, Okta, Ping)2. from their device3. over any networkIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)What doesZero Trustreally mean?4. to a specific application5. to exchange data 2022 Zscaler, Inc. All rights reserved.39

1. connect a userIDENTITYDo I know you?Employee/partner/device identity(Microsoft, Okta, Ping)2. from their deviceDEVICEDo we trust the device?Device type/posture, managed/BYOD(Microsoft, CrowdStrike)3. over any networkIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)What doesZero Trustreally mean?4. to a specific application5. to exchange data 2022 Zscaler, Inc. All rights reserved.40

1. connect a userDo I know you?IDENTITYEmployee/partner/device identity(Microsoft, Okta, Ping)2. from their deviceDo we trust the device?DEVICEDevice type/posture, managed/BYOD(Microsoft, CrowdStrike)3. over any networkIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)What doesZero Trustreally mean?NETWORKWhere are you going?Internal, external, sanctioned SaaS, orother destination4. to a specific application5. to exchange data 2022 Zscaler, Inc. All rights reserved.41

1. connect a userDo I know you?IDENTITYEmployee/partner/device identity(Microsoft, Okta, Ping)2. from their deviceDo we trust the device?DEVICEDevice type/posture, managed/BYOD(Microsoft, CrowdStrike)3. over any networkIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)What doesZero Trustreally mean?NETWORKWhere are you going?Internal, external, sanctioned SaaS, orother destination4. to a specific applicationAPPLICATIONDo we trust the application?Expected or anomalous behavior?Usual ports and protocols?5. to exchange data 2022 Zscaler, Inc. All rights reserved.42

1. connect a userDo we know you?IDENTITYEmployee/partner/device identity(Microsoft, Okta, Ping)2. from their deviceDo we trust the device?DEVICEDevice type/posture, managed/BYOD(Microsoft, CrowdStrike)3. over any networkIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)What doesZero Trustreally mean?NETWORKWhere are you going?Internal, external, sanctioned SaaS, orother destination4. to a specific applicationAPPLICATIONDo we trust the application?Expected or anomalous behavior?Usual ports and protocols?5. to exchange dataDATA 2022 Zscaler, Inc. All rights reserved.Do we trust the data?Are you exchanging good or bad things?Content inspection (SSL)?43

1. connect a userDo I know you?IDENTITYEmployee/partner/device identity(Microsoft, Okta, Ping)2. from their deviceDo we trust the device?DEVICE3. over any networkIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)What doesZero Trustreally mean?NETWORKWhere are you going?Internal, external, sanctioned SaaS, orother destination4. to a specific applicationAPPLICATIONA. GovernanceDevice type/posture, managed/BYOD(Microsoft, CrowdStrike)Do we trust the application?Expected or anomalous behavior?Usual ports and protocols?5. to exchange dataDATA 2022 Zscaler, Inc. All rights reserved.Do we trust the data?Are you exchanging good or bad things?Content inspection (SSL)?44

1. connect a userDo I know you?IDENTITY2. from their deviceDo we trust the device?DEVICEWhat doesZero Trustreally mean?NETWORKWhere are you going?Internal, external, sanctioned SaaS, orother destination4. to a specific applicationAPPLICATION5. to exchange dataDATA 2022 Zscaler, Inc. All rights reserved.A. GovernanceDevice type/posture, managed/BYOD(Microsoft, CrowdStrike)3. over any networkIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)B. Automation and OrchestrationEmployee/partner/device identity(Microsoft, Okta, Ping)Do we trust the application?Expected or anomalous behavior?Usual ports and protocols?Do we trust the data?Are you exchanging good or bad things?Content inspection (SSL)?45

1. connect a userDo I know you?IDENTITY2. from their deviceWhat doesZero Trustreally mean?Where are you going?Internal, external, sanctioned SaaS, orother destination4. to a specific applicationAPPLICATION5. to exchange dataDATA 2022 Zscaler, Inc. All rights reserved.A. GovernanceDevice type/posture, managed/BYOD(Microsoft, CrowdStrike)3. over any networkNETWORKC. Visibility and AnalyticsDo we trust the device?DEVICEIllustration by U.S. Cybersecurity and Infrastructure Security Agency (CISA)B. Automation and OrchestrationEmployee/partner/device identity(Microsoft, Okta, Ping)Do we trust the application?Expected or anomalous behavior?Usual ports and protocols?Do we trust the data?Are you exchanging good or bad things?Content inspection (SSL)?46

Zscaler: Security at the Edge – for over 10 years150Data CentersPolicy enforcement at theservice edge (SASE)250B 100M 175K Requestsprocessed/dayThreatsblocked/dayUnique securityupdates/dayOslo StockholmCopenhagenManchester San FranciscoLos AngelesPeering ininternet exchangesChicagoDallasNuevo LoredoNew YorkWashington DCAtlantaMoscowBeijingTianjinSeoulTokyoTel AvivMiamiShanghaiQatarSaudi ArabiaNew DelhiUAELagosHong KongTaipeiOffice 365 Data Center PeeringChennaiMumbaiKuala LumpurPeering: https://www.peeringdb.comSingaporeSao livering exceptional User Experience Reliability, Availability, and Scalability 2022 Zscaler, Inc. All rights reserved.47

Q&AJeff SharpeDr. Ken UrquhartSenior Director5G/IoT Edge AI SolutionsGlobal Vice-President5G StrategyJay VincentSenior SolutionArchitect5G IoT Edge CloudAI/ML/DL Enterprisehttps://linkedin.com/in/jeffbsharpeEdge Cloud Cybersecurity Enterprise HPChttps://linkedin.com/in/jay-vincent5G Cybersecurity AI Engineering Quantum Computing Catshttps://linkedin.com/in/kenu 2022 Zscaler, Inc. SuperMicro, Inc. All rights reserved.Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.48

Delivering the Security Service Edge:High-Performance and Zero TrustApril 5, 2022

Webinar: Delivering the Secure Service Edge: High Performance and Zero-Trust 29 Edge to Cloud Architecture Thin Medium Thick WFH Branch DC Edge POP Cloud Edge TOR NIC CPU HW and SW ACC NW and Sec TOR NIC CPU HW and SW ACC NW and Sec Public Cloud Edge/POP Enterprise Edge (On Prem.) Co-los (e.g. Equinix) Web SaaS IaaS Data center/HQ Customer .