accelerating enterprise content white paper

White Paper Accelerating Enterprise Content Management Over the WAN Shawn Cooney Director of Research — Certeon, Inc. M...

0 downloads 55 Views 230KB Size
White Paper

Accelerating Enterprise Content Management Over the WAN Shawn Cooney Director of Research — Certeon, Inc. May 2007

APPLICATION INTELLIGENT NETWORKING Global enterprises are heavily investing in enterprise content management (ECM) technologies to capture, organize, search, access, and share documents and records. The majority of these infrastructures rely on Web-based collaborative solutions that will enable global access to their ECM applications and content over a wide area network (WAN). Despite these efforts, the inherent issues of the WAN, such as low bandwidth, high latency, packet loss, network contention, and lack of end-to-end security greatly impede the performance and security of these ECM infrastructures. This whitepaper discusses how to seamlessly deploy high performance and secure global ECM infrastructures over a WAN..

PAGE 1

Table of Contents

OVERVIEW ....................................................................................................................................................................3 ECM IN THE ENTERPRISE ............................................................................................................................................3 WEB-BASED ECM SOLUTIONS....................................................................................................................................4 ECM ACCELERATION REQUIREMENTS ......................................................................................................................4 UNIQUE WAYS TO ACCELERATE ECM ACCESS ..........................................................................................................5 Protocol Optimization through Application Acceleration Blueprints ..............................................................................5 How It Works..............................................................................................................................................................................................5 Effective Data Reduction through Object Differencing ..........................................................................................................6 BLUEPRINTS FOR ECM ACCESS ..................................................................................................................................7 Web-based Access ..................................................................................................................................................................................7 File-Level Differencing for the Web based ECM ........................................................................................................................7 Streamlining Web Transactions ........................................................................................................................................................8 APPLICATION SPECIFIC ECM ACCELERATION ..........................................................................................................9 Application Specific Object Differencing......................................................................................................................................9 Streamlining ECM Transactions ......................................................................................................................................................10 SECURELY ACCELERATING FILES ..............................................................................................................................10 CERTEON S-SERIES APPLICATION ACCELERATION APPLIANCES ........................................................................11 S-Series Application Acceleration Appliance............................................................................................................................11 SUMMARY....................................................................................................................................................................11 GLOSSARY....................................................................................................................................................................12

PAGE 2

White Paper

OVERVIEW In this age of global, around-the-clock business, enterprises are increasingly leveraging the ubiquitous presence of the network to transact business and enable business-critical functions. The rapidly-growing landscape of Web-based applications ranges from messaging software, to enterprise systems such as SAP and PeopleSoft, custom portals built using SharePoint, BEA, Websphere and increasingly Search and Enterprise Content Management (ECM) applications such as Microsoft Office SharePoint Server (MOSS) 2007, EMC’s Documentum and eRoom, IBM’s Filenet and Oracle’s Stellent. These offerings are enabling companies to optimize operations and facilitate collaborations across the globe. Browser-based ECM applications are playing a rapidly growing role in essential business processes and are having a direct impact on both revenue and operations. Unfortunately, businesses have quickly discovered that globally deployed Web applications also offer their own set of challenges for the IT department. Highest on this list is application performance-the ability to deliver an application consistently, reliably, and with high-performance. The stark reality is that Web-based applications can be painfully slow, as latency and availability are dependent on the performance of wide-area networks. Poor application performance can cost companies a great deal, particularly as Web applications become more mission-critical. Poor performance means low adoption rates, incomplete transactions and low user satisfaction. This severely undercuts the value of the application and adversely impacts the enterprise’s bottom line. And application downtime can mean millions of dollars in lost revenue and productivity. Web application performance is a serious business-critical problem and ECM applications are controlling and presenting an increasing proportion of mission critical enterprise content. This technical whitepaper explores the challenges of providing a high-performance application delivery infrastructure, identifying the root causes of performance and availability bottlenecks in global ECM deployments. In addition Certeon’s S-Series Acceleration Appliance’s will be discussed as an alternative to poor response when deploying a global ECM system.

ECM IN THE ENTERPRISE Collaboration and office productivity tools, as well as content and portal tools, are targeted at knowledge workers in offices. But information work is expanding to include people who work most of the time with other people, and on the frontline. Workers manually transfer documents or convey conclusions, questions, conditions, or recommendations from one tool or environment to another. Enterprise workers need content that is integrated into the business process context, and that based on the user’s role, can provide the user with access to the business information and collaboration tools they need. ECM provides this context. People in all three job types (knowledge workers, information workers, and frontline workers) increasingly work in locations away from the enterprise datacenter (as much as 90% of the workforce). The ECM enabled workplace is now emerging to support all types of information workers by providing seamless, right-time access to content, data, processes, business intelligence, eLearning content, and other information through the use of portals, collaboration tools, business process management, content repositories, content analytics, search, information rights management, business intelligence, and other emerging technologies. ECM solutions must be scalable across a broad range of platforms, and provide LAN-like performance levels without regard for a user’s location. PAGE 3

White Paper

WEB-BASED ECM SOLUTIONS Increasingly, and often in conjunction with an overall consolidation strategy, many administrators are looking beyond simple process control and are seeking to solve other problems associated with sharing documents. Versioning, access control, search, and workflow are becoming must-haves in an overall document sharing strategy. When seeking a holistic solution, administrators are adopting Web-based portals and ECM solutions. These systems, including Microsoft’s MOSS and Windows SharePoint Services (WSS), EMC’s Documentum and eRoom, IBM’s FileNet, and Oracle’s Stellent products all support versioning, access control, search, and workflow capabilities. Furthermore, they are often extended and customized through third-party products and by System Integrators to better meet the needs of a particular enterprise. ECM solutions are built using a variety of architectural approaches. Products are most often built on Java and .NET object models and provide integration methods for systems across a variety of platforms. For example, ECM products that are J2EE-compliant, such as Documentum, can be deployed on J2EE application servers such as, Apache Tomcat, BEA WebLogic, or IBM WebSphere (application servers provide underlying services and simplify integration with other e-business applications that are deployed in the application server environment). Support for industry standards such as XML can also simplify content sharing and exchange among business systems both within and outside an organization. The same holds true for .NET based ECM solutions built on .NET such as Microsoft Office SharePoint Server (MOSS) 2007 and Windows SharePoint Services (WSS). In general ECM solutions fall in to two categories that impact acceleration requirements, those that use simple HTTP access methods like WebDAV and those that implement application specific technologies like UCF and RPCs on top of HTTP.

ECM ACCELERATION REQUIREMENTS In order to meet the requirements for accelerating files across protocols and access methods, a solution should employ advanced technology in several areas: • Effective Data Reduction — Reduce transmitted data by differential compression utilizing a historical store of previously transmitted data • Protocol Optimization — Reduce or eliminate the inefficiencies imposed by application specific protocols or idiosyncratic implementations of protocols • SSL Processing — Accelerate encrypted traffic to maintain end to end security In addition, associated functions are also useful in improving performance in many WAN environments: • Forward Error Correction (FEC) — Transmission of redundant packets to correct for loss without the need for retransmission • TCP Optimization — Enhanced management of window sizes, selective acknowledgments (SACK), and congestion control • Packet Aggregation — Overcoming packet-rate-limited environments by aggregating data into fewer, larger packets • QOS — Handling contention for scarce WAN resources by performing traffic classification, prioritization, and rate shaping

PAGE 4

White Paper

UNIQUE WAYS TO ACCELERATE ECM ACCESS Of the techniques mention above, the most important is effective data reduction. But effective data reduction is dependent on quick and accurate identification of redundant data. In an ECM environment the best way to improve the speed and accuracy of content identification is to ensure that the network acceleration appliance really knows what it is looking for. If the appliance understands the specific objects and semantics of the ECM application, the speed and accuracy of object identification skyrocket. Certeon has two unique technologies to accomplish this. • Application Acceleration Blueprints™ • Object Differencing Engine™ These techniques are Certeon patent-pending and are the core components that enable Certeon S-Series appliances to accelerate shared file access over WANs by up to 1000 percent.

Protocol Optimization through Application Acceleration Blueprints An Application Acceleration Blueprint refers to Certeon’s unique approach to solving performance problems associated with the WAN. A Blueprint embodies an understanding of the semantics of a particular application or protocol along with processing logic for accelerating that application or protocol over the WAN. A Blueprint, working in conjunction with object differencing, drastically reduces the amount of traffic flowing over the WAN. Depending on the Blueprint, it could also mitigate the effects of high WAN latency by pipelining certain transactions. In some cases, WAN traffic can be eliminated altogether through intelligent information caching and localized responses. The net benefit of an Application Acceleration Blueprint is to significantly improve the transaction time and throughput of a particular application or protocol over the WAN.

How It Works File Level Differencing — The first order of business for a Blueprint is to identify and capture file level data objects as they are encapsulated in a particular application protocol. In order to do this, the Blueprint parses headers and metadata to isolate the native file contained within a transaction data stream. In doing so, the Blueprint can also gather information used by the application to identify the file. The name can then be used to correlate the file with identical — or similar — files in history, and object-level differencing can then be carried out. Information Caching — By understanding the semantics of an application or protocol, a Blueprint can gather and store status information or other metadata to be used in processing subsequent transactions. For instance, in the case of an application specific ECM system, request and content information can be stored so that subsequent queries can be handled locally, without involving the server or generating traffic over the WAN. Content Caching — The file data itself can also be stored locally, allowing subsequent read operations to be serviced locally, again without involving the server or the WAN. This has the benefit of saving WAN bandwidth and improving response times significantly. Application Stream Processing — Often, clients and servers communicate using application specific semantics, protocols and object naming. By observing the behavior of an application, a Blueprint can look into both application specific requests and the content streams in order to understand how the application is communicating and, as a result, what to accelerate.

PAGE 5

White Paper

Depending on its targeted application or protocol, an Application Acceleration Blueprint may utilize one or more of these techniques to optimize performance over the WAN. In a later section, two specific classes of Blueprints will be discussed in more detail: a Blueprint for Web-based ECM access and a Blueprint for application specific ECM access.

Effective Data Reduction through Object Differencing In the case of employees accessing shared files, file data is transmitted between each individual’s client computer and a server. During transmission, a file is encapsulated in a particular way and is transacted in accordance with the mechanisms of a particular protocol. For example, when a spreadsheet is opened through a Web portal, a file is transmitted to the client’s Microsoft Excel application via HTTP and RPC mechanisms. Discrete data objects (files) are identified and encapsulated in a manner specific to a particular application or protocol. Furthermore, over time, as distributed users access the same files, identical — or similar — data objects tend to be sent over and over again across the network. This file-based knowledge is the key to effective data reduction. By understanding the specific way that an application or protocol identifies and encapsulates a file, an optimal acceleration solution is able to perform differencing and acceleration at the object level. This, as opposed to compression or differencing of session data or packets, is a more effective means of data reduction. Certeon performs data reduction through its innovative Object Differencing Engine (ODE), which isolates and differences files as individual data objects. The ODE provides both a high-performance object store and an object difference-and-compress engine within the S-Series appliances. The disk-based object store uses a proprietary caching algorithm that optimizes I/O performance for changing objects. This enables a single disk access to read and write an entire object of any size, delivering sustained high-throughput disk I/O. In addition, efficient object management enables a large number of objects to be concurrently available in the system for difference-and-compress operations. The core of the ODE is the high-speed single-pass differenceand-compress engine. Various algorithms are used to provide the best data reduction results based on different object types and their data content while maintaining high throughput and performance. This technique brings a number of benefits that cannot be achieved by conventional approaches. These include the following: • Simplified Historical Search — Only the most relevant data (i.e., a previously transmitted version of the file) is involved in search and pattern matching operations. Result: Improved pattern matching efficiency and throughput. • Active Prefetch — File data objects are identified during the request phase of a transaction, before they are needed, and staged in memory, ready for differencing, even before the server starts to send its data. Result: Avoids disk I/O latency, improves throughput. • Whole Object Differencing — Because differencing is done between files, the number and length of encoded match references are decreased. Result: Improved encoding efficiency. • Time Sensitivities between References Are Overcome — Because historical data is managed in the form of independent file data objects, there is never diminishment of data reduction performance over time as a result of intervening traffic. PAGE 6

Result: Consistently high data reduction performance.

White Paper

BLUEPRINTS FOR ECM ACCESS Web-based Access When accessing a centralized Web-based portal and ECM system utilizing HTTP as a base transport protocol the client’s browser interacts with the server directly or in conjunction with “thin client” applets downloaded from the server-side application or service. The result is a browser-oriented user interface that allows managed access to server files. The back-end portal or ECM application provides facilities for search, read/write (check-in, checkout), version control, and workflow. In addition, stand-alone (“fat client”) applications may also access files directly through Web-based technologies. Examples include such generalized productivity applications as Microsoft Office (Word, Excel, or PowerPoint) as well as more specialized applications in such areas as graphic design and engineering. In this scenario, the user performs traditional file open, save, and “save as” operations from within the client application. Behind the scenes, these operations are carried out via communications with the data center server over HTTP. This Web-based connectivity is largely transparent to the user (aside from possible poor performance due to an intervening WAN).

File-Level Differencing for the Web-based ECM With Web-based access to shared files, it is important to note that while HTTP may be used as an underlying transport protocol, other mechanisms can (and often do) come into play. In addition to such standard HTTP methods as GET and PUT, application designers may employ other Java- or .NET-based transaction mechanisms. In addition, some applications utilize RPC transactions when communicating with an ECM server. This mix of applications and Web technologies provides a heterogeneous environment in which transmitted files are encapsulated in a number ways. See Figure 1.

Browser

Request Header: HTTP GET /site/lib/foobar.doc Reply Header: HTTP OK

foobar.doc

ECM Request Header: HTTP POST /site/lib/foobar.doc

Microsoft Client App

Request Body: method=get document /site/lib/foobar/doc

Web and Content Servers

Reply Header: HTTP OK Reply Body: document metadata

foobar.doc

PAGE 7

Figure 1. A Web browser and Microsoft client application utilize different mechanisms to access common content.

White Paper

The power of Blueprints comes into play by helping to parse these various protocols to uncover the underlying files being sent between a client and a server. In doing so, they make the files available for object-level differencing and thus help to achieve maximum data reduction over the WAN. See Figure 2.

Application Response time improvement for secure and unsecure traffic on a 512Kbps link with 400 ms latency Without Certeon S-2000

With Certeon S-2000

(1,835 sec)

Without Certeon S-2000

With Certeon S-2000

(1,752 sec)

HTTP

HTTPS

5.5X

5.8X

(317 sec)

(317 sec)

36X

43X

(49 sec)

(43 sec) 1st Pass

2nd Pass

1st Pass

2nd Pass

Figure 2. S-Series with Application Acceleration Blueprints significantly accelerates files from Web-based portals over both HTTP and HTTPS.

Streamlining Web Transactions Another benefit of Application Blueprints stems from their ability to eliminate traffic from the WAN altogether. Here, a Blueprint can learn common server responses to repetitive transactions and use this information to make responses to client requests autonomously, without involving the server. This not only reduces server and WAN load, but also speeds transactions by removing WAN round-trips. Here are examples where this technique can be used: • SSL session initialization • Authentication • Content freshness checking

PAGE 8

White Paper

By streamlining such repetitive transactions, the time to complete such common Web operations as home page refreshes can be cut dramatically. See Figure 3.

Home Page Render Times — Network: 2 Mbps, 200 ms Latency Home Page: 74 Objects, 398 KByte 5.4 sec 2.5 sec

Time to Render

5.4 sec.

2.5 sec

Without S-Series

With S-Series

Figure 3. S-Series significantly reduces home page render times over high-latency links

APPLICATION SPECIFIC ECM ACCELERATION As discussed earlier, ECM solutions suffer considerable performance degradation when operating over a WAN. This is because of the large number of transactions generated and large volume of content transported between the Web client and the content server. The high degree of latency in most WANs (as compared to LAN environments) aggravates “wait times,” causing considerable delay in rendering pages and delivering content objects. Because of poor performance of ECM solutions over WANs Application Blueprints can provide a great deal of value to the enterprise. Through a number of techniques described below, an application specific ECM Blueprint can correct for many of the deficiencies of ECM solutions deployed in high-latency environments and effectively improve response times for common user-level operations. This is in addition to improving throughput and WAN utilization through object-level differencing as discussed earlier. We will use EMC Documentum Content Server 5.3 as our example here.

Application specific object differencing In order to perform file-level differencing, a Blueprint for EMC Documentum Content Server must capture file data as it is encapsulated by the Unified Client Facility (UCF) protocol. This is not straightforward to do because of the proprietary nature of this protocol. File data, once “captured” by the Blueprint, is fingerprinted and made available to object-level differencing, yielding a high degree of data reduction over the WAN. While this approach is highly effective in reducing WAN traffic, it cannot by itself overcome the poor response times introduced by the chattiness of the presentation pages and Java applets running over high-latency WANs. To address this issue, the Blueprint must undertake a number of techniques to mitigate the performance impact of the UCF protocol itself. PAGE 9

White Paper

Streamlining ECM Transactions Application Stream Processing — Documentum webtop clients and Content Servers communicate using application specific semantics, protocol and object naming and request structures. The Blueprint looks into both the application specific requests and the content streams in order to understand how the application is communicating and as a result what to accelerate. In summary, by employing these application specific techniques in conjunction with object differencing, the Certeon's S-Series with embedded Blueprint for EMC Documentum Content Server can significantly improve response times for all content and page access, improve WAN utilization, and increase productivity for a global workforce.

SECURELY ACCELERATING FILES Enterprises today are increasingly concerned about the security of information, even inside their premises and within their own networks. Malicious employees or others who have access to the corporate network have the capability to view and access unauthorized information, including shared files. This problem is especially acute in remote-office locations where premises’ security is weaker and IT staffing and security are less available than at corporate headquarters. For this reason, enterprises are adopting SSL, even within their own networks, as a base technology for ensuring privacy between authorized employees and corporate servers. In their migration to Web-based portals and applications, this takes the form of HTTPS rather than HTTP as a transport protocol between clients and servers. However, the adoption of SSL presents a fundamental problem for products that accelerate application or file traffic between remote offices and data center servers. With SSL, all session layer data is encrypted. Encrypted data by its very nature is not compressible. Because SSL uses cryptographic keys that vary by time of day and individual user session, no two session traffic streams look the same. Thus differencing of this encrypted data is not possible. In order to overcome this problem, Certeon has implemented its patent-pending Secure Application Technology™ (SAT) within its S-Series Application Acceleration Appliances. The S-Series appliances sit transparently in the network between client computers and servers and “undo” SSL encryption internally prior to any data-reduction steps. Because SSL was expressly designed to prevent such “man-in-the-middle” attacks, SAT allows the transparent termination of SSL sessions in a remotely located device for the purpose of data reduction and acceleration over the WAN.

CERTEON’S SAT ACHIEVES THE FOLLOWING TWO KEY GOALS: • Transparency — Acceleration devices should utilize native server certificates for SSL session initialization, rather than their own certificates. This eliminates the cost and complexity of managing certificates on individual acceleration devices. • Security — While server private keys must be employed during session initialization, this must be done in a way that is secure. Private keys must never leave the secure data center. By achieving both of these goals, Certeon’s S-Series appliances are able to inspect and accelerate SSLencrypted traffic over the WAN securely and with no additional management of certificates and private keys.

PAGE 10

White Paper

CERTEON S-SERIES APPLICATION ACCELERATION APPLIANCES Through its embedded Application Acceleration Blueprints and Object Differencing Engine, the S-Series delivers all the functionality needed to effectively access enterprise content, including: • Acceleration for application specific content transfer methods • Acceleration for Web-based access methods • Acceleration of SSL traffic The S-Series delivers a high-speed, secure, and scalable infrastructure for accessing files remotely and sharing them among many distributed users.

S-Series Application Acceleration Appliance Certeon S-Series Application Acceleration Appliances seamlessly reside as a part of the WAN between data centers and the remote offices to mitigate the negative effects of the WAN on file access. See Figure 4.

Microsoft Office and MOSS Clients

Data Center

Branch Office Firewall /VPN

Firewall /VPN

Switch

WAN

Certeon S-Series™

Switch

EMC Documentum Content Server Application Servers

Router

MOSS Server

Router Certeon S-Series™

EMC Documentum and eRoom Clients

Documentum eRoom Server

Figure 4. The S-Series can be seamlessly deployed within a WAN in either an in-line or out-of-line configuration.

SUMMARY Enterprises are increasingly using HTTP-based technologies within their distributed enterprises to remotely access resources. To gain the most cost-effective Web-based application access performance over their existing Wide Area Networks (WANs), businesses need to incorporate techniques into their networking infrastructure that can seamlessly accelerate data files and applications beyond traditional compression and acceleration techniques. Certeon’s S-Series has a number of innovative abilities to identify, difference, and accelerate file and application access, based on specific application and protocol knowledge and differencing mechanisms. The result is significant acceleration of data traffic and a dramatic improvement in encrypted and unencrypted file and application access across the WAN. Certeon S-Series Application Acceleration Appliance For specific details, contact Certeon at 781-425-5200, or visit www.certeon.com. PAGE 11

Glossary

Application Acceleration Blueprints — An Application Acceleration Blueprint, as utilized by Certeon’s S-Series Application Acceleration Appliances, is a description of the ways that a specific application identifies and encapsulates data objects that it transmits over the network.

Encoding — Encoding is the process of transforming information from one format into another. The opposite operation is called decoding. In the context of the S-Series’ Object Level Differencing technique, encoding is transforming the differenced data into tokens to be transmitted over the network.

Application Intelligent Networking — Application Intelligent Networking, as delivered by Certeon’s S-Series Application Acceleration Appliances, describes the reduction of data going over a WAN thorough Application Object Layer Differencing. This level of differencing is more efficient than Packet Level Differencing and enables greater application performance, security and scalability.

Encryption — Encryption is the process of obscuring information to make it unreadable without special knowledge.

Application Object Layer Differencing — Application Object Layer Differencing identifies up front, before any pattern matching or encoding steps, a highly constrained and relevant set of historical data. Since specific application objects are already identified, this prior object version represents the best prediction of what is about to be transmitted, data reduction is simplified and much more effective. CIFS — The Common Internet File System (CIFS) protocol has been introduced to support rich, collaborative applications over the Internet. CIFS defines a standard remote file-system access protocol for use over the Internet, enabling groups of users to work together and share documents across the Internet or within corporate intranets. Compression — Data compression is the process of encoding information using fewer bits (or other information-bearing units) than an unencoded representation would use through use of specific encoding schemes. Data Reduction — Data reduction is the reduction of the number of data elements, bandwidth, cost, and time for the generation, transmission, and storage of data without loss of information by eliminating unnecessary redundancy, removing irrelevancy, or using special coding.

PAGE 12

Intervening Traffic — Intervening traffic is miscellaneous data packets that interfere with specific data patterns. Historical Data — Historical data is a compilation of data over time which is stored on a system disk and is available to be pulled into memory. HTTP/HTTPS — Hypertext Transfer Protocol (HTTP) is a method used to transfer or convey information on the World Wide Web. Using an HTTPS: URL indicates that HTTP is to be used, but with an additional encryption/authentication layer between HTTP and TCP. Latency — Latency is a time delay between the moment something is initiated, and the moment one of its effects begins. In terms of networking latency, it is the delay in transmitting data. In terms of disk latency, it is the delay in looking up and retrieving data. Object — An object is an individual unit of run-time data storage that is used as the basic building block of programs. Object Differencing Engine (ODE) — The ODE works with the knowledge provided by the Application Acceleration Blueprints to transmit only the necessary differences in the application data objects, hence significantly reducing the amount of traffic and its transmission time over the network. Data Packet — A data packet is a distinct unit of data transmitted from one node on a network to another. Breaking a large stream of data into many packets allows a network to deliver that data more efficiently.

Glossary (continued)

Packet Layer Differencing — Packet Layer Differencing matches new data to historical data is based solely on the patterns contained in the packet’s new data, without regard for the applications or protocols to which the data pertains.

S-Series Application Acceleration Appliances — Certeon’s wide area networking (WAN) devices which enable the reduction of data transmitted over the network, enabling greater application delivery speed, security, and scalability.

Pattern Matching — Pattern matching is the act of checking for the presence of the constituents of a given pattern. In contrast to pattern recognition, the pattern is rigidly specified. Pattern matching is used to check that things have the desired structure, to find relevant structure, to retrieve the aligning parts, and to substitute the matching part with something else.

SSL — Secure Sockets Layer (SSL) is a cryptographic protocol which provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers.

Pre-fetch — Prefetch is the processor action of getting an instruction from the memory well before it will need it. In this way, the processor will not need to wait for the memory to answer its request.

Tokens — Tokens encapsulate blocks of data as a single data unit. Zip Compression — The ZIP file format is a popular data compression and archival format. A ZIP file contains one or more files that have been compressed or stored.

© 2007 Certeon Inc. The Certeon logo is a registered

trademark of Certeon. Secure Acceleration Technology™, Application Acceleration Blueprints™, Secure Application Networking™ and Application Intelligent Networking™ are trademarks of Certeon. All other company names and/or product names are trademarks and/or registered trademarks of their respective companies.

PAGE 13

4 Van de Graaff Drive Burlington, MA 01803 E-mail: [email protected] www.certeon.com Tel: 781-425-5200