Title:  Network overlay and Crypto service

Abstract:  Security policy is a critical networking technologies, this talk is intended to explore the different crypto service model. Such as overlay security, content security & application security. To implement this security model, the new feature in DPDK, AES-NI, QAT, Hyperscan can be the technology ingredient to accelerate the technology readiness, and how to intercept the Tungsten Fabric feature roadmap.   

Name:  Heqing Zhu, Ping Yu

Email:  heqing.zhu@intel.com;  ping.yu@intel.com

Target: Full talk