/
How is Swarm protected from network attacks from worms, trojan horses or viruses?
How is Swarm protected from network attacks from worms, trojan horses or viruses?
The inherent architecture of Swarm provides excellent protection against viruses and other harmful software. The only permitted listening services are HTTP, SNMP, NTP, and Swarm's internal Cluster communications. Each of these is protected in the following manner:
- The HTTP server uses DataCore-developed code and is limited to SCSP and web console communications. There is no dynamic CGI, PHP, or other scripting used.
- The SNMP service requires password authentication for all write requests and uses a custom DataCore-developed SNMP agent.
- Any NTP input requires encryption keys to accept unsolicited input.
- All internal Swarm Cluster communication must adhere to DataCore's internal and proprietary protocol which is not published externally.
- In addition to the communication protection of each service, Swarm's embedded OS runs entirely from RAM and has no persistent state across reboots.
In summary, while all systems are potentially vulnerable, Swarm is naturally protected from most of the standard methods of attack.
, multiple selections available,
Related content
What is unique about the Swarm architecture that simplifies
What is unique about the Swarm architecture that simplifies
More like this
Hypervisor Support
Hypervisor Support
More like this
TechNote 2015004: Health Reports
TechNote 2015004: Health Reports
More like this
Cluster Protection Planning
Cluster Protection Planning
More like this
SCS Concepts
SCS Concepts
More like this
Which Virtual Machine platforms are supported for Swarm deployment?
Which Virtual Machine platforms are supported for Swarm deployment?
More like this
© DataCore Software Corporation. · https://www.datacore.com · All rights reserved.