{"id":44173,"date":"2021-11-29T18:05:00","date_gmt":"2021-11-29T18:05:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/"},"modified":"2021-11-29T18:05:00","modified_gmt":"2021-11-29T18:05:00","slug":"smartnics-set-to-infiltrate-enterprise-network-security-worlds","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/","title":{"rendered":"SmartNICs set to infiltrate enterprise network, security worlds"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2021\/02\/high_speed_train_tunnel_motion_blue_long_exposure_speed_motion_forward_progress_future_whats_next_by_mlenny_gettyimages-1195455865_2400x1600-100877732-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Enterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components&#8211;the smartNIC or data processing unit (DPU).<\/p>\n<p>Use of smartNICs in the enterprise is still evolvinging, but the idea behind them&#8211;offloading server CPU duties onto a separate device to free up server cycles&#8211;is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in telco, financial, and scientific application processing.&nbsp;<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/article\/3613417\/naas-network-as-a-service-is-the-future-but-it-s-got-challenges.html\">NaaS is the future but it&#8217;s got challenges<\/a><\/aside>\n<p>Looking ahead, users and vendors see a way to reduce enterprise costs, improve performance and increase security with smartNICs.<\/p>\n<h2>Why smartNICs?<\/h2>\n<p>\u201cThere are a mix of things going on to make the smartNIC attractive to enterprise customers. For one, the processor technology has gotten to the point where we can make some pretty beefy NICs,\u201d said Paul Turner, vice president of product management with <a href=\"https:\/\/www.vmware.com\/\" rel=\"nofollow\">VMware<\/a>.<\/p>\n<p>\u201cMany data-center applications need lots of resources to run properly, and smartNICs can help with that. Customers also are looking to bring down the cost of infrastructure by running more and more virtual machines while supporting denser traffic from ever-dense servers&#8211;all use-cases smartNICs can handle.\u201d<\/p>\n<p>While the potential is huge for enterprise-class users, it\u2019s still a little early, experts say.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>\u201cAt this point in time, smartNICs have not been proven to be a truly viable solution for enterprise customers yet, due to the high cost of product (compared to regular NICs), and the high engineering costs. Enterprises would need resources to program the smartNICs,\u201d said Baron Fung, research director with the <a href=\"https:\/\/www.delloro.com\/\" rel=\"nofollow\">Dell\u2019Oro Group<\/a>.<\/p>\n<p>The cost of deploying smartNICs may be hard to justify unless they are deployed at scale, and that is particularly true in the case of enterprise data centers, most of which are smaller than cloud data centers, he said.&nbsp;\u201cSmartNIC deployments generally make sense with large cloud data centers in which the development cost can be amortized over a greater number of servers, along with an architecture designed with smartNICs in mind.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<h2>How do smartNICs work?<\/h2>\n<p>To understand how and why smartNIC usage is growing, it helps to understand how they work.<\/p>\n<p>First up is the nomenclature. A smartNIC is also known as a DPU or Functional Accelerator Card (FAC)&#8211;as well as a number of other things.<\/p>\n<p>\u201cFAC is Gartner\u2019s term, which basically means it is a NIC with a high-powered chip on it. While all FACs are essentially NICs, not all NICs\/smartNICs are FACs,\u201d said Andrew Lerner, vice president at research firm&nbsp;<a href=\"https:\/\/www.gartner.com\/en\" rel=\"nofollow\">Gartner<\/a>&nbsp;covering enterprise networking.<\/p>\n<p>By Dell\u2019Oro&#8217;s definition, a smartNIC is a networking adapter card with a programmable processor, Fung said.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>\u201cA smartNIC is almost like a server inside a server, given that it has a processor, network fabric, storage, memory, etc. This programmable processor can be either a FPGA, ARM or some [system on a chip] that is intended to offload certain workloads from the main CPU. These workloads are often overhead to operate the data center infrastructure, such as networking, storage, security, etc. By offloading these overhead workloads, the CPU could be freed up and better monetized to run customer applications,\u201d Fung said.<\/p>\n<p>A DPU can offload functions like physical and virtual switching or packet processing using its built-in network operating system and, in some cases, its on-board acceleration engine, according to VMware&#8217;s Turner.<\/p>\n<p>Different vendors refer to this type of device using different terms. DPU is used by vendors including Nvidia, Marvell, Fungible, and Xilinx. Pensando calls their product a distributed server card or DSC. Intel calls theirs an infrastructure processing unit (IPU).<\/p>\n<p>Vendors layer different software and applications on their products, and use different terms to emphasize this.&nbsp;But fundamentally, all these devices achieve a similar function, according to Fung: freeing up server CPUs for application processing.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<p>\u201cThe FAC (because it has a chip) can deliver all kinds of interesting software, including software that can improve performance and security of applications,\u201d Lerner said. \u201cOrganizations can use the FAC to offload processing from the x86 host or replace \u2018middleboxes\u2019 like firewalls and load-balancers. So the potential is huge. FACs alone could start eating into a lot of existing network stuff like load-balancers, firewalls etc, and even start to eat away the top-of-rack switch itself.\u201d<\/p>\n<h2>SmartNIC use cases<\/h2>\n<h3 class=\"body\">Reduce need for single-function appliances<\/h3>\n<p>Load-balancers and firewalls were state-of-the-art 25 years ago and have become complex and expensive, said Soni Jiandani, co-founder and chief business office for <a href=\"https:\/\/www.networkworld.com\/article\/3637063\/aruba-switch-can-cut-the-need-for-separate-single-function-appliances.html\">Pensando<\/a>.&nbsp;<\/p>\n<p>Pensando is a startup lead by a crew of ex-Cisco stars, including its chairmen of the board, former Cisco CEO John Chambers, Mario Mazzola, Prem Jain, Luca Cafiero and Jiandani.<\/p>\n<p>Pensando is building a DPU-based architecture that includes intelligent, programmable software to support software-defined cloud, compute, networking, storage, and security services that ideally could be rolled out quickly to edge, colocation, or service-provider networks.<\/p>\n<p>Most recently the company\u2019s technology became a key component in HPE company <a href=\"https:\/\/www.networkworld.com\/article\/3637063\/aruba-switch-can-cut-the-need-for-separate-single-function-appliances.html\">Aruba\u2019s new data-center switch<\/a>, the Aruba CX 10000. That switch includes an integrated Pensando DPU that reduces the need for separate security and load-balancing appliances.<\/p>\n<p>\u201cThe idea is that we let enterprises run their infrastructures in the same way that today only a hyperscaler can afford,\u201d Jiandani said. \u201cThere are a wide range of use cases \u2013 such as 5G and IoT \u2013 that need to support lots of low latency traffic. We\u2019ve taken a ground-up approach to giving enterprise customers a fully programmable system with the ability to support multiple infrastructure services without dedicated CPUs.\u201d<\/p>\n<h3 class=\"body\">Processing security<\/h3>\n<p>In virtual environments, putting functions like network-traffic encryption into smartNICs will be a big use case, VMware\u2019s Turner said. \u201cIn our case, we\u2019ll also have the NSX firewall and full virtual SDN software or vSphere switch on the smartNIC that will let customers have a fully programmable, distributed security system.\u201d<\/p>\n<p>Processing required to enforce microsegmentation policies that divide networks into firewalled zones can also be handled by smartNICs, Turner said.<\/p>\n<p>A third use case from VMware\u2019s point of view is setting up a security ecosystem that lets others like its partner Pensando set up network traps to monitor network traffic patterns and perform other analytics functions.<\/p>\n<p>Pensando is part of <a href=\"https:\/\/www.networkworld.com\/article\/3583990\/vmware-plan-disaggregates-servers-offloads-network-virtualization-and-security.html\">VMware\u2019s Project Monterey<\/a>, which melds bare-metal servers, GPUs, FPGAs, NICs, and security into a large-scale virtualized environment. A key component is VMware\u2019s SmartNIC, which incorporates a general-purpose CPU, out-of-band management, and virtualized device features.<\/p>\n<p>As part of Monterey, VMware has enabled its ESXi hypervisor to run on SmartNICs, which will provide a single management framework to manage all custoner compute infrastructure whether it be virtualized or bare metal. The DPU&nbsp; be an infrastructure-fabric control point, on par with the x86 CPU, to scale network, security, storage, and manageability functions.<\/p>\n<p>Earlier this fall, VMware rolled out the&nbsp;<a href=\"https:\/\/blogs.vmware.com\/vsphere\/2021\/08\/project-monterey-early-access.html\" rel=\"nofollow\">Project Monterey Early Access program<\/a>, which provides customers an opportunity to collaborate with VMware to test and validate their use cases in a lab environment.&nbsp;<\/p>\n<p>VMware&#8217;s rollout was followed by NVIDIA\u2019s own Project Monterey Early Access Program using servers from Dell Technologies and Lenovo<strong>.<\/strong><\/p>\n<h3 class=\"body\">Network and storage delivery<\/h3>\n<p>Other smartNIC applications include offloading networking applications such as DNS processing.<\/p>\n<p>Storage applications could also be destined for smartNICs. For example, <a href=\"https:\/\/www.networkworld.com\/article\/3280991\/what-is-nvme-and-how-is-it-changing-enterprise-storage.html\">NVMe<\/a> enables faster performance and greater density compared to legacy storage protocols. NVMe is geared for enterprise workloads that require top performance, such as real-time data analytics and online trading. Offloading that control function to a smartNIC could save lots of processing power and offer low-latency networking support.<\/p>\n<p>For cloud and enterprise data centers, there&#8217;s the potential to offload network, storage and security functions as well as security isolation for multi-tenant domains and reducing network latency, Dell\u2019Oro\u2019s Fong said. \u201cFor the telecom market, Smart NICs can also be used to offload [network voice protocol] and [user plane function] from the server. For the developing edge market, Smart NICs can also be tasked with some AI inferencing tasks.\u201d<\/p>\n<h2>SmartNIC for the future<\/h2>\n<p>Momentum for smartNIC use in the enterprise is just beginning to build, but analysts are bullish about the growth potential.<\/p>\n<p>\u201cWe believe it will take at least five to 10 years to achieve mainstream enterprise adoption,\u201d Gartner\u2019s Lerner said. During 2025, the total number of FAC ports shipped will be 18 times more than the current number of FAC ports shipped in 2021, Lerner said.<\/p>\n<p>The Dell\u2019Oro Group predicts smartNIC revenue to grow from about $150M in 2020 to $1.1B in 2025.<\/p>\n<p>For now, there is no lack of interest in developing products. Aside from VMware, Pensando, Aruba, and Intel, there are many other vendors looking to develop smartNIC architectures. One notable example is AWS and its Nitro service.<\/p>\n<p>AWS Nitro employs dedicated hardware cards that offload networking, storage, and management chores from AWS EC2 host servers. The service offers a variety of compute, storage, memory, and networking options.<\/p>\n<p>Juniper Networks recently touted a new smartNIC project called Juniper Edge Services Platform (JESP), which enables the extension of the network to the smartNIC, wrote Juniper CTO Raj Yavatkar in a <a href=\"https:\/\/blogs.juniper.net\/en-us\/engineering-simplicity\/extending-the-edge-of-the-network-with-juniper-edge-services-platform-jesp\" rel=\"nofollow\">blog<\/a>.&nbsp;<\/p>\n<p>\u201cJESP offers life cycle management, observability, and troubleshooting capabilities for smartNIC-accelerated cloud-native applications and network services,\u201d Yavatkar stated. \u201cIt also provides enhanced monitoring, telemetry and visibility of application operations over networks. JESP can be applied within and across data centers&#8211;basically, wherever the edge of the network is terminated.\u201d<\/p>\n<p>Cloud-native containerized firewalls and Layer 7 proxies can be orchestrated and accelerated using&nbsp; smartNIC APIs, Yavatkar stated.<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3641641\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nEnterprise infrastructure that supports data center, cloud and edge networks could someday be dominated by one of its tiniest components&#8211;the smartNIC or data processing unit (DPU).Use of smartNICs in the enterprise is still evolvinging, but the idea behind them&#8211;offloading server CPU duties onto a separate device to free up server cycles&#8211;is not new. Specialized hardware accelerators such as graphics processing units (GPU), field-programmable gate arrays (FPGA), and focused NICs have offloaded CPU workloads in telco, financial, and scientific application processing.\u00a0NaaS is the future but it&#8217;s got challenges<br \/>\nLooking ahead, users and vendors see a way to reduce enterprise costs, improve performance and increase security with smartNICs.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44174,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[1253,1061,762],"class_list":["post-44173","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cloud-computing","tag-network-security","tag-networking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SmartNICs set to infiltrate enterprise network, security worlds 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SmartNICs set to infiltrate enterprise network, security worlds 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-29T18:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2021\/02\/high_speed_train_tunnel_motion_blue_long_exposure_speed_motion_forward_progress_future_whats_next_by_mlenny_gettyimages-1195455865_2400x1600-100877732-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SmartNICs set to infiltrate enterprise network, security worlds\",\"datePublished\":\"2021-11-29T18:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/\"},\"wordCount\":1608,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.jpg\",\"keywords\":[\"cloud computing\",\"Network Security\",\"Networking\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/\",\"name\":\"SmartNICs set to infiltrate enterprise network, security worlds 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.jpg\",\"datePublished\":\"2021-11-29T18:05:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud computing\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud-computing\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SmartNICs set to infiltrate enterprise network, security worlds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SmartNICs set to infiltrate enterprise network, security worlds 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/","og_locale":"en_US","og_type":"article","og_title":"SmartNICs set to infiltrate enterprise network, security worlds 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-29T18:05:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2021\/02\/high_speed_train_tunnel_motion_blue_long_exposure_speed_motion_forward_progress_future_whats_next_by_mlenny_gettyimages-1195455865_2400x1600-100877732-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SmartNICs set to infiltrate enterprise network, security worlds","datePublished":"2021-11-29T18:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/"},"wordCount":1608,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.jpg","keywords":["cloud computing","Network Security","Networking"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/","url":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/","name":"SmartNICs set to infiltrate enterprise network, security worlds 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.jpg","datePublished":"2021-11-29T18:05:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/smartnics-set-to-infiltrate-enterprise-network-security-worlds.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/smartnics-set-to-infiltrate-enterprise-network-security-worlds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud computing","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud-computing\/"},{"@type":"ListItem","position":3,"name":"SmartNICs set to infiltrate enterprise network, security worlds"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44173"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44173\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44174"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}