Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Arbor Networks announced an updated with Peakflow SP 4.0

October 2007 by Marc Jacob

Arbor Networks, a provider of network security and operational performance for global business networks, announced an updated and expanded version of the Peakflow SP platform (“Peakflow SP”), which improves network security and operational performance for more than 70% of the world’s service provider networks. Peakflow SP 4.0 combines pervasive, cost-effective network-wide visibility with deep application insight and analysis of critical network traffic, services and applications - providing a unified solution for ensuring the availability of the next-generation services. Peakflow SP is delivering a unique combination of security, visibility and policy enforcement in a single box.

Peakflow SP provides real-time, network-wide anomaly detection and reporting of routing and traffic patterns across the entire network. Peakflow SP helps providers understand and visualize threats on their network, whether they stem from an attack, misconfiguration or the longer-term impact of changes in network utilization. Providers can quickly determine the root cause of changes, which may be the result of new applications, customers and/or violations in usage policy. Providers also have the ability to evaluate peering relationships and optimize transit speed.

Peakflow SP 4.0 contains several new features that empower providers to better protect and manage their most valuable asset, the network.

New Threat Management System Models

Arbor’s Threat Management System (TMS) that provides carrier-class, deep packet inspection, has been met with broad market acceptance by service providers because it enables them to effectively manage and control rapidly evolving applications in their networks; such as voice, video, data, messaging, file sharing, web, mail, etc. Arbor is now offering a range of TMS models to meet the diverse deployment needs of providers and to enable new product uses, which may range from DDOS mitigation to flow generation.

TMS 1200 – A 1 RU appliance, capable of supporting 1.5 Gbps of surgical mitigation, designed to be deployed in dedicated customer and edge POP scenarios.

TMS 2200 – A 2 RU appliance, capable of supporting 1.5 Gbps of surgical mitigation, designed to be deployed in dedicated customer and edge POP scenarios which require NEBS compliance

TMS 2700 – A 2 RU appliance, capable of supporting 3-8 Gbps of surgical mitigation, designed to be deployed in regional Scrubbing Centers, large Peering POPs and next to critical network infrastructure.

Application Intelligence

Application Intelligence was developed to augment the Peakflow SP platform’s traditional flow-based pervasive network visibility with new application-layer intelligence required to secure and manage critical business applications. Provider customers can now understand what applications are running on their network, profile application network behavior, and detect and report on application traffic violations, thus reducing down-time and problem resolution.

BI Device

A new, fully integrated component of Peakflow SP, Arbor’s BI device increases scalability, provides redundancy and improves the overall breadth and depth of network-wide visibility, allowing providers to make more informed “Next Generation Network” business decisions, reduce costs, increase revenues and maintain customer satisfaction.

Other enhancements to Peakflow SP 4.0 include:

Enhancements to Reporting & Alerting
More intuitive, flexible, customer-focused network, application and DDoS reports and alerts.
Improved ability to detect and mitigate threats, optimize IP service performance, and increase managed service revenue.
Improvements to TMS Mitigation Workflow
Simplified TMS management and expanded deployment scenarios improve DDoS detection, surgical mitigation, reporting and potential for managed services.


Related articles:


See previous articles

    

See next articles