Cloud

10/17/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Arbor Networks Introduces DDoS Protection for Small and Medium Enterprise

Advanced DDoS protection aims to provide service to customers without their having to sacrifice.

BURLINGTON, Mass.– Arbor Networks, the security division of NETSCOUT, announced today that it is making advanced DDoS protection available to small and medium-sized businesses through a suite of affordable, flexible options that range from on-premise appliances to virtualized solutions and Amazon Web Services support for unified protection across hybrid cloud environments. Enterprises no longer have to sacrifice performance for price or settle for bolted-on, check-the-box DDoS protection solutions that lack essential functionality. These new offerings reflect Arbor’s ongoing commitment to support the enterprise of all sizes in protecting their networks from DDoS threats that continue to escalate in terms of their attack frequency, volume, and complexity.

“Arbor’s technology was originally developed to meet the exacting security and network availability needs of large enterprises. By adapting its technology to smaller and medium-sized businesses, at prices and in form factors that better suit their business and operational models, Arbor is significantly expanding the level and quality of DDoS protection now available to these organizations. Given their reliance on cloud-based applications and digital services, network availability is as fundamental as electricity,” said Rob Ayoub, Research Director in IDC's Security Products program.

Easy to Deploy & Operate

Whether deployed as an appliance, VM, or AWS instance, Arbor’s APS solution is designed for smaller IT teams with limited resources. Easy to deploy with extensive built-in automation, its “plug & play” design means it can be quickly and easily installed using the default settings - even during an attack. In addition to its robust out-of-the-box capabilities, Arbor APS allows users to quickly fine tune protections specific to their network. The platform’s intuitive UI and rich feature set have won recognition from industry analysts and award programs around the world.

World-Class DDoS Defense

Arbor recommends hybrid, or multi-layer defense to protect against all types of DDoS threats. Cloud-based protection is essential to defend against large, high volume attacks while on-premise protection, as delivered by Arbor’s APS, also provides protection against complicated application-layer and TCP state-exhaustion attacks. Arbor APS incorporates sophisticated detection and mitigation technology providing a complete view of network activities, enabling fast and automatic blocking of attacks before they impact critical applications and services.

Arbor also extends, automates and integrates protection to the cloud by using Cloud Signaling technology to connect on-premise protection with cloud-based DDoS services. The APS can be set to alert upstream service providers, such as your ISP or Arbor Cloud, when larger attacks threaten availability, ensuring the rapid mitigation of DDoS attacks before they overwhelm local resources.

Integrated Global Threat Intelligence

Beyond the product benefits, Arbor provides visibility into internet traffic and threats, as well as the actionable insights and threat protections from our world-renowned security research team. The ATLAS Intelligence Feed provides the products with automated, continuously updated protections from the latest and most serious threats targeting your business.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.