Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:57 PM
Dark Reading
Dark Reading
Products and Releases

Arbor Networks Ups IPv6 Security, New Peakflow Enhancements

Announces availability of version 5.6 of Arbor Peakflow SP

Chelmsford, MA, June 27, 2011 – Arbor Networks, Inc., a leading provider of security and network management solutions for next-generation data centers and carrier networks, today announced the availability of version 5.6 of Arbor Peakflow SP, the industry’s leading network-wide infrastructure security and traffic-monitoring platform.

The vast majority of the world’s leading service providers rely on Arbor’s Peakflow SP platform to proactively fend off malicious threats such as botnets and volumetric and application-layer distributed denial of service (DDoS) attacks, while strengthening the availability and quality of their services. The Arbor Peakflow SP platform includes two main components, Peakflow SP and the Threat Management System (TMS). Arbor Peakflow SP combines network-wide anomaly detection and traffic engineering with TMS’s carrier-class threat management that automatically detects and surgically removes only attack traffic while maintaining legitimate business traffic.

“As IPv6 connectivity, applications and increased traffic are introduced into operator networks, IPv6 threats, attacks and network security breaches become more prevalent. This increase, combined with a dual IPv4/ IPv6 environment, brings more complexity to operator networks,” said Becky Watson, principal analyst with Frost & Sullivan. “Arbor's new Peakflow SP 5.6 release builds on its current IPv4 strengths while addressing IPv6 security issues and enabling more visibility and automation to reduce complexities in network management.”

Stopping DDoS Attacks in IPv6 Networks

In previous releases Peakflow SP enabled operators to gain critical visibility into IPv6 traffic. With version 5.6, Peakflow adds the capability to mitigate attacks over IPv6. First, the highly effective Peakflow SP TMS mitigation architecture available for IPv4 networks is now available for IPv6. Operators can use techniques such as Remote Triggered Blackhole Routing (RTHB) and TMS diversion/reinjection to quickly and effectively deal with attacks over IPv6. Second, the release provides a comprehensive suite of IPv6 threat countermeasures, enabling the TMS system to screen out IPv6 attack traffic, while allowing legitimate traffic to reach the intended destination.

Streamlined Workflow, Enhanced Automation

Peakflow SP 5.6 adds new features that enable operators to easily establish accurate mitigation thresholds, automate the configuration of large deployments, provide for more customer control of managed services, and offers expanded reporting and router support.

Cloud Signaling: A Faster, Automated Way to Provide Comprehensive DDoS Mitigation

An important new capability recently introduced by Arbor is Cloud Signaling, a protocol that bridges the gap between the data center edge and the provider cloud. The Arbor Pravail Availability Protection System is an on-premise data center solution that utilizes Cloud Signaling to automatically signal upstream to the provider cloud, where the Arbor Peakflow SP platform is pervasively deployed. This Cloud Signaling capability enables optimal protection of the Internet data center from availability threats, identifying and mitigating application-layer attacks at the data center edge and volumetric denial of service attacks in the provider cloud. No other vendor is able to offer this comprehensive, automated protection against availability threats to IDC infrastructure.

“Arbor is ensuring that the visibility and security Peakflow SP and TMS provided for IPv4 networks is available for IPv6. IPv6 is vulnerable to many of the same threats we see in IPv4, but there are also new vulnerabilities unique to IPv6. With this release we address both issues. We also streamlined workflow and provided more automation, enabling our customers to stay in control as their networks become more complex,” said Rob Malan, chief technology officer, Arbor Networks.

For more information on Arbor Networks DDoS Detection & Mitigation Solutions please visit: http://www.youtube.com/user/ArborNetworks

About Arbor Networks

Arbor Networks, Inc. is a leading provider of network security and management solutions for next-generation data centers and carrier networks, including the vast majority of the world’s Internet service providers and many of the largest enterprise networks in use today. Arbor’s proven network security and management solutions help grow and protect customer networks, businesses and brands. Through its unparalleled, privileged relationships with worldwide service providers and global network operators, Arbor provides unequalled insight into and perspective on Internet security and traffic trends via the Active Threat Level Analysis System (ATLAS). Representing a unique collaborative effort with 100+ network operators across the globe, ATLAS enables the sharing of real-time security, traffic and routing information that informs numerous business decisions.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.