Arbor Enhances Peakflow X 3.7Arbor Enhances Peakflow X 3.7
Arbor Networks announced a new version of its enterprise solution, Arbor Peakflow X 3.7
April 2, 2007
LEXINGTON, Mass. -- Arbor Networks, a provider of network security and operational performance for global business networks, today announced a new version of its enterprise solution, Arbor Peakflow X 3.7, that includes new functionality designed to improve time to resolution for enterprise network, security and operations staff. Peakflow X 3.7 includes integration of data gathered by Arbor’s Active Threat Level Analysis System (ATLAS), the world’s first globally scoped threat analysis network, dramatically reducing the manual collection and analysis of new vulnerabilities, exploits, botnets and malware. Peakflow X 3.7 also includes an extended audit trail for compliance reporting, enhanced Flow support for IPFIX, a web services Application Programming Interface (API) that allows users to perform data queries and to integrate Peakflow X data with existing internal systems or customer portals, and finally, enhancements to the User Interface that result in more intuitive, efficient workflow.
“Enterprise networking and security staff are overwhelmed by the multitude of threats, compliance requirements and operational issues involved in managing a corporate network today,” said Paul Morville, Arbor’s vice president of product management. "With Peakflow X 3.7, we are addressing this through the integration of ATLAS data, API’s and User Interface improvements, all of which make it possible to automate processes and improve time to resolution.”
Peakflow X is used for three main purposes: internal network security, network-wide traffic visibility and compliance. Peakflow X constructs a system-wide view of the entire network, auto-learning host behaviors to determine who talks to whom, and how. In real-time, Arbor Peakflow X compares traffic against these baselines to perform network behavior analysis (NBA), an innovative management technique used to identify developing security threats that do not yet have signatures – and therefore may easily slip by other devices such as intrusion prevention systems and firewalls – including virulent "zero day" attacks.
"Peakflow X is a product that allows us to leverage and augment prior investments in network infrastructure equipment, network analysis and network security products. We use Peakflow X for two main purposes, to detect unknown threats that are not detected by our signature based security products such as Anti-Virus, IPS and HIPS and we also use it for network segmentation and profiling," said David Arbo, director of network security at American President Lines. "In Peakflow X 3.7 we use the newly integrated ATLAS global threat detection along with the Active Threat Feed (ATF) policies to help us detect and prioritize our internal threat mitigation efforts."
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023