Arbor Networks Rolls Out Virtualized ApplianceArbor Networks Rolls Out Virtualized Appliance
Peakflow X 4.2 runs on VMware's ESX and ESXi hypervisors
April 28, 2010
Chelmsford, Mass., April 27, 2010 " Arbor Networks, a leading provider of security and network management solutions for global business networks, today announced the availability of Peakflow X 4.2 ("Peakflow X Virtual"), a virtualized version of the appliance-based enterprise network security and monitoring product. Peakflow X Virtual runs on VMware's ESX and ESXi hypervisors and offers the same network visibility and security features but in a more cost-efficient manner by leveraging the benefits of a virtualized environment. Peakflow X Virtual enables hosting and network service providers to quickly and cost-effectively deliver new, scalable, cloud-based managed security services to their enterprise customers.
Peakflow X provides the pervasive and intelligent network visibility that's needed to monitor the external security threats, internal network usage, and more than 100 bandwidth-sapping applications that can jeopardize network performance and business success. Peakflow X leverages IP flow technology in existing network devices. It analyzes flow statistics to define normal network behavior. Then, in real-time, its embedded Network Behavioral Analysis (NBA) technology identifies abnormal activity that can indicate a developing security attack long before its signature is created. Since Peakflow X detects network anomalies and threats using NBA technology, it's complementary to signature-based security products such as IDS/IPS, anti-virus and firewalls. In addition to the real-time security information provided by Arbor's Active Threat Feed (ATF) service, Peakflow X also integrates data from Arbor's Active Threat Level Analysis System (ATLAS) " providing contextualized threat intelligence from a global and local perspective.
"The emergence of Peakflow X Virtual is the latest example of advanced security, management and monitoring tools evolving and adapting to new virtual environments," says Phil Hochmuth, an analyst with the Yankee Group. "As more enterprises and service providers move to cloud computing, such tools will be critical for cloud providers to monitor, secure and control their infrastructure."
An Efficient Platform for In-Cloud Managed Security Services The security and availability of data and applications, along with compliance, are the top concerns for enterprises considering adopting the cloud model. Peakflow X Virtual addresses these concerns by enabling hosting and network service providers to complement their existing managed security services with anti-botnet, data loss prevention, post-event forensics, and even compliance services.
"Peakflow X Virtual helps providers meet their customers' needs by providing the visibility and control over their infrastructure that they require as part of a complete managed security services offering. These new services can be delivered with the cost saving benefits of virtualization, resulting from reductions in rack space, power consumption and easier service deployment and maintenance. We are very excited about this release and think hosting and network service providers will be too," said Rob Malan, Arbor Networks co-founder and chief technology officer.
Peakflow X Virtual complements existing IP VPN- and customer premises equipment (CPE)-based managed security solutions by:
* Providing IP VPN customers network and application layer visibility and security services with customized portals;
* Delivering anti-botnet, compromised host detection and quarantine or data loss prevention services that detect internal threats to the IDC; * Offering a full suite of compliance assurance services for regulations such as, the Payment Card Industry (PCI) data security standard, Sarbanes-Oxley Act (SOX), and Gramm-Leach-Bliley Act (GLBA), by utilizing the pervasive visibility and reporting features that provide the ability to audit all network and data center communications and security violations. This enables customers to meet regulatory obligations by ensuring that confidential data is not being accessed or removed from Internet Data Centers by unauthorized personnel; * Complementing existing CPE- based security services by utilizing the Network Behavioral Analysis (NBA) capabilities in Peakflow X to ensure that customer internal use policies are met in addition to detecting threats that are unknown to traditional signature-based security solutions, such as IDS/IPS or anti-virus; and * Leveraging the historical reporting and offloading of raw IP flow data for post-event forensic services.
For more information on Arbor Networks Peakflow X:
About Arbor Networks
Arbor Networks is a leading provider of security and network management solutions for global business networks, including more than 70 percent of the world's Internet service providers and many of the largest enterprise networks in use today. Arbor's secure service control solutions give customers a single, unified view into their networks' performance, helping them to quickly detect anomalous behavior, mitigate threats and enforce policy. This translates into actionable business intelligence to generate new forms of revenue and to maintain a competitive advantage.
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Maximize the Human Potential of Your SOC
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization