Ensure your service availability and performance by delivering automated, 24/7 Distributed Denial of Service attack mitigation and real-time visibility into network applications.

DDoS attacks continue to rise in size, frequency and complexity. Are you prepared to stop them before they impact the availability of your business? Cloud connective can help you be prepared with a DDOS solution with Arbor Peakflow.

Maximizing Business Potential

Businesses have never been more connected and dependent on the availability of websites and online services.

At a time when availability has never been more important, a DDoS attack has never been more innovative, dynamic or consequential. It won’t come as any surprise to security professionals that the modern DDoS attack is increasing in sophistication, scale and frequency.

So what changed? We’ve seen a renaissance in DDoS attack tools and techniques that has led to tremendous innovation. The barrier to entry has been obliterated by new tools that enable anyone with an Internet connection and a grievance to launch a DDoS attack. This is a true game changer in terms of the threat landscape and what businesses should consider themselves a potential target of attack. It used to be certain verticals would be likely targets for a DDoS attack; finance, gaming and e-commerce at the top of the list. Today, any business, for any reason, any real or perceived offense or affiliation, can become a target of a DDoS attack.

connected-globally

Embedded ASR 9000 vDDoS Protection

Through a technology partnership with Cisco, TMS technology is an available option as ASR 9000 vDDoS Protection on Cisco’s Virtualized Services Module (VSM) for the Cisco Aggregation Services Router (ASR) 9000 Series of Routers. With up to 40 Gbps of intelligent mitigation capacity and Tbps of Openflow enabled blacklisting, the ASR 9000 virtual distributed denial of service solution protects the edges of your network and serves as a powerful line of defense in a multi-tier defense strategy. The ASR 9000 is Cisco’s best in class router and does not require additional rackspace, power, cooling, ports or wiring. It eliminates the need to backhaul attack traffic over the backbone network.
Beyond the democratization of DDoS are the advancements in attack techniques and targets. A DDoS attack today is in fact a series of attacks that target not just connection bandwidth, but multiple devices that make up your existing security infrastructure, such as Firewall/IPS devices, as well as a wide variety of applications that the business relies on, like HTTP, HTTPS, VoIP, DNS and SMTP.

DDoS attacks will generally fall into one of three categories:
Volumetric DDoS Attacks
Attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet.
TCP State-Exhaustion DDoS Attacks
This type of DDoS attack attempts to consume the connection state tables which are present in many infrastructure components such as load-balancers, firewalls and the application servers themselves.
Application Layer DDoS Attacks
This is the most deadly kind of DDoS attack. It can be very effective with as few as one attacking machine generating a low traffic rate (this makes these attacks very difficult to proactively detect and mitigate).
Arbor provides the industry’s most comprehensive suite of DDoS attack protection products and services for the Enterprise, Cloud / Hosting and Service Provider markets. Whether it be fully managed DDoS protection services; virtual, in-cloud or on-premise DDoS mitigation appliances; or embedded DDoS solutions within existing Cisco ASR 9000 routers, Arbor has the deployment model, scalability and pricing flexibility to meet the DDoS protection needs of any organization operating online today.
When you’re under attack, every second counts. Time to mitigation is critical for service providers because Fast Flood attacks can ramp up to multi-hundred gigabits in size in a matter of seconds, and have the potential to cause significant collateral damage across a provider network. In 2014, the DDoS landscape has been dominated by these very large attacks that leverage reflection/amplification capabilities within such network elements as DNS, NTP and more recently Simple Service Discovery Protocol (SSDP). Through the end of the third quarter, Arbor has seen more than 130 attacks larger than 100Gbps, a dramatic spike in the frequency of volumetric attacks compared to previous quarters.
The majority of the world’s service providers rely on the Peakflow platform for network intelligence and DDoS protection. More than sixty providers utilize the Peakflow platform to also offer DDoS managed services to their customers. Our continued innovation in the area of DDoS attack detection and mitigation has duel benefits for our service provider customers, helping protect their own infrastructure while also improving their ability to deliver DDoS managed security offerings.

Arbor Networks Peakflow Portfolio

Many of the world’s leading cloud, hosting and service providers rely on Arbor’s Peakflow DDoS protection platform to proactively fend off malicious threats such as botnets and volumetric and application-layer distributed denial of service (DDoS) attacks, while strengthening the availability and quality of their services.

The Peakflow  platform includes two main components, Peakflow and the Peakflow Threat Management System. Peakflow combines network-wide anomaly detection and traffic engineering with the Peakflow Threat Management System’s carrier-class threat management, which automatically detects and surgically removes only attack traffic, while maintaining other business traffic. With the ability to mitigate only the attack traffic, customer-facing services remain available while providers actively mitigate attacks.

The Peakflow  platform also powers many of the world’s leading cloud-based DDoS managed security services.

New Features in Peakflow 7.0

Built-in SSL Inspection to Block Encrypted Attacks
As the Internet evolves to increasingly rely on SSL encryption, DDoS attacks have also evolved to encrypt malicious traffic and evade defenses. The Peakflow Threat Management System now includes an optional on-box SSL acceleration card to deliver an integrated, one-appliance solution to inspect encrypted traffic for DDoS threats. DDoS attacks are blocked in real time as normal traffic passes uninterrupted – all without forcing changes to existing network and application infrastructure.
New and Improved Attack Countermeasures
The Peakflow Threat Management System now includes enhanced threat protection delivered as part of the YATLAS® Intelligence Feed. Arbor Peakflow 7.0 delivers an improved set of countermeasures designed to stop the most advanced HTTP, DNS, and TCP connection attacks. Two new countermeasures included in this release provide enhanced protection against flooding and server exhaustion   attacks.
Enhanced Workflow, Reporting and Analysis
Redesigned DDoS attack alert dashboards now include substantial new data analysis for DDoS attacks, including geographic information (what countries attacks are coming from), network information (which networks the attacks are coming from), and automatic identification of major attack patterns to enable operators to quickly and easily identify the attack and understand how to block it.

Location, Location, Location

Automated Distributed Denial of Service Attack Mitigation and Service Visibility
A vital component of the Arbor Networks SP solution, Arbor Networks TMS surgically removes distributed denial of service attack traffic from your network without disrupting key network services. It also provides comprehensive, real-time visibility into your network applications, proactively monitoring denial of service attacks so you can maintain your service performance.
Features & Benefits
Advanced, Automated Denial of Service Threat Detection and Mitigation
TMS provides a full suite of countermeasures that surgically removes up to 8Tbps of distributed denial of service attack traffic while enabling the flow of legitimate traffic – all without interrupting your network services. Proven effective for detecting and removing threats such as high-volume flood attacks, stealthy application-layer attacks and attacks hidden in SSL packets, TMS safeguards IPv4 and IPv6 infrastructure from distributed denial of service attacks. Automated and proven, TMS works to keep your network and services up 24 hours a day, seven days a week, 365 days a year.
A Flexible and Scalable Denial of Service Solution
With a choice of models to meet diverse deployment needs, TMS automatically detects and surgically removes up to 160 Gbps of distributed denial of service attack traffic from a single appliance. Providing up to 8Tbps of denial of service attack mitigation capacity in a single deployment, its flexible and scalable architecture is ideally suited for in-cloud deployment and the delivery of managed services.

1 Scalability
Did your computing needs shoot up overnight? Or did they drop drastically during your slow season? Instead of having to hire — or fire — new staff or purchase more equipment to handle it yourself, you can just make a call to your colocation provider and scale your service up or down as needed.

2 Connectivity
Colocation providers keep your servers in climate-controlled data centers, with high bandwidth speeds, and excellent redundancy for network connections. You won’t have to pay the costs to purchase and maintain this kind of IT infrastructure in your own offices, and your internal IT staff can focus on other business operations.

3 Security
Quality colocation providers house your servers in secure data centers, with security measures that include biometric scanners, closed circuit cameras, on-site security, coded access, alarm systems, and more. And with colocation, you

don’t have to hire or purchase any of these security measures yourself — it’s all included in your service plan.

4 Stability
If you have to move offices, or are hit with a power outage, or suffer a natural disaster, you won’t have to worry about your data or services going down. A colocation provider will have multiple backup generators and contingencies in place to ensure that there is never an interruption in service, for you, or for your customers.

5 Predictability
Not only does using a colocation provider often save money, but it also turns unpredictable capital outlays into predictable monthly expenses.  You only pay for your own equipment, not a whole datacenter.  Your company will be able to budget for IT needs and allocate existing resources more efficiently.