Arbor Cloud to increase DDoS attack mitigation capacity to 8Tbps

906
Almost 2Tbps: Arbor Networks foils largest-ever DDoS attack
Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks.
Cloud, Services, Arbor, Manageable, Affordable,
Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks.

Arbor Networks Inc., the security division of NETSCOUT, has announced that it has more than doubled the capacity of Arbor Cloud from 2Tbps to 4Tbps, and will have quadrupled capacity to 8Tbps by the end of 2017.

By distributing capacity across four times the number of scrubbing centers globally, attacks can be mitigated faster and closer to the source.

This distributed model enables customer traffic to stay in-region and, in some cases, in-country. Not only does this allow for quicker remediation, it provides additional value by addressing emerging data privacy considerations on cloud service providers.

“In the aftermath of Mirai and with the continued innovation of IoT botnets, the stakes have changed. This capacity expansion reflects Arbor’s deep commitment to building the Arbor Cloud business for the long term. It allows us to not only support enterprises that recognise the need for DDoS protection, but also help our service provider customers who are leveraging their Arbor deployments to deliver revenue generating managed services themselves,” says Brian McCann, president of NETSCOUT’s Security Business unit.


“Arbor Networks has long been a leader in the DDoS mitigation market and this move shows the company’s commitment to the cloud and DDoS managed services going forward,” notes Christina Richmond, programme director for IDC’s Security Services research practice. “Attack size is a significant concern for both service providers and for the enterprise. Arbor Cloud serves both markets, and this distributed architecture and greater scale will help them meet customer demand for years to come.”

Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks adds that with the rapid increase of businesses operating in the region moving their data into the cloud, the new distributed architecture allows for greater scale while also addressing emerging data privacy considerations for cloud services.

Hamman highlights that Arbor Cloud for the Enterprise provides an affordable, fully-managed, best-practice DDoS defence service that tightly integrates on-premise DDoS protection and cloud-based mitigation for best practice defence of its users during any network attack.

Arbor Cloud’s on-premise component, “Arbor Networks APS”, can be deployed as an appliance- or virtual solution, delivering inline-visibility into traffic entering the network, and providing always-on DDoS attack detection and mitigation. The on-premise component can be managed by Arbor as part of a fully managed service, or by the customer. The Arbor APS is enhanced by threat intelligence via the ATLAS Intelligence Feed (AIF). Developed by Arbor’s Security Engineering and Response Team (ASERT), the AIF includes geo-location data and automates the identification of attacks from known botnets and malware while ensuring that updates for new threats are automatically delivered without intrusive software upgrades.

Working in unison with the AIF, Arbor APS can also block outbound threats, helping prevent data exfiltration. Finally, Arbor APS provides protection to existing infrastructure, such as firewalls and Intrusion Prevention Systems (IPS), and to business-critical systems, which are frequent targets of DDoS attacks.

Arbor’s patented “Cloud Signaling” capability tightly integrates on-premise protection with cloud-based defences, significantly reducing the time needed to mitigate attacks. This hybrid, multi-layer defence is an industry best practice for DDoS protection services, ensuring that enterprise networks are protected no matter what type of advanced DDoS attack they are facing.

Arbor Cloud’s on-demand, traffic-scrubbing service, is staffed 24×7 by Arbor’s DDoS security experts, providing complete transparency of operation, including a view into blocked hosts and traffic scrubbing performance, offering the flexibility enterprises need to alter attack countermeasures and thresholds.

Staff Writer