INGATE

From The Sip Trunking Experts

TMCNet:  Arbor Networks Updates Industry-Leading Peakflow(R) SP Platform

[January 08, 2013]

Arbor Networks Updates Industry-Leading Peakflow(R) SP Platform

BURLINGTON, MA, Jan 08, 2013 (MARKETWIRE via COMTEX) -- Arbor Networks, Inc., a leading provider of network security and management solutions for enterprise and service provider networks, today announced the availability of version 5.8 of Peakflow SP, the leading network-wide infrastructure security and traffic-monitoring platform for service, hosting and cloud providers.


The vast majority of the world's leading service providers rely on Arbor's Peakflow SP platform to proactively fend off malicious threats such as botnets and volumetric and application-layer distributed denial of service (DDoS) attacks, while strengthening the availability and quality of their services. The Peakflow SP platform includes two main components: Peakflow SP and the Peakflow SP Threat Management System (TMS). Peakflow SP combines network-wide anomaly detection and traffic engineering with TMS's carrier-class threat management, which automatically detects and surgically removes only attack traffic, while maintaining business traffic. With the ability to mitigate only the attack traffic, customer-facing services remain available while providers actively mitigate attacks.

"For more than 12 years, Peakflow SP has been deployed in the most demanding network environments in the world. The robust platform has evolved significantly over the years. Today, Peakflow SP addresses security issues like DDoS, operational issues such as service quality and network performance and even serves as a platform for revenue generation as a feature of managed security services, which are increasingly in demand by enterprises looking for an added layer of security protection," said Arbor Networks President Colin Doherty.

New Features in Peakflow SP 5.8 New Application Processor Module (APM) Card for the TMS 4000: To boost mitigation capacity, counter growing attack volumes and help provide investment protection, the Peakflow SP solution now includes a new APM-E card. The APM-E is the packet processing blade on the TMS that examines and selectively blocks attack traffic. The APM-E replaces the APM-10, delivering large gains in packet processing throughput with no increase in price. A single TMS-4000 chassis can be populated with up to four APE-10 or APM-E modules, enabling a total of 40 Gbps of mitigation capacity.

CDN and Proxy Aware Mitigation: Many businesses rely on CDNs (content delivery networks) to deliver web content and services to end users.

When content or services are under attack, it can appear that the attack source is a CDN server and not the true attacker. Blocking attack traffic based on source address would cut off the flow of non-attack traffic from the CDN server to the enterprise. The new version of Peakflow SP addresses this advanced mitigation issue by including the sophistication needed to identify and stop attacks that come via a proxy such as a CDN server without interrupting legitimate business traffic from that source.

BGP Flowspec Offramp to TMS: With this release, the BGP Flowspec offramp enables a broader set of diversion criteria based on source and/or destination IP, port and protocol. This feature enables traffic diversion into an MPLS backbone and allows reinjection without the need for GRE tunneling, making DDoS attack mitigation easier for service providers and data center operators.

Profiled Interface Alerts: Peakflow SP can monitor network interfaces and generate alerts when traffic through an interface goes above or below defined thresholds; this alerting capability was previously limited to networks and IP addresses. This new feature is especially useful for subscriber services such as broadband/DSL. For example, Peakflow can monitor interfaces on B-RAS devices and alert operators to service impacting events that can affect customer satisfaction and result in expensive help desk calls.

User Account Scale Increase: Up to 1,000 customers can now be provisioned for monitoring, alerting, reporting and mitigation in a single Peakflow SP deployment. This more than doubles the previous limit and helps enable managed service providers to expand their business without additional capital investments.

For more information on Arbor Networks(R) DDoS Detection & Mitigation Solutions, please visit: http://www.youtube.com/user/ArborNetworks.

About Arbor Networks Arbor Networks, Inc. is a leading provider of network security and management solutions for enterprise and service provider networks, including the vast majority of the world's Internet service providers and many of the largest enterprise networks in use today. Arbor's proven network security and management solutions help grow and protect customer networks, businesses and brands. Through its unparalleled, privileged relationships with worldwide service providers and global network operators, Arbor provides unequalled insight into and perspective on Internet security and traffic trends via the ATLAS(R) Active Threat Level Analysis System. Representing a unique collaborative effort with 240+ network operators across the globe, ATLAS enables the sharing of real-time security, traffic and routing information that informs numerous business decisions.

For technical insight into the latest security threats and Internet traffic trends, please visit our website at arbornetworks.com and our blog at http://ddos.arbornetworks.com.

Trademark Notice: Arbor Networks, Peakflow, ArbOS, How Networks Grow, ATLAS, Pravail, Arbor Optima, Cloud Signaling, the Arbor Networks logo and Arbor Networks: Smart. Available. Secure. are all trademarks of Arbor Networks, Inc. All other brand names may be trademarks of their respective owners.

Contact: Arbor Networks Kevin Whalen Director, Corporate Communications Direct: +1 978 703 6663 E: kwhalen@arbor.net SOURCE: Arbor Networks mailto:kwhalen@arbor.net

[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner


Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.