Hi [[ session.user.profile.firstName ]]

Arbor Networks for Customers

  • Date
  • Rating
  • Views
  • How to Calculate the Financial Impact of an Attack on Your Network
    How to Calculate the Financial Impact of an Attack on Your Network
    Ben Fischer, Senior Product Marketing Manager, Arbor Networks Recorded: Oct 30 2014 41 mins
    Security incidents can have broad ranging impacts on a service provider, its customers and its peers. Damage can be hard to calculate after an incident and even harder to predict the number, size, type, and targets of an attack. Despite these complexities, we will review how you can forecast future financial burdens of any attack(s) and leverage this knowledge for business planning. During this webinar, we will explore ALE (Annualized Loss Expectancy) and how to use it to analyze risk and investments in security products.
  • Leveraging the Uniqueness of the Arbor Networks Threat Intelligence Feeds
    Leveraging the Uniqueness of the Arbor Networks Threat Intelligence Feeds
    Darren Anstee, Director, Solutions Architects, Arbor Networks Recorded: Oct 30 2014 40 mins
    Staying abreast of the latest cyber threats is a daunting task for even the best of security teams. Timely and high-fidelity threat intelligence can be the difference between business continuity and business disaster. In this session, you will learn about the uniqueness of the Arbor Networks ATLAS Intelligence Feed (AIF) and how it is used to arm different Arbor products to provide a comprehensive cyber threat protection solution.
  • Delivering a Comprehensive, Arbor-based, DDoS Protection Service
    Delivering a Comprehensive, Arbor-based, DDoS Protection Service
    Tom Bienkowski, Director, Product Marketing, Arbor Networks Recorded: Oct 30 2014 45 mins
    Due to changes in motivation and the abundance of do-it-yourself DDoS attack tools/services, DDoS attacks are rising in size, frequency and complexity. In turn, enterprises of all sorts are turning to their ISPs and managed security service providers for help. In this session, we’ll share examples of how Arbor Networks’ products and services can be monetized to deliver a comprehensive portfolio of in-cloud and CPE-based DDoS protection services.
  • Shedding Light on Threats That Lurk in Your Network Blind Spots
    Shedding Light on Threats That Lurk in Your Network Blind Spots
    Tom Bienkowski, Director, Product Marketing, Arbor Networks Recorded: Oct 29 2014 33 mins
    Network visibility is a fundamental requirement for proper network and threat management. You can’t protect yourself (or your customers) from what you can’t see.

    In this session, you’ll learn about how the Arbor products, specifically Peakflow SP 7.0 with Flex Licensing and Pravail enable service providers to cost-effectively gain the proper level of visibility into their customer edges and data centers in order to detect and stop threats before they impact the availability of their services.

    This session will highlight real-world use cases and a recent report from the FCC’s CSRIC (Communication, Security, Reliability, Interoperability Council) Working Group 5: Remediation of Server‐Based DDoS Attacks.
  • How to Stop a DDoS Attack in Less Than 1 Minute
    How to Stop a DDoS Attack in Less Than 1 Minute
    Scott Iekel-Johnson, Product Manager, Arbor Networks Recorded: Oct 29 2014 42 mins
    When you are under attack, every seconds counts. In this session, you will learn about the new features in Peakflow v7.0 that are designed to significantly reduce the time required for DDoS attack detection, mitigation and comprehensive reporting -- in some cases, reduced to less than 1 minute. Other new Peakflow SP 7.0 features, such as tag-based reporting, new DDoS attack countermeasures and SSL decryption will also be discussed.
  • DDoS and Malware Trends: Incident Response in the New Era of Targeted Attacks
    DDoS and Malware Trends: Incident Response in the New Era of Targeted Attacks
    Gary Sockrider, Solutions Architect, Arbor Networks Recorded: Oct 29 2014 48 mins
    This session will present insights from Arbor Networks’ Worldwide Infrastructure Security Report and Arbor's ATLAS® real-time threat monitoring system. You will learn about the largest DDoS attacks on record, as well as stealthy POS malware and nation state campaigns. Discover best practices and implications for preparing and responding more effectively within this new era of targeted attacks where organizations are most under-prepared and unprotected.
  • Pravail Security Analytics for Service Providers
    Pravail Security Analytics for Service Providers
    Yaroslav Rosomakho, Senior Channel Consulting Engineer, EMEA Recorded: May 29 2014 28 mins
    Understanding attacks that have bypassed defenses and gained a foothold in the network has become a priority for IT security teams. These teams are dealing with a constant, escalating barrage of attacks on the network—as well as a steady stream of information alerting them to other potential threats. Attackers are counting on this chaos to remain undetected, for as long as possible. Motivated by profit or other political gains, these attackers will look to exploit any vulnerability in a network, often using methods that bypass traditional security systems designed to actively prevent such an attack. Once embedded in a network, these attackers may stay inactive for months before using compromised hosts to attack other parts of the organization or to systematically exfiltrate data from the target environment. The Pravail® Security Analytics platform enables organizations to deal with advanced threats by offering an unprecedented and detailed view of the attacks in any captured network traffic. In this webinar, we will introduce you to Pravail Security Analytics, share use cases and discuss unique MSSP opportunities enabled by Pravail Security Analytics.
  • Peakflow Mobile Network Analysis: Arbor's Mobile Visibility and Threat Detection
    Peakflow Mobile Network Analysis: Arbor's Mobile Visibility and Threat Detection
    Talbot Hack, Senior Product Manager, Arbor Networks Recorded: May 29 2014 36 mins
    Peakflow Mobile Network Analysis – an extension of Arbor Networks' best-in-class Peakflow visibility and threat management solution for Service Providers – addresses the unique challenges associated with ensuring mobile network service dependability/availability. Peakflow Mobile Network Analysis provides real-time visibility into the sources, frequency and impacts of potential attacks and misuses on the HSPA/LTE packet core signaling plane, enabling proactive detection and mitigation of unwanted traffic and emerging threats before they affect critical network resources. This presentation provides an overview of the current solution, its use cases and Arbor's vision in the context of key operational and security challenges and Mobile Network Operator (MNO) needs.
  • Gambling with Security and Availability: Is Your Data Center Prepared?
    Gambling with Security and Availability: Is Your Data Center Prepared?
    Ben Fischer, Senior Product Marketing Manager, Arbor Networks Recorded: May 28 2014 49 mins
    As Hosting and Cloud Service Providers, you face many risks today, especially in the realm of security , the availability of your infrastructure and the service that you enable for your customers. Risks range from being the target of an attack to being impacted by the collateral damage of an attack directed at a customer, peer, or a non-affiliated organization. During this webinar, we will review potential security and availability risks and the damage and costs they cause Hosting and Cloud Service Providers and your customers.
  • An Introduction to the Value of Peakflow SP 6.0 and Flex Licensing
    An Introduction to the Value of Peakflow SP 6.0 and Flex Licensing
    Tom Bienkowski, Director Product Marketing, Arbor Networks Recorded: May 28 2014 43 mins
    Modern day service provider networks are complex and under constant threat. In this session, we’ll introduce you to the major improvements in performance, scalability and financial benefits of Peakflow SP 6.0’s new Flex Licensing that enable you to meet challenges of today and the future.

Embed in website or blog