Hi [[ session.user.profile.firstName ]]

Arbor Networks

  • Date
  • Rating
  • Views
  • DDoS Fossils to Future: A Brief History and What to Expect DDoS Fossils to Future: A Brief History and What to Expect Gary Sockrider, Chief Security Technologist, Arbor Networks Recorded: Sep 13 2016 48 mins
    The history of DDoS provides a clear, unambiguous guide as to where things are going - attacks are becoming more expansive, impacting a wider variety of targets, and the durations are longer and more destructive. Response strategies however, have kept pace and can handle the scale. Available in variety of deployment options and informed by vast quantities of intelligence, the right technology can empower you to stay abreast the threats and prevent or mitigate the inevitable attacks. The key is in discovering the optimal match between your architecture and the available solutions.

    Join this session to find out:
    -Learnings from past DDoS threat and attack trends
    -How today’s DDoS poses threat to any organization’s availability
    -What prevention and mitigation approaches are proving most effective
  • Why the Human Factor Matters in the Age of Machines Why the Human Factor Matters in the Age of Machines Paul Bowen, Principal Security Technologist, Arbor Networks Recorded: Aug 25 2016 49 mins
    With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race.

    But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more and more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness.

    As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption

    Join Arbor’s Paul Bowen for a discussion on how using humans to combat humans is the new normal...
  • The Human Factor in the Age of Cyber Conflict The Human Factor in the Age of Cyber Conflict Chandler Howell, CISSP, Nexum, Inc. and Paul Bowen, Principal Security Technologist, Arbor Networks Recorded: Aug 24 2016 44 mins
    With new technologies appearing daily, attackers have a constant stream of potential new tools, tactics and practices to use as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race.
    But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness.
    As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption.
  • Defending Oil & Gas Industrial Control System (ICS) Networks Defending Oil & Gas Industrial Control System (ICS) Networks Jim Linn, Managing Director, IT, American Gas Association + Tom Bienkowski, Director Product Marketing, Arbor Networks Recorded: Jun 16 2016 44 mins
    A 2015 McKinsey study suggests oil and gas companies could realize $1B in cost savings or production increases by better leveraging existing data and IT technologies. Convergence of Industrial Control System (ICS) networks with corporate IT and partner networks is one such way to increase productivity; the downside it that this also increases risk.

    Join this webinar where we'll discuss the growing threats targeting Oil & Gas ICS networks from Distributed Denial of Service (DDoS) attacks, ICS specific malware and advanced attacks – and more importantly best practices in threat defense.
  • Ready Before the Smoke Clears: understanding the correlation between DDoS attack Ready Before the Smoke Clears: understanding the correlation between DDoS attack Chris Rodriguez, Senior Industry Analyst, Frost and Sullivan and Tom Bienkowski, Director- product Marketing Arbor Networks Recorded: Jun 8 2016 44 mins
    A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you’re working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent activities.

    Learn to listen to your network activity:

    -Clues from DDoS attacks that will help you investigate threats
    -Why organizations like FFIEC warn banks about the use of DDoS
    -Best practices for DDoS protection
  • Will the Real Advanced Threat Stand Up? Attack Campaigns in 2016 and Beyond Will the Real Advanced Threat Stand Up? Attack Campaigns in 2016 and Beyond Richard Stiennon, Research and Industry Executive, Security Current + Arabella Hallawell,Sr. Director of Product Marketing Recorded: Feb 18 2016 59 mins
    For years the security industry has concluded that advanced persistent threats involve some sort of malware in order to be successful. While malware can be used to exploit a target, a sea-change in the threat landscape has taken place, which extends beyond the need for more sophisticated malware detection alone; attack campaigns.

    Attack campaigns are not just a one-and-done attack hoping to compromise an endpoint, but rather an objective focusing on a specific motive and mission with the intention and design to persevere and proliferate, until the campaign is deemed successful.

    In this webinar you'll hear from Richard Stiennon of Security Current on:

    -Attack Campaigns- what they are and how to protect yourself

    -Case studies in how organizations protect themselves

    -Arbor Networks' approach to Threat Intelligence campaign tracking and see Arbor Spectrum, a brand new platform designed with the security user in mind to investigate and prove attack campaigns 10x more efficiently than existing solutions today.
  • Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report Pulse on Advanced Threats: Findings from Arbor Networks' WISR Report Paul Bowen, Principal Security Technologist + Arabella Hallawell, Senior Director of Product Marketing, Arbor Networks Recorded: Feb 11 2016 43 mins
    A discussion on the current state of advanced threat protection and incident response preparedness that will include both highlights from Arbor's Worldwide Infrastructure Security Report (WISR) as well as original research by Arbor's Security Engineering & Response Team (ASERT). The WISR is a global survey of security professionals, highlighting the key trends in the threat landscape along with the strategies network operators adopt to address and mitigate them. We’ll also provide a deep understanding of two attack campaigns discovered by ASERT. One multi-stage attack campaign was focused on government organizations and a second was focused on financial services organizations.

    This session will cover:

    • The primary challenges facing security teams with emphasis on the balance between technology, people and process.

    • Insight into attack campaigns happening on the broader Internet and an understanding of why it is critical to connect that activity to conversations on internal networks.

    • How businesses are adapting and changing their threat detection and incident response to reduce risk posture
  • 2016 Annual Worldwide Infrastructure Security Update 2016 Annual Worldwide Infrastructure Security Update Gary Sockrider, Principal Security Technologist, Arbor Networks Recorded: Feb 4 2016 53 mins
    Arbor Networks' 11th Annual Worldwide Infrastructure Security Report (WISR) offers a rare view into the most critical security challenges facing today’s network operators. This session will review the highlights from the report to help network operators understand the breadth of the threats that they face, gain insight into what their peers are doing to address these threats, and comprehend both new and continuing trends.

    This year reveal a 60x increase in DDoS attack size, a marked increase in cyber extortion attempts and an influx of advanced threats, all of which is driving an increased focus on DDoS mitigation best practices and rapid adoption of incident response plans.

    Join this presentation to:

    · Hear about the mounting challenges ahead for those involved in day-to-day security operations

    · Understand how your network infrastructure may be affected by the rapidly changing threat landscape
  • Which DDoS Soltuion is Right for me? Which DDoS Soltuion is Right for me? Arbor Networks Recorded: Jan 27 2016 4 mins
    Arbor Cloud is a layered DDoS protection solution that combines the comprehensive network threat detection of Arbor’s Peakflow technology and Arbor’s Pravail, an always-on application layer attack solution. Arbor Cloud signaling offers additional mitigation capacity and expertise that allows you to fully control your network, applications, and services in the event of a DDoS attack.

    While Peakflow and Pravail services can be implemented separately, the Arbor Cloud DDoS Protection Service unites both platforms to ensure utmost network security against application-layer and volumetric attacks. Using a combination of on-premise hardware and cloud-based protection, Arbor Cloud quickly detects and mitigates malicious traffic.

    Arbor Cloud is an ideal service to deliver comprehensive DDoS protection to your customers as well as your own organization, and is supported by Arbor’s Security Engineering and Response Team (ASERT) and Atlas.
  • How do you REALLY Know if Your DDoS Protection Solution will stop a DDoS Attack? How do you REALLY Know if Your DDoS Protection Solution will stop a DDoS Attack? Tom Bienkowski, Director of Product Marketing, Arbor Networks and Sahba Kazerooni, Managing Director at Security Compass Recorded: Dec 9 2015 45 mins
    So you’ve purchased a DDoS protection solution. You’ve installed it according to the vendor’s recommendations. Sigh of relief…you’re feeling more secure already. But there’s a nagging thought in the back of your mind …“How do I REALLY know if my DDoS protection solution will stop a complex DDoS attack?”

    The answer is certainly NOT "wait and see." The best practice is to simulate the attack vectors of a real DDoS attack as accurately as you possibly can, to put your technology and process to the test - before a real attack occurs.

    Join Arbor Networks, the leader in DDoS attack protection products and services and Security Compass, a leading DDoS attack simulation and security consulting company – to see how you can use DDoS attack simulation to test the various layers of your DDoS protection solution.

    This webcast will cover:

    - A variety of DDoS attack types simulated to show you how they impact a network
    - What patterns and information you should expect from a mitigation device in action
    - How to convert your learnings into actionable guidance for your DDoS attack response plan

Embed in website or blog