Understanding attacks that have bypassed defenses and gained a foothold in the network has become a priority for IT security teams. These teams are dealing with a constant, escalating barrage of attacks on the network—as well as a steady stream of information alerting them to other potential threats. Attackers are counting on this chaos to remain undetected, for as long as possible. Motivated by profit or other political gains, these attackers will look to exploit any vulnerability in a network, often using methods that bypass traditional security systems designed to actively prevent such an attack. Once embedded in a network, these attackers may stay inactive for months before using compromised hosts to attack other parts of the organization or to systematically exfiltrate data from the target environment. The Pravail® Security Analytics platform enables organizations to deal with advanced threats by offering an unprecedented and detailed view of the attacks in any captured network traffic. In this webinar, we will introduce you to Pravail Security Analytics, share use cases and discuss unique MSSP opportunities enabled by Pravail Security Analytics.
RecordedMay 29 201428 mins
Your place is confirmed, we'll send you email reminders
Ben Fischer, Senior Product Marketing Manager, Arbor Networks
Security incidents can have broad ranging impacts on a service provider, its customers and its peers. Damage can be hard to calculate after an incident and even harder to predict the number, size, type, and targets of an attack. Despite these complexities, we will review how you can forecast future financial burdens of any attack(s) and leverage this knowledge for business planning. During this webinar, we will explore ALE (Annualized Loss Expectancy) and how to use it to analyze risk and investments in security products.
Darren Anstee, Director, Solutions Architects, Arbor Networks
Staying abreast of the latest cyber threats is a daunting task for even the best of security teams. Timely and high-fidelity threat intelligence can be the difference between business continuity and business disaster. In this session, you will learn about the uniqueness of the Arbor Networks ATLAS Intelligence Feed (AIF) and how it is used to arm different Arbor products to provide a comprehensive cyber threat protection solution.
Tom Bienkowski, Director, Product Marketing, Arbor Networks
Due to changes in motivation and the abundance of do-it-yourself DDoS attack tools/services, DDoS attacks are rising in size, frequency and complexity. In turn, enterprises of all sorts are turning to their ISPs and managed security service providers for help. In this session, we’ll share examples of how Arbor Networks’ products and services can be monetized to deliver a comprehensive portfolio of in-cloud and CPE-based DDoS protection services.
Tom Bienkowski, Director, Product Marketing, Arbor Networks
Network visibility is a fundamental requirement for proper network and threat management. You can’t protect yourself (or your customers) from what you can’t see.
In this session, you’ll learn about how the Arbor products, specifically Peakflow SP 7.0 with Flex Licensing and Pravail enable service providers to cost-effectively gain the proper level of visibility into their customer edges and data centers in order to detect and stop threats before they impact the availability of their services.
This session will highlight real-world use cases and a recent report from the FCC’s CSRIC (Communication, Security, Reliability, Interoperability Council) Working Group 5: Remediation of Server‐Based DDoS Attacks.
Scott Iekel-Johnson, Product Manager, Arbor Networks
When you are under attack, every seconds counts. In this session, you will learn about the new features in Peakflow v7.0 that are designed to significantly reduce the time required for DDoS attack detection, mitigation and comprehensive reporting -- in some cases, reduced to less than 1 minute. Other new Peakflow SP 7.0 features, such as tag-based reporting, new DDoS attack countermeasures and SSL decryption will also be discussed.
Gary Sockrider, Solutions Architect, Arbor Networks
This session will present insights from Arbor Networks’ Worldwide Infrastructure Security Report and Arbor's ATLAS® real-time threat monitoring system. You will learn about the largest DDoS attacks on record, as well as stealthy POS malware and nation state campaigns. Discover best practices and implications for preparing and responding more effectively within this new era of targeted attacks where organizations are most under-prepared and unprotected.
Understanding attacks that have bypassed defenses and gained a foothold in the network has become a priority for IT security teams. These teams are dealing with a constant, escalating barrage of attacks on the network—as well as a steady stream of information alerting them to other potential threats. Attackers are counting on this chaos to remain undetected, for as long as possible. Motivated by profit or other political gains, these attackers will look to exploit any vulnerability in a network, often using methods that bypass traditional security systems designed to actively prevent such an attack. Once embedded in a network, these attackers may stay inactive for months before using compromised hosts to attack other parts of the organization or to systematically exfiltrate data from the target environment. The Pravail® Security Analytics platform enables organizations to deal with advanced threats by offering an unprecedented and detailed view of the attacks in any captured network traffic. In this webinar, we will introduce you to Pravail Security Analytics, share use cases and discuss unique MSSP opportunities enabled by Pravail Security Analytics.
Peakflow Mobile Network Analysis – an extension of Arbor Networks' best-in-class Peakflow visibility and threat management solution for Service Providers – addresses the unique challenges associated with ensuring mobile network service dependability/availability. Peakflow Mobile Network Analysis provides real-time visibility into the sources, frequency and impacts of potential attacks and misuses on the HSPA/LTE packet core signaling plane, enabling proactive detection and mitigation of unwanted traffic and emerging threats before they affect critical network resources. This presentation provides an overview of the current solution, its use cases and Arbor's vision in the context of key operational and security challenges and Mobile Network Operator (MNO) needs.
Ben Fischer, Senior Product Marketing Manager, Arbor Networks
As Hosting and Cloud Service Providers, you face many risks today, especially in the realm of security , the availability of your infrastructure and the service that you enable for your customers. Risks range from being the target of an attack to being impacted by the collateral damage of an attack directed at a customer, peer, or a non-affiliated organization. During this webinar, we will review potential security and availability risks and the damage and costs they cause Hosting and Cloud Service Providers and your customers.
Tom Bienkowski, Director Product Marketing, Arbor Networks
Modern day service provider networks are complex and under constant threat. In this session, we’ll introduce you to the major improvements in performance, scalability and financial benefits of Peakflow SP 6.0’s new Flex Licensing that enable you to meet challenges of today and the future.
For over a decade, the Internet community has struggled with the challenge of large-scale distributed denial of service (DDoS) attacks. However, today's attacks are much more complex than the simple volumetric packet floods of the past. In 2013, we saw the largest attacks increase three fold to over 300Gbps and so far this year the trend continues. Today's DDoS attacks commonly include stealthy, application-layer attacks and are also used as part of broader Advanced Threat campaigns including malware, root kits, trojans, phishing, plus other tools and techniques. This session will explore trends and real-world examples of the modern threat landscape. You will learn about the current threats and how you should plan, prepare and react to them.
James Chambers, Senior Editor, The Economist Intelligence Unit & Arabella Hallawell, VP Strategic Planning, Arbor Networks
New research from The Economist Intelligence Unit shows how businesses are starting to view cyber-attacks as inevitable – and also as a potential opportunity. The report, sponsored by Arbor Networks, entitled “Cyber incident response: Are business leaders ready?” shows that despite 77 percent of companies suffering an incident in the past two years, over a third of firms (38 percent) still have no incident response plan in place. In fact, only 17 percent of businesses globally are fully prepared for an online security incident. Despite this, the majority (67%) of senior executives believe cyber incidents can be an opportunity to enhance their company’s reputation, provided the response is competently handled.
Attend this webinar to learn:
• Why the level of preparedness is being held back by lack of understanding about threats
• How an emphasis on reputation is driving formalization of plans and processes
• The reasons firms remain reticent about disclosing incidents and sharing intelligence about threats
Pravail Security Analytics for Service ProvidersYaroslav Rosomakho, Senior Channel Consulting Engineer, EMEA[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]27 mins
Share with your team
(they'll receive one email invite and nothing else)
[[ email ]]
Pravail Security Analytics for Service ProvidersYaroslav Rosomakho, Senior Channel Consulting Engineer, EMEA[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]27 mins