About
Subscribe

Arbor takes on zero-day threats

Johannesburg, 03 Oct 2006

In very recent times you may have had some (or all) of the following happen to you: your bank account was erroneously debited; you received a variety of worms, viruses, Trojans, scam e-mails... In other words, your network assets were as well protected as a photographic model strolling alone in Hillbrow after dark and your business continuity was as seriously interrupted as a relaxing holiday in Iraq.

Core-to-core network security and operational performance for global business networks is no longer a nice-to-have. Rather, it is as essential as, well, a pack of Rottweillers accompanying the fashion model in the first paragraph.

It`s a crushing new demand - spotting the new arrival into your network before the arrival becomes a squatter in your system.

Arbor Networks has unveiled a host of new network behavioural analysis (NBA) features to this market with the introduction of its Peakflow X 3.6 - already being touted by analysts as the industry`s most comprehensive and proven anomaly detection solution.

Peakflow X 3.6 possesses a number of new features, including enhanced router and interface support, flow log storage for SANs environments, risk indexing, management visualisation, identity tracking for Novell eDirectory and active threat feed (ATF) usage, explains Lynda Odendaal, CEO of Arbor`s South African partner NSS.

"X 3.6 technology extends Peakflow`s security capabilities to protect against a wide range of known and unknown threats, including unauthorised access, data theft, worms, DDoS attacks, malware, phishing, botnets and network worms," Odendaal says.

Arbor Networks was the first network behaviour analysis vendor to tie identity information with flow information in real-time.

With the introduction of Peakflow X 3.6, Arbor has effectively extended this capability even further by allowing customers to have greater access to, and management of, identity information which enables more informed decisions for mitigating security threats.

"We are in a position where we deliver better visibility into security and network operations` events with feature enhancements that provide actionable data, increase operational efficiencies and maximise security effectiveness, all while protecting customer confidence and investments," she says.

Key features and benefits include:

* Enhanced router and interface support provides superior visibility and drill-down capabilities into applications that are running over routers, links and hosts.
* Extensible flow log storage supports the shipment of controllers for integration into customer SAN environments so customers have the ability to receive raw flow storage.
* Risk index enables customers to automatically prioritise by host the most serious offenders on the network. This provides a rapid, detailed system for identifying, prioritising and managing network threats so customers can quickly address the most critical security tasks. In addition, the risk index automatically degrades over time, resulting in no user action required.
* Management reporting delivers powerful visualisation with reports that cover alerted events and security assessments, providing a quick view into what Arbor Peakflow X has detected and the relative security situation on the network.
* Identity tracking capabilities now supports Novell eDirectory in addition to Microsoft Active Directory as an identity source. With this unique identity tracking feature, customers now have a superior method to identify, track and alert on anomalous network behaviour as it occurs - by user name and location.

Share

Editorial contacts

Faiza Mackay
NSS
(011) 519 8600