• Skip to main content
  • Skip to primary sidebar

DDoS Blog

Cyber Security News

DDoS Protection Service: Arbor Cloud

February 22, 2018 By TheNewsTeam

Arbor Cloud offers an extremely large network of 8TB of bandwidth, meaning it is well prepared for volumetric attacks. The security division of NetScout more than doubled the capacity of Arbor Cloud from 2Tbps to 4 Tbps across the first half of 2017, and doubled it again to 8TB by the end of last year. It has done this by upgrading its existing nodes and adding more than a dozen new nodes in major traffic centers in North America, South America, Asia and Europe. This massive expansion of capacity was done in large part in response to Mirai and the continued rise in huge IoT botnets. Attack size is a significant concern for many businesses, and this recent investment in distributed architecture and greater scale will serve its customers well.

Arbor Cloud also has a large scrubbing capacity, meaning the amount of its bandwidth dedicated to cleaning traffic is significant and it has a dedicated staff of DDoS security experts who defend against volumetric attacks too large to be mitigated on-site. Capacity is spread across its scrubbing centers globally, allowing attacks to be mitigated closer to the source at a local level. This makes for quicker resolution of services and helps address data privacy considerations on cloud service providers.

Arbor also offers an on-premises element – Arbor Networks APS – which offers always-on in line packet based DDoS attack detection and mitigation. It can detect and thwart all kinds of DDoS attacks. However, in the face of an extremely large volumetric attack, which can overwhelm local protection, Arbor Networks APS can deploy Cloud Signaling, and thereby automatically notify and reroute attack traffic to an Arbor Cloud scrubbing location in which the attack can be mitigated.

The Arbor Cloud Flow-Based Detection option is an alternative to the Arbor APS on-premise. DDoS attacks can be automatically detected via flow collection and analysis, and sent to the Arbor Cloud for in-cloud mitigation if necessary.

Therefore, enterprises have access to three different kinds of DDoS protection or a combination of all three if necessary. Arbor Cloud offers protection from the edge of the network to the cloud.

Its cloud-based mitigation techniques are significant, but Arbor is known particularly for its hardware. In fact, the company offers its advanced hardware to many of its rivals in the cybersecurity space.

The company’s pricing structure is not detailed online. Interested customers can reach out for a quote.

Filed Under: Arbor Cloud, DDoS mitigation Tagged With: Arbor Cloud, Arbor Cloud Flow-Based Detection, Arbor Networks APS, DDoS mitigation, DDoS protection service, hardware, network capacity, scrubbing capacity

Primary Sidebar

Directory

  • Accidental DDoS
  • Akamai
  • Arbor Cloud
  • Business Rivalry DDoS
  • China Unicom
  • Cloud Computing
  • Cloudflare
  • Corero Network Security
  • DDoS Case Studies
  • DDoS Foundations
  • DDoS History
  • DDoS Landscape
  • DDoS mitigation
  • DDoS Motivation
  • DDoS Protection Services
  • DDoS Scripts
  • DDoS Tools
  • DNS Amplification
  • DNS Flood
  • DoSarrest
  • Extortion DDoS
  • F5 Networks
  • Genie Networks
  • Google
  • Government
  • Hacktivist DDoS
  • HTTP Attack
  • ICMP Flood
  • Imperva Incapsula
  • Infrastructure-related attacks
  • IoT DDoS
  • IP Fragmentation Attack
  • IP Null Attack
  • Kentik
  • LAND attack
  • MemCached DDoS
  • Mitigation Techniques
  • Multi-vector Attack
  • Nation State DDoS
  • Neustar
  • Nexusguard
  • NTP Amplification Attack
  • Null Routing
  • PING Flood
  • Ping of Death
  • Random Recursive GET attack
  • Recursive GET attack
  • Reflection Attack
  • Script Kiddies DDoS
  • Slowloris
  • Slowloris
  • Smokescreen DDoS
  • Specially Crafted DDoS
  • SSL-based DDoS
  • SYN Floods
  • SYN-ACK Flood
  • Types of Attack
  • Types of Mitigation
  • UDP Flood
  • Uncategorized
  • Verisign
  • Verizon
  • XML-DoS
  • Zero-day DDoS Attack
Copyright © 2017 Disclaimer. Privacy Policy
All product names, logos, and brands are property of their respective owners.