Friday,29 November, 2024

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

Arbor Networks Unveils Peakflow® Mobile Network Analysis

Published Mar 2, 2014

Arbor Networks, Inc., a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, today unveiled Peakflow® Mobile Network Analysis. This new solution is designed for Mobile Network Operators (MNOs) challenged with managing the steady rise in mobile data traffic and evolving threats. According to Heavy Reading’s 2013 Mobile Network Security Survey, 60 percent of mobile operators have experienced a network outage or service degradation lasting at least an hour due to malicious attacks. Until now, MNOs haven’t had the proper level of visibility into the traffic traversing their mobile packet core, making it nearly impossible to detect malicious or non-malicious traffic that threatens service availability and performance, ultimately leading to negative customer experiences and churn.

Arbor’s Peakflow Mobile Network Analysis collects telemetry directly from the packet core, providing a wide-angle view of signaling activity through a rich set of intuitive reporting tools. These reporting tools yield key operational and security insights, such as:

> Detailed signaling flow behavior between SGSN/SGW/MME and GGSN/PGW nodes – for real-time and retrospective analytics purposes.
> Detection and alerting of abnormal signaling message volumes, response times and information element codes – so security and operations teams can quickly identify potential causes.

“Given the high speeds offered by HSPA+ and LTE and the vulnerabilities inherent to BYOD, attackers are undoubtedly attracted to mobile networks as a fast, convenient and readily exploitable platform for conducting malicious attacks,” said Matthew Moynahan, Arbor Networks President. “By building on our existing best-in-class Peakflow solution, we’re putting the same proven network visibility and security technology into the hands of mobile network operators (many of whom are our existing customers) with Peakflow Mobile Network Analysis. Now MNOs can see, understand and help stop threats before they negatively impact their infrastructure and services.”

“In today’s environment, no one security approach is going to prevent all malicious traffic from reaching the mobile network. And nothing is going to stop the increasingly complex mix of protocols within the network from generating anomalous traffic behavior,” said Patrick Donegan, Senior Analyst, Heavy Reading. “Mobile operators are increasingly looking for new ways to quickly visualize, identify and reduce security risks within the packet core.”

Today, a majority of the world’s network service providers use Arbor’s Peakflow platform for network visibility and advanced threat protection for their fixed networks. As the lines blur between fixed and mobile connectivity, Arbor’s Peakflow Mobile Network Analysis solution enables multi-service network operators to deploy a single solution, providing pervasive network visibility and advanced threat protection for their fixed, HSPA/LTE and Cloud infrastructures.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks