Arbor Networks announces launch of version 5.0 of Peakflow

Arbor Networks has announced the availability of version 5.0 of the Peakflow infrastructure security and traffic-monitoring platform.

 

Developed to include the Arbor ATLAS darknet sensor network, it enables Peakflow SP 5.0 to receive information that is aggregated and analysed via fingerprints that provides much finer detection of threats such as botnet command and control (C&C) sites, phishing sites, worms and more.

 

It also includes a real-time mitigation dashboard and unified alerting and workflow to give a view into mitigation alerts and statistics and to combine all threshold, DDoS, BGP and ATLAS fingerprint alerts.

 

It can also offer on-demand packet analysis, global geography reports to analyse peering traffic by geography, market, most used services and threat activity and expanded transit peering reports to gain a better understanding as to where their customer traffic is destined beyond initial peers.


Rakesh Shah, project manager for Arbor Networks, claimed that the concept of Peakflow is to monitor what is going on in the network and it can detect when something is going on.
 
Shah said: "We are moving beyond what is going on with the network and products, in 2009 people are interested in moving across networks, so we have added more capabilities to define products and servers. So if a consumer has a problem, the provider will see what is wrong and they will get an alert that will proactively address the problem."


Danny McPherson, Arbor Networks chief security officer, said: “Peakflow SP 5.0 raises the bar for service provider security by leveraging the global insight of Arbor's ATLAS internet monitoring system and its active threat feed based fingerprints to automate both detection and mitigation of today's most sophisticated threats.

 

“This release also enhances service visibility, monitoring and protection, enabling providers to define triple-play services within Peakflow SP for security, performance and growth monitoring, and to protect critical infrastructure like Domain Name System servers.”

 

 

Sign up to our newsletters