Threat Management System
Carrier-Class Application Intelligence and Threat Mitigation: The Arbor Peakflow SP Threat Management System (TMS) is a vital component of the Peakflow SP solution. Peakflow SP TMS is a robust application intelligent system for multi-service converged networks that speeds remediation by coupling high-level threat identification with packet-level analysis. Peakflow SP TMS provides visibility into critical applications (e.g., VoIP/SIP, DNS, HTTP, P2P, etc.) running on the network and monitors key performance metrics.
Peakflow SP TMS complements Peakflow SP’s embedded mitigation techniques, which include access control lists (ACLs), fingerprint sharing, BGP black-hole routing and BGP flow-spec. Peakflow SP TMS automatically detects and surgically removes only the attack traffic while maintaining legitimate business traffic—thereby ensuring the highest level of customer satisfaction.
Superior Performance and Extensibility
Arbor offers a choice of Peakflow SP TMS models to meet diverse deployment needs and enable new uses ranging from DDoS mitigation to flow generation.
Service Visibility, Performance and Protection
To your subscribers, the network is as good as the applications or IP services that run on it. The diversity of customer applications ranging from triple-play services (e.g., data, voice and video) to Over the Top (OTT) applications (e.g., IM, Skype and YouTube) makes service optimization even more challenging. The Arbor Peakflow SP solution offers an industry-unique combination of pervasive network visibility and deep application-layer insight. This provides a level of application intelligence that allows you to fine-tune your visibility and security of business-critical IP services.
Service Visibility: Gain complete visibility into the applications that are traversing critical segments of your network. Peakflow SP TMS automatically identifies over 90 IP-based applications and defines custom applications based upon network attributes such as IP address or range, BGP attributes, router interfaces and Active Threat Feed fingerprints.
Performance: Peakflow SP TMS also monitors key performance statistics such as jitter, latency, network round-trip times, delay and packet loss to help ensure that services are running as optimally as possible. Peakflow SP then uses this data generated by Peakflow SP TMS to provide reporting and alerting when significant performance change occurs.
Protection: As the size and complexity of application-layer attacks continue to rise, Peakflow SP TMS can automatically detect and surgically mitigate these threats. Building on the core Peakflow SP technology to deliver carrier-class protection for zero-day threats, Peakflow SP TMS can stop basic DDoS attacks and protect critical revenue-generating services. For example, Peakflow SP TMS specializes in stopping HTTP, VoIP and DNS service attacks. It can also thwart non-malicious threats such as a flash crowd event by automatically recognizing such anomalies and rate-limiting traffic to keep the service up and running
Peakflow SP TMS is a carrier-class, industry-unique solution that provides a rapid ROI. It delivers a powerful combination of visibility, performance and service protection allowing you to maintain availability, reduce support costs and optimize current or future business services.