Story image

Arbor brings order to the chaos with new security platform

26 Feb 2016

Arbor Networks has introduced a new security platform for advanced threat protection. Known as Arbor Networks Spectrum, the platform is designed specifically for security teams and provides the means to search the entire network to uncover, investigate and prove sophisticated attack campaigns in a timely manner.

Arbor Networks Spectrum integrates ATLAS global threat intelligence with real-time visual workflows and analytics of all network and threat activity, past and present.

Active Threat Level Analysis System (ATLAS) is a global collaborative platform with more than 300 Arbor service provider customers sharing traffic and threat data, giving Arbor visibility into approximately one-third of all internet traffic.

Arbor’s Security Engineering and Response Team (ASERT) utilises a combination of ATLAS information, in-depth malware research and data from real-time botnet activity monitoring to understand current threats. ASERT knows when an attack is launched, and what data the attackers are receiving back, enabling Arbor to provide much needed risk context.

Integrating ‘speed of thought’ workflows and Arbor’s visibility into threat actor activity happening on the global internet enables security teams to see internal conversations and lateral movement of attackers on customer networks in order to reduce business risk from advanced cyber-threats.

Sam Curry, Arbor Networks chief security and technology officer, says, “The good guys deserve an unfair advantage through smarter approaches and processes. From the network, you can see all communications immediately and everywhere.

“You can look behaviourally and with pattern matching, you can look back in time, interrupt command and control, and updates to bots and tools. No matter how dramatic the changes to network infrastructure have become, all roads lead back to the truths that only network traffic reveals.”

The platform instruments flow and performs packet capture, allowing defenders to surface and then search to detect, investigate and prove threats within and across the network 10X faster than traditional forensics or SIEM solutions.

Matthew Moynahan, Arbor Networks president, says, “One of the greatest sources of enterprise risk today is not understanding that the attack environment has become personal.

“Sophisticated and persistent attackers design campaigns that evade traditional defences, and then exploit an incident response process that is noisy, event driven, and managed by overwhelmed and understaffed teams.

“As a result, CISOs are often unable to make proper risk-based decisions and guide their teams to focus and find the true threats that represent the highest source of risk to their organisations, while they are in process.”

Jon Oltsik, Enterprise Strategy Group principal analyst, says, “Security analysts tend to behave like rogue detectives when conducting investigations, using a combination of commercial and open source solutions to deal with the sheer volume of incidents.

"Arbor is trying to bring some order to the chaos through a combination of internal and external traffic visibility, custom and third party threat intelligence, intuitive workflows and powerful data visualisations that empower the analyst to move quickly through the data."

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.