Regional Director at iSecureMind Integrated Solutions
Reseller
Top 5
2024-11-08T13:33:00Z
Nov 8, 2024
Arbor DDoS is designed for enterprises and is not suitable for small businesses that have only one to ten public IP addresses. Some next-generation firewalls already include this protection.
Our customers usually come from the financial sector, manufacturing, and energy sectors, such as gasoline companies and solar energy firms. We also work with e-commerce platforms and companies that publish web services. These clients need high availability for their services, so we provide them with the best protection through Arbor DDoS.
Network Security Engineer at a tech vendor with 11-50 employees
Reseller
2022-10-26T15:32:56Z
Oct 26, 2022
Our company uses the solution to protect applications such as web DNS and file servers from DDoS attacks coming through the Internet's application layer. We also protect our devices and components such as firewalls, IPSS, and WAFs.
Product Manager at a comms service provider with 10,001+ employees
Real User
2022-08-03T16:10:00Z
Aug 3, 2022
Our company uses a platform to render the solution to our customers and ensure quality service. We build the solution based on our data centers and infrastructure and then deliver an ID appliance to the customer that communicates with our routers and network. The solution provides flow spec protection and prevents volumetric DDoS attacks.
Arbor DDoS is used for network protection if you have a DDoS attack, it keeps the session or information moving. Arbor DDoS is a combination of a physical appliance and the cloud, and it's combined in their subscription.
Dty. Chief Executive Officer at Transworld Associates (Pvt.)
Real User
2022-04-25T09:35:49Z
Apr 25, 2022
We provide about 50% of the nation's bandwidth because of the submarine cables we have. We use Arbor to provide DDoS-protected bandwidth to our customers who require it.
Sr. Manager at a energy/utilities company with 10,001+ employees
Real User
2021-02-10T21:19:00Z
Feb 10, 2021
It is our ISP, from where we get our internet traffic. We just send it to them and if anything is suspicious or there is some malicious traffic, we talk to them about what kind of traffic it is. If some machine or some router is being attacked by a malicious user, we try to find out the source IP and why this traffic is coming to us. The Arbor solution is deployed on their premises. We just ask them to control or just stop that traffic. They do the filtration. They provide us all the required details to mitigate an attack on any particular machine.
General Manager at a comms service provider with 10,001+ employees
Real User
Top 20
2021-01-27T21:55:00Z
Jan 27, 2021
We are a telecom service provider. We provide services to our enterprise customers in India and compliment these services with security layer as a part of our security services. Being a part of the solution design team, I have been interacting with customers and creating solutions for them to fulfill their requirements. One of the products that we have in our offerings portfolio is around security, which is complimenting our connectivity portfolio. We provide this from Arbor platform, which we have deployed in our network. We have taken the hybrid model from Arbor, and there was a physical installation done in two of the gateways of the country. If the mitigation capacity goes beyond the subscribed boxes, then the Arbor Cloud subscription usage hits and mitigation would be done accordingly. We have deployed Arbor platform and for our customers, we offer it as a managed service from our network. There are also customers looking for on-premise deployment. We are using Arbor's hybrid approach for our overall product build. We have on-premise deployment, however, beyond that we have taken the Arbor Cloud subscription, which is really useful because you secure yourself for anything beyond your current mitigation capacity. This is a really good feature of Arbor that is available.
Manager IP Core and Transmission Networks at GO PLC
Real User
2021-01-27T12:36:00Z
Jan 27, 2021
My company is a quad-play operator service provider in Malta. We use it for our own internal infrastructure and clients, where we use both always-on and on-demand. Our partner has an in-house deployment and can upload it to the cloud as well. This helps to minimize the costs. With in-house deployment, the cost will increase significantly. So, this hybrid approach is advantageous.
Traffic Management skill center at a comms service provider with 10,001+ employees
Real User
2021-01-19T03:11:00Z
Jan 19, 2021
As an operator, we use Arbor antiDDoS system to protect our backbone, protecting the network and our assets like DNS.I'm involved in the validation and testing of the solution. The solution is installed in our lab, with a simulated full network. We can send some regular traffic as well as DDOS traffic, using some testing tools like IXIA system and opensource tools. For testing, we simulate some regular traffic, as background traffic, and we added some attacks on the network with attack tools. We can monitor what's sent to the network, and we can monitor what's received by the victim. In this case, we can assess which part of the attack was stopped by the system. Arbor DDoS helps consolidate visibility on traffic and on DDOS attacks attempts. It can perform direct mitigation action on the network, which is important. It has also helped us achieve our network and application uptime goals.
Engineer at a comms service provider with 10,001+ employees
Real User
2021-01-17T15:30:00Z
Jan 17, 2021
Our business is to provide a DDoS protection solution for our customers. Our customers are banks, financial groups, etc. We might develop some DDoS protection services for our customers under our Internet umbrella. We detect and filter traffic using Arbor DDoS in our network. We use it as a BGP or prompt, as a telecom service provider. We have SP and TMS, and that is all our architecture. We resell on-premise the Arbor edition and install at our customers' site, specifically the Availability Protection System (APS) system.
Network Security Architecture at a financial services firm with 501-1,000 employees
Real User
2020-12-22T11:30:00Z
Dec 22, 2020
We are using it for application availability, for its perimeter protection against DDoS and such service-exhausting attacks. Our goal is service availability and protecting our infrastructure against reputational damage and other penalties that could be incurred as a result of outages and malicious activities.
We're a hosting company and, in this industry, it's inevitable that you're going to be attacked. We originally purchased the product back in early 2000 for the SQL monitoring. Over the years, DDoS has become a nuisance for other companies we're hosting as well. We had originally purchased it just for internal use, and to predict our own internal infrastructure. But we found an avenue to offer it to our customers as well. It has just grown from there. It's on-prem to protect our own infrastructure, as well as in the product that we sell to our customers to protect their services. We have a hybrid as well, as we use Arbor Cloud to protect our company's major assets if needed, as a type of over-capacity swing-over.
Using the Arbor SP Insight allows the detection of DDoS attacks coming in from upstream internet providers. The system provides a central analysis to detect DDoS attacks and allow reporting on internet traffic. This along with the TMS physical off-ramp mitigation platform allows us to redirect the inbound attack traffic via BGP. The offramp TMS effectively separates attack traffic from the main path used during normal operation. The system provides attack mitigation for both internal infrastructure and downstream customer services.
Every employee should be educated in best practice procedures, starting with basics like clever password combinations and then going into details of how different attacks work, emphasizing ways to recognize social engineering tactics. Businesses must also demonstrate the potential impact of a breach occurring, which can help establish personal responsibility. Crucially, businesses shouldn’t just focus on prevention. Employees also need to understand best practice in minimizing the damage should a breach occurs.
Product Manager, MSx Security Services at TPx Communications
MSP
2020-03-15T08:08:00Z
Mar 15, 2020
We're a managed service provider as well as an internet service provider. We use it to protect our core network from DDoS attacks, and by protecting our core network we can also protect our end customers. We're in the process of migrating to the newest version, currently. We use the solution in our physical environment, but we also take advantage of their cloud offering.
Senior Project Engineer at a tech services company with 10,001+ employees
Real User
2018-12-30T11:29:00Z
Dec 30, 2018
We have captured a profile for every production group which has a server-type configuration. We also enable signaling. If there is a huge amount of traffic, it will indicate that to us. Accordingly, we will inform them to take action or whatever. We will determine whether it is legitimate or not based on the requirements. There is a given bandwidth for any organization, an expected amount of traffic at a given point of time. If it sees more than the traffic which we are expecting at a given point of time, it could be an anomaly. We will then check internally whether a download or upload is happening, etc. Normally, if it sees a huge amount of traffic at the same time, then automated cloud signaling will be enabled and, automatically, the traffic will be dropped.
Team Lead for DDoS Protection at a comms service provider with 10,001+ employees
Real User
2018-12-19T10:49:00Z
Dec 19, 2018
We use it to protect websites, usually. But it's hosted in our network, our infrastructure, and the company websites as well. We are an ISP company and we provide internet services and other services to companies, like banks, etc. Part of our services is DDoS protection.
Security Consultant at a tech services company with 10,001+ employees
Real User
2018-12-19T09:19:00Z
Dec 19, 2018
Our primary use case is developing threshold values for all groups. We use it to analyze packets to build a use-case for when a server group hits the limit of incoming traffic. In such a case we suspect traffic. We use it to build use-case scenarios, based on the server input and a client's requirements. Some clients have a number of users accessing a given server which affects the bandwidth. In each case, we need to tell DDoS what is considered legitimate traffic.
Security Advisor at a comms service provider with 10,001+ employees
Real User
2018-12-19T09:00:00Z
Dec 19, 2018
We use these products because of the increase in frequency and sophistication of Denial of Service and Distributed Denial of Service attacks. As a service provider, we need to control and mitigate these attacks.
I work at the service provider level. I did a deployment at a multinational telecommunications company. They have network separation, and each network has its own SP which is a controller, the "mind" of the solution, and multiple TMS's, which are the scrubbing centers for the illegal traffic. They are forwarding suspected denial-of-service traffic to the scrubbing centers, based on the SP intelligence. It will scrub the data and forward it to the normal traffic after mitigating the denial-of-service attack.
We are an internet service provider. We are using Arbor in our networks and it mitigates all attacks on our network. We are using BGP for traffic diversion.
Technical Lead - DEVSECOPS with 1,001-5,000 employees
Real User
2018-12-02T07:45:00Z
Dec 2, 2018
We use Arbor DDoS in the Asia Pacific region for a couple of government clients and Financial sector. The primary use case is for different types of problems that we do not see with other solutions, such as IPS, IDS, and FireEye. It has that type of detection and it blocks things.
Security Expert at a comms service provider with 10,001+ employees
Real User
2018-12-02T07:45:00Z
Dec 2, 2018
We are using Arbor as a DDoS protection infrastructure. It protects our both our company's infrastructure and also our customers' infrastructure. We are not using it to protect one website, we are protecting a lot of websites and a lot of customers' infrastructures including their websites, their web services, etc.
Network Consultant at a comms service provider with 51-200 employees
Consultant
2018-06-14T07:58:00Z
Jun 14, 2018
It is mostly for Internet Service Providers (ISPs). It is for operations on the service provider and network security operations. It is a good solution.
Arbor DDoS provides effective mitigation against DDoS attacks with a user-friendly interface, integrating cloud and on-premise solutions for real-time traffic control and reporting. It supports large traffic volumes without latency, making it ideal for protecting online infrastructure.Known for its intuitive GUI and rapid response, Arbor DDoS defends against complex DDoS threats using AI-driven anomaly detection and traffic categorization. It offers packet capture, robust reporting, and...
Arbor DDoS is designed for enterprises and is not suitable for small businesses that have only one to ten public IP addresses. Some next-generation firewalls already include this protection.
Our customers usually come from the financial sector, manufacturing, and energy sectors, such as gasoline companies and solar energy firms. We also work with e-commerce platforms and companies that publish web services. These clients need high availability for their services, so we provide them with the best protection through Arbor DDoS.
In my company, we use Arbor DDoS for the DDoS protection it provides.
We use the product for DDoS settings to prevent malware attacks.
Arbor DDoS is not used for enterprise companies but by some other companies, including NIDC, a government entity.
We use this solution to protect our infrastructure.
Our primary use case for Arbor is dose protection.
Our company uses the solution to protect applications such as web DNS and file servers from DDoS attacks coming through the Internet's application layer. We also protect our devices and components such as firewalls, IPSS, and WAFs.
Our company uses a platform to render the solution to our customers and ensure quality service. We build the solution based on our data centers and infrastructure and then deliver an ID appliance to the customer that communicates with our routers and network. The solution provides flow spec protection and prevents volumetric DDoS attacks.
Arbor DDoS is used for network protection if you have a DDoS attack, it keeps the session or information moving. Arbor DDoS is a combination of a physical appliance and the cloud, and it's combined in their subscription.
We provide about 50% of the nation's bandwidth because of the submarine cables we have. We use Arbor to provide DDoS-protected bandwidth to our customers who require it.
We use Arbor DDoS for network security defense.
We use it to protect our infrastructure from DDoS attacks. It is used to protect web applications to provide a secure infrastructure for our client.
It is our ISP, from where we get our internet traffic. We just send it to them and if anything is suspicious or there is some malicious traffic, we talk to them about what kind of traffic it is. If some machine or some router is being attacked by a malicious user, we try to find out the source IP and why this traffic is coming to us. The Arbor solution is deployed on their premises. We just ask them to control or just stop that traffic. They do the filtration. They provide us all the required details to mitigate an attack on any particular machine.
We are a telecom service provider. We provide services to our enterprise customers in India and compliment these services with security layer as a part of our security services. Being a part of the solution design team, I have been interacting with customers and creating solutions for them to fulfill their requirements. One of the products that we have in our offerings portfolio is around security, which is complimenting our connectivity portfolio. We provide this from Arbor platform, which we have deployed in our network. We have taken the hybrid model from Arbor, and there was a physical installation done in two of the gateways of the country. If the mitigation capacity goes beyond the subscribed boxes, then the Arbor Cloud subscription usage hits and mitigation would be done accordingly. We have deployed Arbor platform and for our customers, we offer it as a managed service from our network. There are also customers looking for on-premise deployment. We are using Arbor's hybrid approach for our overall product build. We have on-premise deployment, however, beyond that we have taken the Arbor Cloud subscription, which is really useful because you secure yourself for anything beyond your current mitigation capacity. This is a really good feature of Arbor that is available.
My company is a quad-play operator service provider in Malta. We use it for our own internal infrastructure and clients, where we use both always-on and on-demand. Our partner has an in-house deployment and can upload it to the cloud as well. This helps to minimize the costs. With in-house deployment, the cost will increase significantly. So, this hybrid approach is advantageous.
As an operator, we use Arbor antiDDoS system to protect our backbone, protecting the network and our assets like DNS.I'm involved in the validation and testing of the solution. The solution is installed in our lab, with a simulated full network. We can send some regular traffic as well as DDOS traffic, using some testing tools like IXIA system and opensource tools. For testing, we simulate some regular traffic, as background traffic, and we added some attacks on the network with attack tools. We can monitor what's sent to the network, and we can monitor what's received by the victim. In this case, we can assess which part of the attack was stopped by the system. Arbor DDoS helps consolidate visibility on traffic and on DDOS attacks attempts. It can perform direct mitigation action on the network, which is important. It has also helped us achieve our network and application uptime goals.
Our business is to provide a DDoS protection solution for our customers. Our customers are banks, financial groups, etc. We might develop some DDoS protection services for our customers under our Internet umbrella. We detect and filter traffic using Arbor DDoS in our network. We use it as a BGP or prompt, as a telecom service provider. We have SP and TMS, and that is all our architecture. We resell on-premise the Arbor edition and install at our customers' site, specifically the Availability Protection System (APS) system.
We are using it for application availability, for its perimeter protection against DDoS and such service-exhausting attacks. Our goal is service availability and protecting our infrastructure against reputational damage and other penalties that could be incurred as a result of outages and malicious activities.
We're a hosting company and, in this industry, it's inevitable that you're going to be attacked. We originally purchased the product back in early 2000 for the SQL monitoring. Over the years, DDoS has become a nuisance for other companies we're hosting as well. We had originally purchased it just for internal use, and to predict our own internal infrastructure. But we found an avenue to offer it to our customers as well. It has just grown from there. It's on-prem to protect our own infrastructure, as well as in the product that we sell to our customers to protect their services. We have a hybrid as well, as we use Arbor Cloud to protect our company's major assets if needed, as a type of over-capacity swing-over.
Using the Arbor SP Insight allows the detection of DDoS attacks coming in from upstream internet providers. The system provides a central analysis to detect DDoS attacks and allow reporting on internet traffic. This along with the TMS physical off-ramp mitigation platform allows us to redirect the inbound attack traffic via BGP. The offramp TMS effectively separates attack traffic from the main path used during normal operation. The system provides attack mitigation for both internal infrastructure and downstream customer services.
Every employee should be educated in best practice procedures, starting with basics like clever password combinations and then going into details of how different attacks work, emphasizing ways to recognize social engineering tactics. Businesses must also demonstrate the potential impact of a breach occurring, which can help establish personal responsibility. Crucially, businesses shouldn’t just focus on prevention. Employees also need to understand best practice in minimizing the damage should a breach occurs.
We're a managed service provider as well as an internet service provider. We use it to protect our core network from DDoS attacks, and by protecting our core network we can also protect our end customers. We're in the process of migrating to the newest version, currently. We use the solution in our physical environment, but we also take advantage of their cloud offering.
We observed traffic over six months to create a benchmark. We created alerts to trigger and be sent to our SOC once the traffic exceeds the benchmark.
We have captured a profile for every production group which has a server-type configuration. We also enable signaling. If there is a huge amount of traffic, it will indicate that to us. Accordingly, we will inform them to take action or whatever. We will determine whether it is legitimate or not based on the requirements. There is a given bandwidth for any organization, an expected amount of traffic at a given point of time. If it sees more than the traffic which we are expecting at a given point of time, it could be an anomaly. We will then check internally whether a download or upload is happening, etc. Normally, if it sees a huge amount of traffic at the same time, then automated cloud signaling will be enabled and, automatically, the traffic will be dropped.
Mitigating network level volumetric attacks, complete network visibility and complete control on applying countermeasures.
We use it to protect websites, usually. But it's hosted in our network, our infrastructure, and the company websites as well. We are an ISP company and we provide internet services and other services to companies, like banks, etc. Part of our services is DDoS protection.
Our primary use case is developing threshold values for all groups. We use it to analyze packets to build a use-case for when a server group hits the limit of incoming traffic. In such a case we suspect traffic. We use it to build use-case scenarios, based on the server input and a client's requirements. Some clients have a number of users accessing a given server which affects the bandwidth. In each case, we need to tell DDoS what is considered legitimate traffic.
We use these products because of the increase in frequency and sophistication of Denial of Service and Distributed Denial of Service attacks. As a service provider, we need to control and mitigate these attacks.
I work at the service provider level. I did a deployment at a multinational telecommunications company. They have network separation, and each network has its own SP which is a controller, the "mind" of the solution, and multiple TMS's, which are the scrubbing centers for the illegal traffic. They are forwarding suspected denial-of-service traffic to the scrubbing centers, based on the SP intelligence. It will scrub the data and forward it to the normal traffic after mitigating the denial-of-service attack.
We are an internet service provider. We are using Arbor in our networks and it mitigates all attacks on our network. We are using BGP for traffic diversion.
We use Arbor DDoS in the Asia Pacific region for a couple of government clients and Financial sector. The primary use case is for different types of problems that we do not see with other solutions, such as IPS, IDS, and FireEye. It has that type of detection and it blocks things.
I was working in the ISP environment and the Arbor DDoS solution is integrated in there.
We are using Arbor as a DDoS protection infrastructure. It protects our both our company's infrastructure and also our customers' infrastructure. We are not using it to protect one website, we are protecting a lot of websites and a lot of customers' infrastructures including their websites, their web services, etc.
The main focus was DDoS protection.
It is mostly for Internet Service Providers (ISPs). It is for operations on the service provider and network security operations. It is a good solution.