A vital component of the Peakflow solution, Peakflow Threat Management System surgically removes DDoS attack traffic from your network without disrupting key network services. It also provides comprehensive, real-time visibility into your network applications so you can proactively monitor and maintain your service performance.
Features & Benefits
Advanced, Automated DDoS Threat Detection and Mitigation
Peakflow Threat Management System provides a full suite of countermeasures that surgically removes up to 8Tbps of DDoS attack traffic while enabling the flow of legitimate traffic – all without interrupting your network services. Proven effective for detecting and removing threats such as high-volume flood attacks, stealthy application-layer attacks and attacks hidden in SSL packets, Peakflow Threat Management System safeguards IPv4 and IPv6 infrastructure from DDoS attacks. Automated and proven, Peakflow Threat Management System works to keep your network and services up 24 hours a day, seven days a week, 365 days a year.
Peakflow Threat Management System automatically identifies more than 90 IP-based applications and defines custom applications based upon network attributes such as IP address or range, BGP attributes, router interfaces and Active Threat Feed fingerprints. With complete visibility into the applications traversing your network, you can detect threats early for a more effective and efficient response.
You can monitor key network performance statistics such as jitter, latency, network round-trip times, delay and packet loss to keep services running at the highest possible levels. Peakflow Threat Management System processes this data to provide automatic reporting and alerting at times of significant performance change so you can stay ahead of threats to your network performance.
Flexible and Scalable Solution
With a choice of models to meet diverse deployment needs, Peakflow Threat Management System automatically detects and surgically removes up to 80 Gbps of attack traffic from a single appliance. Providing up to 8Tbps of mitigation capacity in a single deployment, its flexible and scalable architecture is ideally suited for in-cloud deployment and the delivery of managed services.
Through technology partnerships with Cisco and Alcatel Lucent, Peakflow Threat Management System technology is also available as an option card for the Cisco CRS Carrier Routing System and the Alcatel 7750 Service Router.
Profitable, In-Cloud Managed Service Offerings
Together with Peakflow, you can leverage Peakflow Threat Management System to offer your customers cloud-based, differentiated managed security services such as MPLS VPN visibility and DDoS protection. With up to 80 Gbps of surgical mitigation per appliance, 8Tbps per deployment, real-time mitigation dashboards, customizable mitigation groups/templates, zero or one-click mitigation and raw packet analysis, Peakflow Threat Management System offers a proven platform for managed services that can help you grow your business.
Mobile Network Protection
Deployed on the Gi/Sgi interface of your mobile packet core, Peakflow Threat Management System deployed can stop DDoS attacks or misbehaving mobile applications--protecting the availability and performance of mobile network infrastructure and applications.
"Arbor’s Peakflow SP platform has earned an enviable reputation in the industry as an important part of a comprehensive network defense strategy. That’s why we chose Arbor. Within weeks, our selection was validated when Peakflow SP TMS helped block a major denial of service attack, eliminating the attack traffic while keeping legitimate traffic moving to and from our customers."