Arbor Bolts On Threat Intelligence, Antimalware To DDoS Appliances

Printer-friendly version Email this CRN article

The company's current growth engine is based on its Pravail Availability Protection appliances, said Arbor Networks' Matt Moynahan, senior vice president of product management corporate development. Arbor added network security intelligence for network monitoring to identify suspicious activity and malware infections on the network. Packetloop will build on the threat intelligence, giving teams the ability to drill down and address threats, Moynahan said.

"The channel is getting more sophisticated and we recognize that. If the client is going to give up shelf space, it better not be a one-trick pony," Moynahan told CRN. "We're going to take our history of taking flow data and stitching it together to create an incredibly rich picture of the threats in and around the network."

Solution providers said the threat landscape requires perimeter-based protection that can provide a variety of capabilities, from detecting external probes of the corporate network for weaknesses to malicious traffic flowing out of the network pipelines that signals malware infections.

Businesses want multithread solutions, said Lanny Cornwell, CTO of Warrenton, Va.-based systems integrator F1 Computer Solutions, Inc. Cornwell said it is rare for clients to call for point product for a single threat.

"They get piece of mind that as their service provider we're providing that layered approach to security they need and are actively taking care of their resources based on their risk profile," Cornwell said.

Most resellers and managed service providers will work with businesses to cater a technology to fit their requirements rather than force feeding a solution, said Kaleb Jacob, founder of Manchester, N.H.-based Eagle Network Solutions, an Arbor Networks partner. Jacob said his firm, which also partners with Juniper Networks, is expanding into services and on-site support for small businesses. System availability and application reliability often comes first, followed by security requirements, Jacob said.

"We'll do a risk assessment and get an adequate snapshot of their profile to advise them where their security priories need to be," Jacob said.


Printer-friendly version Email this CRN article