Click here to close now.

Welcome!

News Feed Item

Thailand’s CAT Telecom Joins Arbor Networks’ Cloud Signaling℠ Coalition for Multi-Layer DDoS Protection

Arbor Networks, Inc., a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, announced today that Thailand’s CAT Telecom has joined Arbor’s Cloud Signaling Coalition (CSC). Arbor’s powerful and unique Cloud SignalingSM feature provides active, intelligent communication between network perimeter and in-cloud based DDoS protection systems. This integrated, multi-layered protection is considered best practice when defending against today’s sophisticated and explosive DDoS attacks.

“Defending against DDoS attacks can be a challenge for an ISP and its enterprise customers. That’s why we chose Arbor Networks. Not only can we deploy the market’s leading solution to protect our own infrastructure, we can simultaneously solve a problem for our customers by offering DDoS security services,” said Viroj Tocharoenvanith, SEVP of Marketing and Sales for CAT Telecom.

“CAT Telecom recognizes DDoS for what it is, the primary threat to the availability of websites, applications and online services. DDoS has changed greatly over the years. What hasn’t changed is the need for multi-layered protection, backed by great people and repeatable incident response processes,” said Arbor Networks Jeff Buhl, Vice President of Sales for Asia Pacific.

Cloud Signaling In Action

When an enterprise or data center operator discovers that they are under a service-disrupting DDoS attack, they can choose to mitigate the attack in the cloud through the Cloud Signaling system, simply by clicking on a drop down menu and triggering an alert to the service provider. The signal can also be set at a predetermined capacity level for more automated protection. A volumetric DDoS attack congesting the upstream links would immediately diminish or disappear altogether from the data center’s access links, and service availability would be protected.

Participation in the Cloud Signaling Coalition allows CAT Telecom to provide differentiated managed security services, reduces the time to mitigation and increases the effectiveness of the response against DDoS threats. Enterprise and managed services customers benefit from real-time monitoring of the attack mitigation, as well as granular post mortem reports with details of the attack and the steps taken by the service provider to mitigate the attack, helping to establish best practices.

At the heart of Cloud Signaling functionality are Arbor Networks’ Peakflow® SP and Pravail® Availability Protection System solutions. Peakflow SP powers many of the world’s leading cloud-based DDoS managed security services, while the Pravail Availability Protection System is an on-premise solution that protects the network perimeter against threats to availability — specifically, application-layer DDoS attacks.

World Leader in DDoS Mitigation

Arbor Networks’ customers include a majority of the world's service providers and many of the largest enterprise networks in use today. According to a June 2014 report from Infonetics Research titled, DDoS Prevention Appliance Market Outlook, Arbor Networks was cited as top supplier of DDoS prevention solutions overall as well as in the Carrier, Enterprise and Mobile market segments.

About CAT Telecom

CAT Telecom (CAT), Thailand’s first provider of International telecommunications services, has committed to continuously develop their strengths of network and services. With years of experience and expertise in the business, CAT assures its customers of excellent service, global network coverage and state-of-the-art infrastructure that meets the international standard. CAT’s strong network provision includes owned capacity in submarine cable systems linking Asia, Europe and America, its four landing stations, three satellite earth stations and a recent 100 Gbps IP core backbone. To learn more about CAT, please visit www.cattelecom.com

About Arbor Networks

Arbor Networks, Inc. helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,” making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and reduce the risk to their business.

To learn more about Arbor products and services, please visit our website at arbornetworks.com. Arbor’s research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.

Trademark Notice: Arbor Networks, the Arbor Networks logo, Peakflow, ArbOS, Pravail, Cloud Signaling, Arbor Cloud, ATLAS, We see things others can’t.TM and Arbor Networks. Smart. Available. Secure. are all trademarks of Arbor Networks, Inc. All other brands may be the trademarks of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
In the midst of the widespread popularity and adoption of cloud computing, it seems like everything is being offered “as a Service” these days: Infrastructure? Check. Platform? You bet. Software? Absolutely. Toaster? It’s only a matter of time. With service providers positioning vastly differing offerings under a generic “cloud” umbrella, it’s all too easy to get confused about what’s actually being offered. In his session at 16th Cloud Expo, Kevin Hazard, Director of Digital Content for SoftL...
Agile, which started in the development organization, has gradually expanded into other areas downstream - namely IT and Operations. Teams – then teams of teams – have streamlined processes, improved feedback loops and driven a much faster pace into IT departments which have had profound effects on the entire organization. In his session at DevOps Summit, Anders Wallgren, Chief Technology Officer of Electric Cloud, will discuss how DevOps and Continuous Delivery have emerged to help connect dev...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, will explore the IoT cloud-based platform technologies drivi...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society-changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his session at @ThingsExpo, Jason Mondanaro, Director, Product Management at Metanga, discussed how you can plan to cooperate, partner, and form lasting all-star teams to change the world...
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction. ...
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
The time is ripe for high speed resilient software defined storage solutions with unlimited scalability. ISS has been working with the leading open source projects and developed a commercial high performance solution that is able to grow forever without performance limitations. In his session at Cloud Expo, Alex Gorbachev, President of Intelligent Systems Services Inc., shared foundation principles of Ceph architecture, as well as the design to deliver this storage to traditional SAN storage co...
To many people, IoT is a buzzword whose value is not understood. Many people think IoT is all about wearables and home automation. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed some incredible game-changing use cases and how they are transforming industries like agriculture, manufacturing, health care, and smart cities. He will discuss cool technologies like smart dust, robotics, smart labels, and much more. Prepare...
"We provide a web application framework for building really sophisticated web applications that run on a browser without any installation need so we get used for biotech, defense, and banking applications," noted Charles Kendrick, CTO and Chief Architect at Isomorphic Software, in this SYS-CON.tv interview at @DevOpsSummit (http://DevOpsSummit.SYS-CON.com), held June 9-11, 2015, at the Javits Center in New York
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...