How to Block Inbound and Outbound Cyberthreats
Watch this demo to see how NETSCOUT’s Arbor Edge Defense (AED):
- Is deployed on the network edge, inside the internet router and outside the firewall where it acts as a first and last line of network edge defense.
- Uses stateless packet processing technology to block inbound non-DDoS attacks such as reconnaissance, a brute force telnet attack, or traffic from a TOR Exit Node.
- Uses ATLAS or 3rd party threat Intelligence to block outbound Indicators of Compromise (IOCs) such as command and control traffic from a RAT, that has been missed by the entire network security stack.
Deployed on the network edge, inside the internet router and outside the firewall, Arbor Edge Defense is armed with ATLAS or 3rd party threat intelligence and uses stateless packet processing technology to block inbound and outbound threats – essentially acting as a first and last line of network edge defense.
What is network-based cybersecurity?
Unlike end-point cybersecurity which is the technology deployed on devices like PCs or file servers, network-based cybersecurity uses specialized network devices to detect and block cyber threats.