The First and Last Line of Smart, Automated, Perimeter Defense
Arbor Edge Defense (AED) is an inline security appliance deployed at the network perimeter (i.e. between the internet router and firewall).
AED’s unique position on the network edge, its stateless packet processing engine and the continuous reputation-based threat intelligence it receives from NETSCOUT’s ATLAS Threat Intelligence feed enable it to automatically detect and stop both inbound threats and outbound communication from internal compromised hosts – essentially acting as the first and last line of defense for organizations.
Be a First Line of Defense
by blocking inbound DDoS attacks to protect the availability of your network, services or stateful security devices (e.g. firewall).
Be a Last Line of Defense
by blocking outbound communication from compromised internal devices to attacker command and control (C2) infrastructure to stop the proliferation of attacker and malware within your organizations and ultimately avoid a data breach.
AED’s use of standards such as STIX/TAXII, SYSLOG (CEF, LEEF), a REST API and its ability to provide more context to blocked IoCs via ATLAS Threat intelligence enable it to become a fully integrated component of your existing security stack and process.
Defense at the Network Edge
Deployed in between the firewall and internet router, and using highly scalable stateless packet processing technology, Arbor Edge Defense acts as a network perimeter threat intelligence enforcement point where it blocks in bulk, inbound cyber threats (e.g. DDoS attacks, IOCs) and outbound malicious communication - essentially acting as the first and last line of perimeter defense for an organization.
SaaS Provider of Payment Processing Solutions Protects Business from DDoS Attacks with Arbor Edge Defense
SaaS Provider increased visibility into both inbound and outbound attacks
DDoS attacks are Increasing with school reopenings during COVID-19. Read this Solution Brief to learn about NETSCOUT's best practice mitigation methodology for schools and...
Ensuring remote access to critical services requires the network perimeter to be available. Cloud only DDoS protection falls short, because it does not stop state exhaustion...
DDoS attacks are launched to exploit your weaknesses with multiple layers of attack. A hybrid defense incorporates both on-premise protection and Cloud mitigation. NETSCOUT offers...