The First and Last Line of Smart, Automated, Perimeter Defense

Arbor Edge Defense (AED) is an inline security appliance deployed at the network perimeter (i.e. between the internet router and firewall).

AED’s unique position on the network edge, its stateless packet processing engine and the continuous reputation-based threat intelligence it receives from NETSCOUT’s ATLAS Threat Intelligence feed enable it to automatically detect and stop both inbound threats and outbound communication from internal compromised hosts – essentially acting as the first and last line of defense for organizations.

 

Benefits

Be a First Line of Defense

by blocking inbound DDoS attacks to protect the availability of your network, services or stateful security devices (e.g. firewall).

Be a Last Line of Defense

by blocking outbound communication from compromised internal devices to attacker command and control (C2) infrastructure to stop the proliferation of attacker and malware within your organizations and ultimately avoid a data breach.

Integrate

AED’s use of standards such as STIX/TAXII, SYSLOG (CEF, LEEF), a REST API and its ability to provide more context to blocked IoCs via ATLAS Threat intelligence enable it to become a fully integrated component of your existing security stack and process.

Defense at the Network Edge

Deployed in between the firewall and internet router, and using highly scalable stateless packet processing technology, Arbor Edge Defense acts as a network perimeter threat intelligence enforcement point where it blocks in bulk, inbound cyber threats (e.g. DDoS attacks, IOCs) and outbound malicious communication - essentially acting as the first and last line of perimeter defense for an organization.

Defense at the Network Edge

Features

  • Stateless, On-premise, DDoS Protection

    AED offers best in class DDoS protection. AED can stop DDoS attacks as large as 40 Gbps and due to its stateless packet processing technology, AED can stop TCP-state exhaustion attacks that target and impact stateful devices such as NGFWs.

  • Intelligently Automated, Hybrid DDoS Protection

    AED's Cloud Signaling can automatically route large DDoS attacks to one of NETSCOUT’s Arbor Cloud global scrubbing centers for mitigation – offering the industry best practice of hybrid DDoS protection.

  • Perimeter Enforcement of Your Threat Intelligence

    Armed with potentially millions of IoCs from NETSCOUT’s ATLAS Intelligence Feed or 3rd parties, AED can enforce your threat intelligence at the network perimeter to stop inbound DDoS attacks and outbound communication to known bad sites.

  • Integration with Existing Security Stack and Process

    AED's REST API, support for Syslog (CEF, LEEF) and STIX/TAXII, enable AED to be a fully integrated component of an organization’s existing security stack and process.

Stateless, On-premise, DDoS Protection
Click to Enlarge Image

Because AED can stop all types of DDoS attacks, it should be deployed in front of your firewalls to protect them and the services behind them from DDoS attacks.

Intelligently Automated, Hybrid DDoS Protection
Click to Enlarge Image

When DDoS attacks are larger than the internet circuit, AED’s Cloud Signaling will automatically route traffic to a cloud-based scrubbing center such as Arbor Cloud for attack mitigation.

Perimeter Enforcement of Your Threat Intelligence
Click to Enlarge Image

Armed with threat intelligence from NETSCOUT’s ATLAS or 3rd parties, AED can act as a “last line of defense” to stop outbound IoCs from compromised internal devices before the data breach occurs.

Integration with Existing Security Stack and Process
Click to Enlarge Image

AED’s support for common protocols and APIs enable it to easily become part of your security stack and process.

SaaS Provider of Payment Processing Solutions Protects Business from DDoS Attacks with Arbor Edge Defense
Case Study

SaaS Provider of Payment Processing Solutions Protects Business from DDoS Attacks with Arbor Edge Defense

SaaS Provider increased visibility into both inbound and outbound attacks

Latest Resources