Introducing Arbor Networks Spectrum
Arbor Networks has introduced a new security platform for advanced threat protection. Arbor Networks Spectrum™ is designed specifically for security teams, from the most senior responder to novice analysts, to search the entire network to uncover, investigate and prove sophisticated attack campaigns within minutes, not hours or days.
By integrating intuitive “speed of thought” workflows and Arbor’s unique visibility into threat actor activity happening on the global Internet, Arbor Spectrum uncovers the internal conversations and lateral movement of attackers on customer networks to reduce business risk from advanced cyber-threats.
Unique ATLAS Global Threat Intelligence Indicators
Active Threat Level Analysis System (ATLAS) is a global collaborative platform with more than 300 Arbor service provider customers sharing traffic and threat data, giving Arbor visibility into approximately one-third of all Internet traffic. Arbor’s Security Engineering & Response Team (ASERT) utilises a combination of ATLAS information, in-depth malware research and data from real-time botnet activity monitoring to understand current threats. ASERT knows when an attack is launched immediately, and what data the attackers are receiving back, enabling Arbor to provide much needed risk context. Through this unique global lens, Arbor allows defenders to move at the same speed as the attackers regardless of where and whom they are targeting.
See and Search the Internal Network
Arbor Networks Spectrum integrates ATLAS global threat intelligence with real-time visual workflows and analytics of all network and threat activity, past and present. Arbor Networks Spectrum platform instruments flow and performs packet capture, allowing defenders to surface and then search to detect, investigate and prove threats within and across the network 10X faster than traditional forensics or SIEM solutions.
Arbor Networks, President, Matthew Moynahan, “One of the greatest sources of enterprise risk today is not understanding that the attack environment has become personal. Sophisticated and persistent attackers design campaigns that evade traditional defences, and then exploit an incident response process that is noisy, event driven, and managed by overwhelmed and understaffed teams. As a result, CISOs are often unable to make proper risk-based decisions and guide their teams to focus and find the true threats that represent the highest source of risk to their organisations, while they are in process.”
Enterprise Strategy Group, Principal Analyst, Jon Oltsik, “Security analysts tend to behave like rogue detectives when conducting investigations, using a combination of commercial and open source solutions to deal with the sheer volume of incidents. Arbor is trying to bring some order to the chaos through a combination of internal and external traffic visibility, custom and third party threat intelligence, intuitive workflows and powerful data visualisations that empower the analyst to move quickly through the data. The platform can also be utilised by the broader team, not just an organisation’s most experienced analysts. Enterprises evaluating network-based approaches to advanced threat detection and response may find a good fit in Arbor’s Spectrum platform.”
Arbor Networks, Chief Security and Technology Officer, Sam Curry, “The good guys deserve an unfair advantage through smarter approaches and processes. From the network, you can see all communications immediately and everywhere. You can look behaviourally and with pattern matching, you can look back in time, interrupt command and control, and updates to bots and tools. No matter how dramatic the changes to network infrastructure have become, all roads lead back to the truths that only network traffic reveals.”
Read the official press release from Arbor Networks here.