Arbor DDoS Initial Setup

Tushar Sail - PeerSpot reviewer
Sr.Manager - IT at Reliance Industries Ltd

As a customer of Arbor DDoS, I am unable to provide any comments regarding the setup process, as it was handled by someone else. Similarly, I cannot comment on the duration of the deployment of the solution within our organization, as our service provider was responsible for its deployment.

View full review »
SB
Product Manager at a comms service provider with 10,001+ employees

The initial setup requires knowledge and is not easy. Setup involves many things including security, technology, alerts, and incidents. From a security operation standpoint, it is detailed and hard. 

View full review »
RL
Sr. Security Engineer at Rackspace

The setup depends on the network, but from start to finish, they're really good at helping you set this up. Their sales engineers are very hands-on people. It's pretty much straightforward for a mid-level engineer to set up, without any real help.

We redeploy new hardware every five years, and we can redeploy 48 devices within three days with no network interruption. And we can deploy a single data center for DDoS within four hours, max.

We have a standard implementation strategy. We have them on standby. We have them deliver all their devices with any code that we're going to be upgrading to or running. For the most part, they will stage any type of code or patches that we may need. From there, it's pretty much unplug it and plug it back in.

We have a team of three for deployment. At any given time, one way or another, I would say close to 150 people are using it. Their roles include peer coordinators. We also have our design and build engineers looking at capacity. There are people on my team that deal with nothing but DDoS attacks. I have network operations dealing with network visibility. I have internal SOCs that are looking for any kind of malware or bad actors trying to invade our corporate network. We also have our customer SOC desk looking at the internal data center backbone for customers.

View full review »
Buyer's Guide
Arbor DDoS
April 2024
Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.
DejanBlagojevic - PeerSpot reviewer
Presales Engineer at Exclusive-networks

On a scale of one to five, one being difficult and five being easy, I would rate Arbor's initial setup as a three. It is easy, but you need to plan it well. You need to think about what you are protecting. There are a lot of different small fine tuning elements that you need to consider during the deployment.

A common implementation strategy for Arbor DDoS takes about two to three weeks. That is the optimal time frame for delivering the whole solution and getting it as a fully functional protection. 

We usually start the implementation process by placing the device in the customer's data center. We put it into a transparent mode and then observe some peaks, packet rates, and traffic flows. When that learning period is over, we will start to enforce the protection. That is about it; nothing more to it than that. There may be some fine tuning as a last step, but that rarely happens.

The deployment usually includes myself and one more engineer. Bigger teams of up to seven or eight engineers do get formed for enterprise customers and internal service providers.

View full review »
Osman Nayan - PeerSpot reviewer
IP/DDOS Senior Engineer at Türk Telekom International

The setup process was easy. The solution has been set up on all the devices. So, I did the setup from start to end.

View full review »
Robert Plese - PeerSpot reviewer
Network Engineer at a tech services company with 51-200 employees

It's more complex than Check Point, and it depends on the topology and what customers need. I'd rate it a three out of ten in terms of ease of setup. All of its deployments are on-premises.

View full review »
Waseem Alkhawaja - PeerSpot reviewer
Product Specialist at a comms service provider with 501-1,000 employees

The product's initial setup phase is complex. When it comes to a service provider in the local market, you need to realize that you are dealing with a complex solution with a high capacity for threat mitigation to serve multiple customers with different requirements. In our company, we have layer 2 attacks and mitigation techniques, where the tool is installed on an on-prem solution in our gateways and integrated with Arbor DDoS global scrubbing center to handle very high or volumetric DDoS attacks. When you want to go for application security with Layer 7 DDoS, you must install the AED or a customer device on an on-prem model. The new model or the business model of customers try to avoid installing any on-prem devices or hardware so they can take over the headache of operation or management or vendor support of their devices.

The solution is deployed on the on-premises and cloud models. Depending on the cybersecurity compliance requirements, you can choose to deploy the tool on either model as it offers deployment of the product on a hybrid model.

View full review »
MR
Sr. Manager at a energy/utilities company with 10,001+ employees

We don't have the Arbor solution deployed on-premises. It's with the ISP, so I wasn't involved in the setup or the implementation.

View full review »
Oleksii Pavlyk - PeerSpot reviewer
Head of the direction of ensuring the security of digital systems, electronic databases and networks at Ukreximbank

The initial setup is easy, it takes a couple of minutes. 

View full review »
WF
Manager IP Core and Transmission Networks at GO PLC

It took three months once our agreement was done.

View full review »
PL
Traffic Management skill center at a comms service provider with 10,001+ employees

The initial setup is quite complex. It isn't easy to do the configuration, but it's okay once it's done. Arbor's implementation strategy was to monitor first and provide all the configuration or the correct profiling for this system after it's considered safe.

View full review »
EN
Product Manager, MSx Security Services at TPx Communications

I wasn't involved in the initial setup, but I was involved, mid-stream, when we brought in the mitigation side. We are currently replacing our aged infrastructure of Arbor products with a newer version. I'm tangentially involved with that.

The updating process is straightforward. They've done a good job of that. And the fact that we've already deployed it before means we can use the template of the previous deployment to set up the new deployment. So it is easy.

Our implementation strategy is the same, whether for the initial setup or for the updates. We're finding where the drains are on our network and set up the monitoring for those points. Then we create the mitigation side at specific data centers so we can route traffic to those devices and mitigate the traffic.

View full review »
MS
Network Security Manager at a financial services firm with 1,001-5,000 employees

The initial setup is easy. It involves configuring network connectivity, including public IP addresses and firewall/router configurations. It requires setting up security rules or access controls on Arbor to control which traffic is allowed through. It's important to ensure that traffic from the Internet has a few diversions before reaching the firewall. It takes approximately six hours to complete. The system needs to take a downtime for maintenance. It requires around 13 minutes to complete.

View full review »
LM
Information Security Officer at a financial services firm with 51-200 employees

Its initial setup was easy. It was a one-month project, and its implementation was very fast.

View full review »
UK
Team Lead for DDoS Protection at a comms service provider with 10,001+ employees

The initial setup is kind of complex because it requires peering. We have to design it from scratch, which makes it a little bit complex. It depends on whether we want to get it inline or if we want to apply offloading, and whether the company can afford a TMS of its own or we need to send traffic to a remote TMS, hosted by Arbor itself.

The last deployment I was involved in took almost a month-and-a-half, with another 15 days for documentation.

It took about eight to 12 people to get the deployment operational. We had people from the core who were engaged with us for the integration and bringing up the systems. After that, we had to hire some fresh resources, because, honestly, it's a new product and it's not very common. We can't really find experienced people for DDoS.

It was not much of a challenge when we were developing it and when we were deploying it because we had a resident engineer who was planning everything, who was leading everything. But after that, when we were mitigating the attacks, there were challenges because we didn't have experienced people over here and the attacks were coming day and night, 24 /7. I had to come to the office after midnight and at midday. 

But now, the system stable and the people that I'm managing are more experienced. They know stuff and it's pretty smooth now.

View full review »
TB
Security Advisor at a comms service provider with 10,001+ employees

The setup follows a project plan based on a PIP (Performance Improvement Plan) document and the LLD. A process is created to cover site preparation, hardware staging, hardware installation, and link activation and needs the involvement of the Operations team. Deployment takes three to four months.

Our implementation strategy is as follows:

  • Assign a project manager to be onsite when needed during the implementation until signoff
  • Understand customer’s policies, requirements, and procedures
  • Discuss and agree on the general prerequisites for the proposed solutions
  • Conduct site survey
  • Site preparation for the proposed solutions
  • Design the proposed solutions
  • Provide detailed project plan for the entire assignment
  • Provide Low-Level Design
  • Delivering the proposed SW and HW to the site
  • Configure the solutions based on best practices
  • Complete integration, fine-tuning, testing, and knowledge transfer to provide templates and guidance on use of templates to team members
  • Finalize the deliverables along with the client
View full review »
PN
Presales Manager - Iraq and Jordan at a computer software company with 201-500 employees

The initial setup is easy. It takes two days to be deployed. One or two engineers are required for the deployment depending on the use cases.

View full review »
AS
Engineer at a comms service provider with 10,001+ employees

It was quite complicated and complex to set up. 

View full review »
YI
Regional Technical Manager at HTBS

The solution is easy to deploy and takes approximately two days. It is easier to deploy than other solutions.

View full review »
SC
Owner at Ampec Data Service srl

The initial setup was okay and did not take long. 

View full review »
ED
Network Security Engineer at a tech vendor with 11-50 employees

The setup not complex and a simple configuration takes about one hour. 

An advanced configuration takes up to twenty days because I run simulations and check results. It is not constant work but provides useful results. 

View full review »
AyodejiAbimbola - PeerSpot reviewer
Senior Client Sales Manager at TIGER LOGIC

The initial setup of Arbor DDoS is straightforward, and it took approximately five days to implement.

View full review »
RM
Network Security Architecture at a financial services firm with 501-1,000 employees

It's not complex. If you know what you want to use the tool for, the placement, and you know what you want to protect, the setup is very straightforward. It requires minimal downtime to deploy the solution. I found it quite easy.

Deployment took about two hours, but that time includes internal delays. From the moment you start setting it up, it takes no more than 30 minutes. The longest part, before you deploy the technology, is learning your network by monitoring it. That could take a long time, depending on the timeframe that you want to benchmark on. It could take, say, a month, just to get an idea of how your network behaves. But in terms of setting up the device, it should take an hour, tops.

We had three people involved in the initial setup. All are network engineers.

Post-deployment maintenance on our side consists of just the regular updates of the software. 

View full review »
AG
Security Architect with 1,001-5,000 employees

It is easy to deploy. You can easily configure the interface, connect your network, and easily do the BGP configuration from the menu.

If you're deploying the TMS product, it takes about one hour for the physical deployment and configuration requirements. The Collector is easily done in TMS. Their inline solution, APS devices, is also easily done. It takes about a half an hour for an APS device.

We don't have a specific deployment strategy. For deployment, the minimum staff required is one security guy and one network guy.

View full review »
HR
Senior Project Engineer at a tech services company with 10,001+ employees

I did the initial setup. It's not complex. We have a default admin and password where we need to set a management IP. Once management IP is set, if we connect it through a comm port, we need to set our system IP tools in the same subnet so that we can connect to Arbor. After that, we can set up usernames, passwords, and an IP access list. We can even change the group password.

If you have some knowledge, the implementation will only take between a half-hour and an hour. The only scenario where it takes time is when we put it into inline mode; when we mount the devices into the network.

One person is enough for deployment, if they have knowledge of how to implement it. There is no need for two or three. The number of people required to maintain it depends on the automation. One person is often enough. 

View full review »
it_user969444 - PeerSpot reviewer
Security Expert at a comms service provider with 10,001+ employees

The setup is very straightforward, not too complex. Their tech team is very helpful.

View full review »
AM
Technical Lead - DEVSECOPS with 1,001-5,000 employees

The initial setup is complex.

Deployment took about four months. After getting vendor support for installation, we then configured IP ranges for different clients. Then we set up the bandwidth and enabled logins.

There has not been much to deploy and maintain since then.

View full review »
SR
Manager IP Services at a tech company with 10,001+ employees

Initial setup is a bit complex because it is a Linux based working environment for configuration. A bit of expertise is required to configure the setup. It requires an expert level assistance from Arbor to complete the configuration or to apply any new system.

Deployment took around 3-4 months because we had two sites nationwide on which peak flow was deployed.

View full review »
it_user626721 - PeerSpot reviewer
Security Consultant & IT Professional at Sistemas Aplicativos, SISAP

Setup complexity depends on the appliance:

  • Arbor Networks APS: The setup is really straightforward; deployment and tuning are not that hard.
  • Arbor Networks SP/TMS: This a complex solution and usually deployed in Diversion/Reinjection mode. Customers have to know the concepts and configuration about BGP, routing etc.
View full review »
PS
System Administrator at a tech vendor with 10,001+ employees

The complexity of the setup depends on the user's experience, but it's very quick to deploy.

View full review »
AF
Security Consultant at a tech services company with 10,001+ employees

The initial setup is straightforward. It's very simple. I have deployed the product for multiple clients. Implementation takes less than three to four hours, but the fine-tuning takes some time, based on the organization's needs. That can take more than a month.

Our implementation strategy is based on how many servers and groups there are and what kind of traffic is coming to/from the internet. These are the factors that affect how we deploy it. Deployment requires two to three consultants who are security architects. For maintenance, one administrator is fine.

View full review »
MN
Security Consultant with 51-200 employees

The complexity of the initial setup depends. If you have a simple network, the deployment will be easy, but if you have something more complex and you are trying to inject Arbor, it won't be easy. Most likely, you'll do it as Layer 2, and you have VRFs and VLANs. After the design is complete, the configuration will be straightforward, but the design part is not easy. That's not about Arbor itself, it's about how big networks work.

The implementation strategy also depends. Every service provider and big enterprise has its own type of networks and its own type of logical flow. So there's no standard strategy.

The last implementation I did took about two months. But again, it's not about the deployment itself, it's about the meetings, the design part, meeting with other teams. After two months it was up and running. Before that, the first one I did, took three months, but we had two SPs and eight TMS's in different data centers, so it was quite a big implementation.

When it's a service provider, multiple teams handle multiple things, so you have to have one person from every team to sit in a meeting; everyone has his own concept or his own ideas. After a couple of meetings, after a couple of suggestions, and after checking if what was discussed is possible, if it is the better option, it can go well.

In terms of staff for deployment, it's mostly a one-person job. For day-to-day administration, it takes three to four people. They would need security backgrounds, SOC or security device managers.

View full review »
it_user667689 - PeerSpot reviewer
IT Security Manager at a comms service provider with 501-1,000 employees

The initial IP configuration has to be done in a command line, but the rest you can do via the web interface.

View full review »
RN
Cloud Security Specialist at a tech services company with 11-50 employees

The setup is very straightforward, once the final architecture is decided. 

However, the decision regarding the final architecture was not very simple because the carrier environment is very complex. In addition, at the time, the carrier I was working for bought another small carrier and was doing the integration between both their installations and backbones. That was very complex. But once all those details were decided, the placement of the Arbor solution was very straightforward.

The setup work and testing of the Arbor solution took about three to four weeks, not including all the pre-planning and architecture discussions.

View full review »
it_user663393 - PeerSpot reviewer
Cyber Security Analyst at a tech services company with 10,001+ employees

Not applicable.

View full review »
it_user664614 - PeerSpot reviewer
Cyber Security Analyst at a tech services company with 10,001+ employees

The setup is a little complex regarding the methods of configuration with the customers, as we need to provide them with a clean pipe path during mitigation. Also, it is mostly used on ISPs so the configuration on gateways is a little hectic.

View full review »
UJ
Security Consultant at a tech vendor with 11-50 employees

The initial setup is quite easy. The time taken for deployment depends on the number of servers or machines we need to protect. In most cases, the product can be deployed in one day.

View full review »
LM
Information Security Analyst at a financial services firm with 1,001-5,000 employees

Although I was not involved in the initial setup, I understand that it is easy. In terms of the specifics of our implementation, it's sensitive information so it can not be made public. Because of the criticality, I cannot comment on configuration or how is it implemented.

Regarding the simple setup, it is because of the out-of-the-box configurations which Arbor provides you with. I don't think there is another way to implement it as such. It was per Arbor's standards, so there was nothing that was done differently.

View full review »
HV
Network Consultant at a comms service provider with 51-200 employees

The initial setup is complex, but experts are involved. Even with experts from both the vendor and the operator side, the initial set up can take some time, though it is essential.

View full review »
it_user700122 - PeerSpot reviewer
Information Security Officer at a comms service provider

No, the initial setup was easy. The excellent interface makes it easy to configure.

View full review »
Buyer's Guide
Arbor DDoS
April 2024
Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,847 professionals have used our research since 2012.