Arbor DDoS Valuable Features

Usman Khan
Team Lead for DDoS Protection at a comms service provider with 10,001+ employees
Our customers are very happy when we provide them with the interface. We give them read-only privileges and they can review the results by themselves. They can check how many attacks they have faced and how many attacks have been blocked. That is a very valuable feature offered by Arbor DDoS. We can also give them more privileges. They can do some tweaking according to their own systems. If they have a database running or if they have a website, they can tweak the features themselves. View full review »
Security Consultant with 51-200 employees
The DDoS mitigation. There is no other feature. It's just one dashboard with mitigation. You decide which mitigation you want and at what threshold to do this or that. Its operation is pretty simple. It's easy. Once you deploy it, you're optimizing your network and using the solution to its fullest. View full review »
Cloud Security Specialist at a tech services company with 11-50 employees
* AIF * Cloud Signalling - In my previous environment, we worked with Arbor as a carrier but in my current company some of our customers have the solution on-premise and we have to synchronize the solution with the Arbor solution that our customers have in their enterprises. The ability to work with the Arbor solution on the carrier side and on-premise provides solutions for both types of customers. View full review »
Find out what your peers are saying about Arbor Networks, Radware, F5 and others in DDoS. Updated: March 2020.
405,659 professionals have used our research since 2012.
Senior Project Engineer at a tech services company with 10,001+ employees
It's very user-friendly. Everything is done through a GUI. It doesn't take much time to learn how to use it. Once you see it a few times you understand it. It provides packet capture and we can block or whitelist whichever IPs we need to. Whatever traffic we want to block - and we get IPs from internal teams and from national teams - we block at the Arbor level only, because if it gets to the firewall then firewall bandwidth will be taken. With Arbor, every six or 12 months, we can do DDoS testing. Also, there are HTTP connections. We can tell it there are multiple production categories which are present in a server-type configuration and we can use that. In very rare situations we use it to capture traffic. If there is any malicious traffic we can capture the packet where we can see the HTTP request. View full review »
Security Expert at a comms service provider with 10,001+ employees
We are using it mainly for DDoS protection. Reporting functions provide good visibility. Also, API's helps us to improve our service. We are also using it by serving cloud signaling service to our customers for their on-premise APS devices. View full review »
Manager IP Services at a tech company with 10,001+ employees
Specifically in the ISP infrastructure where I was working, Arbor DDoS is integrated to detect the threats and mitigation. Basically, the peak flow TMS solution and peak flow SP solution has been procured by my company. We are providing services to customers and protecting our own infrastructure as well. When you work in an ISP or enterprise environment, the main priority is to protect your services or your customers services, like bandwidth. There must be no high volume breach towards any customer, such as a DDoS attack or application level attack. The purpose of procuring a peak flow TMS solution is to mitigate the high volume attacks towards our customers and to protect our internal infrastructure as well. This is our priority in this aspect. View full review »
Security Architect with 1,001-5,000 employees
It's very flexible and we can easily deploy it to our network. It's very user-friendly. We can do everything via the web interface and troubleshoot easily from the CLI. It's not complicated. I like the features. View full review »
Technical Lead - DEVSECOPS with 1,001-5,000 employees
We can reduce the bandwidth to minimize the attack level. If we see more than 2.5 GBs we drop it directly. Many times an attack is with hundreds of GBs on our devices. We're able to filter that out. Also, it is able to find new, different IPs. Arbor keeps them for one or two days, but it will release them after some time. That enables us to blacklist them permanently so that we don't get that IP's traffic. It also denies fragmented packets. View full review »
Security Consultant at a tech services company with 10,001+ employees
There are a number of valuable features in this product, like Cloud Signaling and Threat Intelligence feeds. There are two modes in the product: The first is a learning mode and the other is a production mode. First, we learn the traffic using the learning mode. We use it to fine-tune what is suspicious data and what is legitimate traffic. View full review »
Information Security Analyst at a financial services firm with 1,001-5,000 employees
In the GUI, the packet capture is a very good option, as is the option to block an IP address. These help in analyzing traffic and blocking unwanted IP addresses as a preliminary troubleshooting step. Also, they have a customer program where, if we find a blacklisted or bad-reputation IP, we can submit it to Arbor directly. View full review »
Security Advisor at a comms service provider with 10,001+ employees
Valuable features include: * Simple and centralized management of user access and capabilities * Viewing and/or configuring of status, history, account, user, AAA, DNS, and NTP settings * Web 2.0 interactive attack alerting, traffic visualization, and mitigation service control View full review »
Network Consultant at a comms service provider with 51-200 employees
We are able to respond quickly and prevent DDoS attacks. View full review »
Vikas Jain
Engineer at RailTel Corporation of India Ltd
* DDoS amplification * Flow specs * Blackhole mitigation, and * IP location policy to control traffic based on geolocation. View full review »
Find out what your peers are saying about Arbor Networks, Radware, F5 and others in DDoS. Updated: March 2020.
405,659 professionals have used our research since 2012.