2018-06-14T07:58:00Z

What is your primary use case for Arbor DDoS?

Julia Miller - PeerSpot reviewer
  • 1
  • 207
PeerSpot user
34

34 Answers

Waseem Alkhawaja - PeerSpot reviewer
Real User
Top 10
2023-11-15T05:37:09Z
Nov 15, 2023

In my company, we use Arbor DDoS for the DDoS protection it provides.

Search for a product comparison
MS
Real User
Top 5
2023-09-19T13:41:42Z
Sep 19, 2023

We use the product for DDoS settings to prevent malware attacks.

Sobhakant Dhungana - PeerSpot reviewer
Real User
Top 10
2023-05-18T08:11:00Z
May 18, 2023

Arbor DDoS is not used for enterprise companies but by some other companies, including NIDC, a government entity.

Oleksii Pavlyk - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-01-27T11:48:40Z
Jan 27, 2023

We use this solution to protect our infrastructure.

DejanBlagojevic - PeerSpot reviewer
Reseller
Top 5Leaderboard
2022-11-25T17:28:00Z
Nov 25, 2022

Our primary use case for Arbor is dose protection.

ED
Reseller
Top 20
2022-10-26T15:32:56Z
Oct 26, 2022

Our company uses the solution to protect applications such as web DNS and file servers from DDoS attacks coming through the Internet's application layer. We also protect our devices and components such as firewalls, IPSS, and WAFs.

Learn what your peers think about Arbor DDoS. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
SB
Real User
Top 20
2022-08-03T16:10:00Z
Aug 3, 2022

Our company uses a platform to render the solution to our customers and ensure quality service. We build the solution based on our data centers and infrastructure and then deliver an ID appliance to the customer that communicates with our routers and network. The solution provides flow spec protection and prevents volumetric DDoS attacks.

AyodejiAbimbola - PeerSpot reviewer
Real User
Top 5
2022-07-14T06:13:14Z
Jul 14, 2022

Arbor DDoS is used for network protection if you have a DDoS attack, it keeps the session or information moving. Arbor DDoS is a combination of a physical appliance and the cloud, and it's combined in their subscription.

FaisalAbbasi - PeerSpot reviewer
Real User
Top 10
2022-04-25T09:35:49Z
Apr 25, 2022

We provide about 50% of the nation's bandwidth because of the submarine cables we have. We use Arbor to provide DDoS-protected bandwidth to our customers who require it.

YI
Real User
2021-09-10T11:32:00Z
Sep 10, 2021

We use Arbor DDoS for network security defense.

LM
Real User
2021-05-14T21:31:28Z
May 14, 2021

We use it to protect our infrastructure from DDoS attacks. It is used to protect web applications to provide a secure infrastructure for our client.

MR
Real User
2021-02-10T21:19:00Z
Feb 10, 2021

It is our ISP, from where we get our internet traffic. We just send it to them and if anything is suspicious or there is some malicious traffic, we talk to them about what kind of traffic it is. If some machine or some router is being attacked by a malicious user, we try to find out the source IP and why this traffic is coming to us. The Arbor solution is deployed on their premises. We just ask them to control or just stop that traffic. They do the filtration. They provide us all the required details to mitigate an attack on any particular machine.

TP
Real User
Top 20
2021-01-27T21:55:00Z
Jan 27, 2021

We are a telecom service provider. We provide services to our enterprise customers in India and compliment these services with security layer as a part of our security services. Being a part of the solution design team, I have been interacting with customers and creating solutions for them to fulfill their requirements. One of the products that we have in our offerings portfolio is around security, which is complimenting our connectivity portfolio. We provide this from Arbor platform, which we have deployed in our network. We have taken the hybrid model from Arbor, and there was a physical installation done in two of the gateways of the country. If the mitigation capacity goes beyond the subscribed boxes, then the Arbor Cloud subscription usage hits and mitigation would be done accordingly. We have deployed Arbor platform and for our customers, we offer it as a managed service from our network. There are also customers looking for on-premise deployment. We are using Arbor's hybrid approach for our overall product build. We have on-premise deployment, however, beyond that we have taken the Arbor Cloud subscription, which is really useful because you secure yourself for anything beyond your current mitigation capacity. This is a really good feature of Arbor that is available.

WF
Real User
2021-01-27T12:36:00Z
Jan 27, 2021

My company is a quad-play operator service provider in Malta. We use it for our own internal infrastructure and clients, where we use both always-on and on-demand. Our partner has an in-house deployment and can upload it to the cloud as well. This helps to minimize the costs. With in-house deployment, the cost will increase significantly. So, this hybrid approach is advantageous.

PL
Real User
2021-01-19T03:11:00Z
Jan 19, 2021

As an operator, we use Arbor antiDDoS system to protect our backbone, protecting the network and our assets like DNS.I'm involved in the validation and testing of the solution. The solution is installed in our lab, with a simulated full network. We can send some regular traffic as well as DDOS traffic, using some testing tools like IXIA system and opensource tools. For testing, we simulate some regular traffic, as background traffic, and we added some attacks on the network with attack tools. We can monitor what's sent to the network, and we can monitor what's received by the victim. In this case, we can assess which part of the attack was stopped by the system. Arbor DDoS helps consolidate visibility on traffic and on DDOS attacks attempts. It can perform direct mitigation action on the network, which is important. It has also helped us achieve our network and application uptime goals.

AS
Real User
2021-01-17T15:30:00Z
Jan 17, 2021

Our business is to provide a DDoS protection solution for our customers. Our customers are banks, financial groups, etc. We might develop some DDoS protection services for our customers under our Internet umbrella. We detect and filter traffic using Arbor DDoS in our network. We use it as a BGP or prompt, as a telecom service provider. We have SP and TMS, and that is all our architecture. We resell on-premise the Arbor edition and install at our customers' site, specifically the Availability Protection System (APS) system.

RM
Real User
2020-12-22T11:30:00Z
Dec 22, 2020

We are using it for application availability, for its perimeter protection against DDoS and such service-exhausting attacks. Our goal is service availability and protecting our infrastructure against reputational damage and other penalties that could be incurred as a result of outages and malicious activities.

RL
Real User
2020-08-10T07:32:00Z
Aug 10, 2020

We're a hosting company and, in this industry, it's inevitable that you're going to be attacked. We originally purchased the product back in early 2000 for the SQL monitoring. Over the years, DDoS has become a nuisance for other companies we're hosting as well. We had originally purchased it just for internal use, and to predict our own internal infrastructure. But we found an avenue to offer it to our customers as well. It has just grown from there. It's on-prem to protect our own infrastructure, as well as in the product that we sell to our customers to protect their services. We have a hybrid as well, as we use Arbor Cloud to protect our company's major assets if needed, as a type of over-capacity swing-over.

SP
Real User
2020-08-02T21:08:00Z
Aug 2, 2020

Using the Arbor SP Insight allows the detection of DDoS attacks coming in from upstream internet providers. The system provides a central analysis to detect DDoS attacks and allow reporting on internet traffic. This along with the TMS physical off-ramp mitigation platform allows us to redirect the inbound attack traffic via BGP. The offramp TMS effectively separates attack traffic from the main path used during normal operation. The system provides attack mitigation for both internal infrastructure and downstream customer services.

JK
User
2020-06-03T20:31:16Z
Jun 3, 2020

Every employee should be educated in best practice procedures, starting with basics like clever password combinations and then going into details of how different attacks work, emphasizing ways to recognize social engineering tactics. Businesses must also demonstrate the potential impact of a breach occurring, which can help establish personal responsibility. Crucially, businesses shouldn’t just focus on prevention. Employees also need to understand best practice in minimizing the damage should a breach occurs.

EN
MSP
2020-03-15T08:08:00Z
Mar 15, 2020

We're a managed service provider as well as an internet service provider. We use it to protect our core network from DDoS attacks, and by protecting our core network we can also protect our end customers. We're in the process of migrating to the newest version, currently. We use the solution in our physical environment, but we also take advantage of their cloud offering.

LM
Real User
2019-04-18T09:59:00Z
Apr 18, 2019

We observed traffic over six months to create a benchmark. We created alerts to trigger and be sent to our SOC once the traffic exceeds the benchmark.

HR
Real User
2018-12-30T11:29:00Z
Dec 30, 2018

We have captured a profile for every production group which has a server-type configuration. We also enable signaling. If there is a huge amount of traffic, it will indicate that to us. Accordingly, we will inform them to take action or whatever. We will determine whether it is legitimate or not based on the requirements. There is a given bandwidth for any organization, an expected amount of traffic at a given point of time. If it sees more than the traffic which we are expecting at a given point of time, it could be an anomaly. We will then check internally whether a download or upload is happening, etc. Normally, if it sees a huge amount of traffic at the same time, then automated cloud signaling will be enabled and, automatically, the traffic will be dropped.

VJ
Real User
2018-12-24T07:43:00Z
Dec 24, 2018

Mitigating network level volumetric attacks, complete network visibility and complete control on applying countermeasures.

UK
Real User
2018-12-19T10:49:00Z
Dec 19, 2018

We use it to protect websites, usually. But it's hosted in our network, our infrastructure, and the company websites as well. We are an ISP company and we provide internet services and other services to companies, like banks, etc. Part of our services is DDoS protection.

AF
Real User
2018-12-19T09:19:00Z
Dec 19, 2018

Our primary use case is developing threshold values for all groups. We use it to analyze packets to build a use-case for when a server group hits the limit of incoming traffic. In such a case we suspect traffic. We use it to build use-case scenarios, based on the server input and a client's requirements. Some clients have a number of users accessing a given server which affects the bandwidth. In each case, we need to tell DDoS what is considered legitimate traffic.

TB
Real User
2018-12-19T09:00:00Z
Dec 19, 2018

We use these products because of the increase in frequency and sophistication of Denial of Service and Distributed Denial of Service attacks. As a service provider, we need to control and mitigate these attacks.

MN
Consultant
2018-12-10T08:29:00Z
Dec 10, 2018

I work at the service provider level. I did a deployment at a multinational telecommunications company. They have network separation, and each network has its own SP which is a controller, the "mind" of the solution, and multiple TMS's, which are the scrubbing centers for the illegal traffic. They are forwarding suspected denial-of-service traffic to the scrubbing centers, based on the SP intelligence. It will scrub the data and forward it to the normal traffic after mitigating the denial-of-service attack.

AG
Reseller
2018-12-10T08:29:00Z
Dec 10, 2018

We are an internet service provider. We are using Arbor in our networks and it mitigates all attacks on our network. We are using BGP for traffic diversion.

AM
Real User
2018-12-02T07:45:00Z
Dec 2, 2018

We use Arbor DDoS in the Asia Pacific region for a couple of government clients and Financial sector. The primary use case is for different types of problems that we do not see with other solutions, such as IPS, IDS, and FireEye. It has that type of detection and it blocks things.

SR
Real User
2018-12-02T07:45:00Z
Dec 2, 2018

I was working in the ISP environment and the Arbor DDoS solution is integrated in there.

it_user969444 - PeerSpot reviewer
Real User
2018-12-02T07:45:00Z
Dec 2, 2018

We are using Arbor as a DDoS protection infrastructure. It protects our both our company's infrastructure and also our customers' infrastructure. We are not using it to protect one website, we are protecting a lot of websites and a lot of customers' infrastructures including their websites, their web services, etc.

RN
Real User
2018-10-29T15:46:00Z
Oct 29, 2018

The main focus was DDoS protection.

HV
Consultant
2018-06-14T07:58:00Z
Jun 14, 2018

It is mostly for Internet Service Providers (ISPs). It is for operations on the service provider and network security operations. It is a good solution.

Arbor Networks, the security division of NETSCOUT, is driven to protect the infrastructure and ecosystem of the internet. It is the principle upon which we were founded in 2000; and remains the common thread that runs through all that we do today. Arbor’s approach is rooted in the study of network traffic. Arbor’s suite of visibility, DDoS protection and advanced threat solutions provide customers with a micro view of their network enhanced by a macro view of global internet traffic and...
Download Arbor DDoS ReportRead more