Bezeq taps Arbor Networks to protect network

Israel’s telecom provider Bezeq International has tapped Arbor Networks to protect its network and provide managed services to customers.

Arbor Networks, a provider of network security and management solutions for enterprise and service providers, says it will provide Pravail Availability Protection System (APS) and Peakflow SP platform.

The deployment of Arbor Networks is aimed at protecting network and providing managed services to customers against a threat to availability, distributed denial-of-service (DDoS) attacks.

“We offer a wide range of services to both retail and enterprise customers, but they all have the same expectations, and that is for quality, consistent and reliable services, that are of course, available at all times,” said Sagi Kozuch, CTO of Bezeq International.

According to Infonetics Research, Arbor Networks was cited as the top supplier of DDoS prevention solutions overall, as well as in the carrier, enterprise and mobile market segments.

Deployment of the Peakflow SP platform helps ensure that DDoS attacks are identified and mitigated in the cloud, before they get to customer premises.

When Peakflow SP identifies an attack, customer traffic is diverted to the Arbor Threat Management System where it is scrubbed, and attack traffic surgically removed, while the remaining business traffic is passed through to the customer.

Colin Doherty, president of Arbor Networks, said: “With Pravail APS, we are empowering network operators to maintain better control over availability, using technology that has been battle-tested in the world’s largest and most complex networks.”

Arbor Networks’ customers include world’s ISPs and many of the largest enterprise networks.

Pravail APS is deployed at the network perimeter and provides visibility into critical IP services and applications running in the data center, such as HTTP, DNS, VoIP/SIP and SMTP traffic.

In addition, Pravail APS also helps protect data center infrastructure against numerous types of attack, including TCP state exhaustion, HTTP/web attacks, DNS floods/authentication attacks, TCP SYN floods, spoofed /non-spoofed attacks, UDP floods and dozens more.

[email protected]