Arbor Networks Inc., a provider of network security and management solutions for enterprise and service provider networks, has unveiled a new solution in its Pravail portfolio for enterprise and government network operators.
Officials with Arbor Networks said Pravail Network Security Intelligence (NSI (News - Alert)) monitors network traffic data and uses advanced analytics to help organizations close the security gaps left by firewalls and intrusion prevention systems (IPS).
Company officials said it looks inside the network and delivers the situational awareness required to identify advanced threats, internal network misuse or abuse, and infected mobile devices connected to the network.
With the release of Pravail NSI, Arbor has created a platform for delivering actionable security intelligence that is critical for identifying and stopping attacks.
According to company officials, Arbor’s Pravail family also includes the Availability Protection System (APS), which oversees the network perimeter to detect and mitigate application layer DDoS attacks in real time.
These stealthy attacks are the primary threat to security infrastructure solutions today, which if compromised, can threaten the very availability of networks themselves.
“Pravail NSI leverages Arbor’s threat detection technology which has been deployed in enterprise networks since 2003. The threat landscape has changed dramatically in the past two or three years, let alone over the past decade,” said Colin Doherty, president of Arbor Networks.
Pravail NSI extends those capabilities to address an acute concern for businesses today, the damage to the bottom line and brand integrity that can come from an undetected advanced or insider threat,” said Doherty.
Pravail NSI offers a comprehensive view of all activities occurring in, on and around the network including bring your own devices (BYOD) that are accessing corporate resources, botnet communication and application misuse.
Pravail NSI offers IT teams the ability to Identify and address the misuse of corporate resources and servers; Detect and defend against advanced threats, including malware and botnets; monitor critical services and systems; and alert to suspicious activities that put data at risk.
Edited by Braden Becker