BURLINGTON, MA — (Marketwired) — 10/21/13 — a leading provider of DDoS and advanced threat protection solutions for enterprise and service provider networks, announced today that they have collaborated with Google Ideas to create a data visualization that maps global distributed denial of service (DDoS) attacks.
— a -think/do- tank — explores how technology can enable people to confront threats in the face of conflict, instability or repression. Google Ideas used anonymous data from Arbor Networks- ATLASĀ® global threat monitoring system to build a data visualization that allows users to explore historical trends in DDoS attacks, and make the connection to related news events on any given day. The data is updated daily, and historical data can be viewed for all countries.
The was introduced today at the -Conflict in a Connected World- summit, hosted by Google Ideas, in partnership with the Council on Foreign Relations and the Gen Next Foundation. The summit brings together experts, technologists and people with relevant experience from across a wide range of disciplines and backgrounds to address how technology can play a role in exploring trends, exposing threats and empowering people in conflict.
When Arbor Networks first began working with leading network operators in 2000, flood attacks were in the 400Mb/sec range. Today, they regularly exceed 100Gb/sec. The sheer size of the attacks is not all that has changed. Beginning in 2010, and driven in no small part by the rise of Hacktivism, we-ve seen a renaissance in DDoS attacks that has led to innovation in the areas of tools, targets and techniques. Today, DDoS is a complex threat that mixes flood, application and infrastructure attacks in a single, blended attack.
“The people at Google Ideas have really done an amazing job bringing Arbor-s global DDoS attack data to life,” said Arbor Networks President Colin Doherty. “The goal of this collaboration was to show what a global threat DDoS is and how DDoS can be used to suppress speech and threaten open access to information.”
Arbor Networks customers include the world-s leading Internet service providers and many of the largest enterprise networks in use today. According to a report published in June 2013 from Infonetics Research titled, “DDoS Prevention Appliance Market Outlook,” Arbor Networks was cited as top supplier of DDoS prevention solutions overall, as well as in the Carrier, Enterprise and Mobile market segments.
Read more about the Digital Attack Map on the blog
Hear from Google on the Digital Attack Map on the
Register for a webinar on October 29 with Google Ideas to explore the Digital Attack Map in action
Arbor Networks, Inc. helps secure the world-s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world-s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor-s advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,” making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context — so customers can solve problems faster and help reduce the risk to their business.
To learn more about Arbor products and services, please visit our website at . Arbor-s research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the .
Trademark Notice: Arbor Networks, Peakflow, ArbOS, ATLAS, Pravail, Arbor Cloud, Arbor Optima, Cloud Signaling, the Arbor Networks logo and Arbor Networks: Smart. Available. Secure. are all trademarks of Arbor Networks, Inc. All other brand names may be trademarks of their respective owners.
Kevin Whalen
Arbor Networks
781 362 4377
You must be logged in to post a comment Login