Cisco Packs Products Together - InformationWeek
IoT
IoT
Feature
News
6/10/2005
01:20 PM
Paul Travis
Paul Travis
Features
50%
50%

Cisco Packs Products Together

Software links security wares to let telecom providers offer more-effective protection against distributed denial-of-service attacks

Cisco Systems last week introduced software that ties together a variety of its security products so service providers can offer more-effective protection against distributed denial-of-service attacks.

Cisco's DDoS Protection technology includes new software for its Cisco Guard and Cisco Traffic Anomaly Detector products that learns what is normal on a network and adjusts its behavior on the basis of that information. It also communicates that information, along with user-established security policies and administrative changes, to service providers.

Distributed denial-of-service attacks flood Web sites or E-mail addresses with traffic, keeping them so busy that they can't serve up Web pages or handle routine E-mail traffic. The Cisco package of technology, which includes Cisco routers, the Cisco Guard and Detector, and network monitoring and detection gear from Arbor Networks Inc., is designed to let telecom service providers better protect their own networks from attack while at the same time offering managed-security services to their customers.

Sales of managed services, especially for security, are growing in importance for service providers as intense competition is causing a decline in the price and profitability of basic bandwidth services. Sprint uses Cisco's products to offer its IP Defender services. The service provider's managed-security portfolio includes network-based firewalls, an E-mail protection service, anti-spam and antivirus services, and a distributed denial-of-service detection and mitigation service.

The Cisco technology lets Sprint conduct deep inspection of packets flowing over the network to identify malicious traffic. So-called dirty traffic can be blocked or diverted to a quarantined area where it can be removed; legitimate traffic is sent back to the network. "Our focus is on scrubbing the traffic when it's in the network and only forwarding on legitimate traffic," says Randy Ritter, VP of product management at Sprint. "When you're dealing with a distributed denial-of-service attack, you want to deal with it in the network and not at the customer premises."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll