SK Telecom (News - Alert), one of the largest mobile service providers in South Korea, has selected Arbor's Peakflow SP platform in order to maintain the performance and availability of its mobile network and services.
"We have seen Internet sourced DDoS attacks target our mobile network and service. And lastly, we routinely see mobile application anomalies such as recovery storms, which aren't malicious in nature, but act like DDoS attacks on our mobile network. In any case, this sort of activity puts additional traffic on an already stressed mobile network infrastructure,” said Kevin Hong, senior security manager of SK Telecom, in a statement.
Hence, it's vital that these attacks be detected and stopped as soon as possible before they impact the customers' quality of experience.
"As the amount of smart devices and mobile data traffic continues to rise worldwide, Mobile Network Operators can rely upon the Peakflow SP and TMS solution to detect and stop both malicious and non-malicious DDoS events before they impact the performance and availability of their mobile network and services,” added Attley Ng, vice president for Asia , Arbor Networks.
SK Telecom recognizes these threats and is implementing solutions that ensure that its customers will have the dynamic user experience they have come to expect from such an innovative company. With Arbor's Peakflow SP and Peakflow SP Threat Management System (TMS) in place, the company will gain access to a comprehensive threat detection and mitigation solution that protects the overall mobile infrastructure from threats.
The mobile service provider has invested heavily into the access, backhaul and core of its mobile network. By leveraging IP flow data embedded into the network backbone and peering/transit edge routers, Peakflow SP enables SK Telecom to see a much higher level of cost-effective visibility into where the mobile network traffic is going to and coming from.
Further, another new feature within the Peakflow platform is the ATLAS Intelligence Feed (AIF) which delivers deep DDoS signatures in real-time to keep networks protected against hundreds of botnet-fueled DDoS attack toolsets and their variants.
This unique feed includes geo-location data and automates the identification of attacks against infrastructure and services from known botnets, while ensuring that updates for new threats are automatically delivered without software upgrades.
Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO Austin 2012, happening now in Austin, TX. Stay in touch with everything happening at ITEXPO (News - Alert). Follow us on Twitter.
Edited by Jamie Epstein