Your Network's Edge®
You are here
The Problem with Scrubbing Centers
RADinsight complements traditional solutions that are lagging in providing protection from newer attack vectors:
- Scrubbing centers are an excellent tool for larger businesses, but their detection mechanism is not tuned for smaller organizations.
- They are slow and limited in their ability to scale up to handle the full volume of threats. They also overload your network.
- By design, scrubbing centers cannot protect from malicious outbound traffic generated by endpoints within the network – malicious bots installed offline, either on enterprise hosts or IoT devices.
- No protection for L2 VPNs.
- No treatment of malicious traffic coming from partnering networks for out-of-footprint service reach.
- Other inline solutions inspect complete traffic, requiring a substantial hardware footprint and creating additional weak points in the network.
RADinsight as the First Line of Defense
RADinsight TI detects and mitigates volumetric and zero-day attacks in seconds. It protects the network from starvation and is used as a first line of defense with scrubbing center activated on demand.
Operating as close as possible to the source of the attack – at L2 demarcation points and at inter-carrier demarcation points, RADinsight TI’s ML-based anomaly detection engine eliminates the need to set up a high baseline as a starting point. It can therefore detect low-volume attacks at less than 1%.
Being software-based, RADinsight TI operates without the need for traffic rerouting and without affecting device bandwidth or introducing latency.
Threat Intelligence: How It Works
RADinsight TI works by constantly collecting data from the carrier edges and monitoring all traffic to identify attacks. Once an attack is detected, closed-loop enforcement is applied via an ACL installed on the carrier edge.
Highlights
- Dashboards provide real-time status of protected elements.
- Configurable security policies for automated blocking of malicious traffic.
- Optional interworking with a third-party security orchestration engine.
- Full cloud-native solution - based on microservices and Kubernetes
RADinsight Threat Intelligence
AI-driven threat intelligence with network embedded security
RADinsight TI
RADinsight TI detects and mitigates DDoS attacks threatening CSP network and enterprise/business normal operations, utilizing an EAD/NID’s unique capabilities to see all ingress and egress traffic at the CSP and customer edge, and block malicious flows.
RADinsight TI detects and stops cyber-attacks within seconds. It operates via carrier and network edge devices already in your network.
• SaaS solution closes current security gaps
• Prevents volumetric DDoS attacks
• Faster than scrubbing centers
• Mitigation at the attack location
• AI and ML help detect even small anomalies
• Protects from inbound and outbound attacks
Key Take-Aways
Zero-day & signature attacks. Orchestrated attacks
through ACL in edge devices, close to attack origin
No traffic rerouting. No additional weak point. No impact on user experience
Cloud native solution
RADinsight TI Quick Specs
- Cloud-based on-demand subscription service
- Protects from low-volume and short inbound attacks at carrier edges
- Protects from inbound threats from partner networks at peering points/E-Access
- Protects from outbound threats at carrier edges
- Integrates with the CSP’s attack life-cycle management system