Bezeq taps Arbor Networks to protect network

Israel’s telecom provider Bezeq International has tapped Arbor Networks to protect its network and provide managed services to customers.

Arbor Networks, a provider of network security and management solutions for enterprise and service providers, says it will provide Pravail Availability Protection System (APS) and Peakflow SP platform.

The deployment of Arbor Networks is aimed at protecting network and providing managed services to customers against a threat to availability, distributed denial-of-service (DDoS) attacks.

“We offer a wide range of services to both retail and enterprise customers, but they all have the same expectations, and that is for quality, consistent and reliable services, that are of course, available at all times,” said Sagi Kozuch, CTO of Bezeq International.

According to Infonetics Research, Arbor Networks was cited as the top supplier of DDoS prevention solutions overall, as well as in the carrier, enterprise and mobile market segments.

Deployment of the Peakflow SP platform helps ensure that DDoS attacks are identified and mitigated in the cloud, before they get to customer premises.

When Peakflow SP identifies an attack, customer traffic is diverted to the Arbor Threat Management System where it is scrubbed, and attack traffic surgically removed, while the remaining business traffic is passed through to the customer.

Colin Doherty, president of Arbor Networks, said: “With Pravail APS, we are empowering network operators to maintain better control over availability, using technology that has been battle-tested in the world’s largest and most complex networks.”

Arbor Networks’ customers include world’s ISPs and many of the largest enterprise networks.

Pravail APS is deployed at the network perimeter and provides visibility into critical IP services and applications running in the data center, such as HTTP, DNS, VoIP/SIP and SMTP traffic.

In addition, Pravail APS also helps protect data center infrastructure against numerous types of attack, including TCP state exhaustion, HTTP/web attacks, DNS floods/authentication attacks, TCP SYN floods, spoofed /non-spoofed attacks, UDP floods and dozens more.

editor@telecomlead.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest

More like this
Related

Optical Transport Market Surges 10% in 2025 as Cloud and AI Drive DCI Demand

The global optical transport equipment market recorded strong momentum...

Global RAN Market Stabilizes in 2025 as Huawei, Ericsson, Nokia Lead Vendor Rankings: Dell’Oro

The global Radio Access Network (RAN) market showed signs...

5G Mobile Core Network revenue surges: Dell’Oro

The global Mobile Core Network (MCN) market recorded a...

MWC 2026: Ericsson launches Agentic rApp as a Service on AWS to accelerate AI-driven autonomous networks

Ericsson has introduced Agentic rApp as a Service (rApp...