TEXT SIZE:

Cyber Security

Protect your subscribers, services, and network from online threats, and build a network that fights back

As part of a multi-layer security strategy, communications service providers (CSPs) must secure their infrastructure’s ability to deliver services, while at the same time protecting subscribers from online threats and complying with regulatory requirements. Since 2004, Sandvine has helped CSPs to achieve their security objectives, and today our award-winning products offer a quick and easy way to deploy a comprehensive secure pipes solution for networks of any type or size.

Download PDF Infosheet


 

Cyber Security with Sandvine

A Keynote Presentation

In this 15 minute overview, Ian Hassard discusses how Sandvine can help CSPs protect their subscribers, services, and network from online threats.


Sandvine offers a wide breadth of innovative cyber security solutions for CSP networks that clean pipes and further secure the network against a wide range of threats, so you can:


Protect Your Network

Precision DoS/DDoS Attack Prevention

Detect inbound and outbound volumetric and surgical DDoS attacks and stop them in real-time.

View use case >

DNS Cache Poisoning Protection

Detects and prevents DNS server infections where a DNS request from a user could be spoofed and re-directed to a malicious site.

View use case >

Botnet Disruption

Detect subscribers who have fallen prey to botnet infection and disrupt botnet operations.

View use case >

Reflector Attack Protection

Detect inbound and outbound distributed denial-of-service reflector attacks and stop them in real-time.

View use case >

Real-Time Malicious Traffic Monitoring

Monitor malicious activity in real-time by location, subscriber, and network-wide.

View use case >

Network Threat Deception

Protect the network and subscribers by misleading attackers into believing their malicious efforts have been successful.

View use case >


Protect Your Subscribers

Malware Infection Prevention - Powered by Symantec

Stop malware from ever reaching the customer’s front door.

View use case >

Malware Scanning Protection

Detect and stop malware scanning in real-time to protect subscribers and network infrastructure.

View use case >

Phishing Prevention

Prevent subscribers from falling prey to the enormous stress and financial burden of identity theft.

View use case >

Web Filtering Services

Hassle-free, network-side URL and web filtering based on topical categories.

View use case >

Dynamic Vulnerability Masking

Vigilantly, and dynamically patches vulnerable servers and other client devices make them appear less exposed.

View use case >

Parental Controls

Introduce parental controls as a revenue-generating value-added service or as a market differentiator.

View use case >

Subscriber Threat Notification

Deliver the right message at the right time on the right channel.

View use case >

Real-Time Malicious Traffic Monitoring

Monitor malicious activity in real-time by location, subscriber, and network-wide.

View use case >


Protect Your Reputation

Regulatory Web Filtering

Comply with regulations that require topic-based filtering.

View use case >

Outbound Spam Protection

Prevent outbound spam from leaving the network to avoid the costly service disruptions and reputational damage that come from being blacklisted.

View use case >

Real-Time Malicious Traffic Monitoring

Monitor malicious activity in real-time by location, subscriber, and network-wide.

View use case >

Dynamic Vulnerability Masking

Vigilantly, and dynamically patches vulnerable servers and other client devices make them appear less exposed.

View use case >


Cyber Security: Considerations and Techniques

This paper describes the wide variety of solutions that CSPs and enterprise Internet security professionals are juggling today, and explains the many advantages of using network policy control to deliver secure pipes to residential subscribers and business customers.

Read Whitepaper

Building a Network That Fights Back Against Online Threats

As part of a multilayered security strategy, communications service providers (CSPs) must secure their infrastructure’s ability to deliver services, while at the same time protect subscribers from online threats and comply with regulatory requirements. Only a solution engineered specifically to secure the untrusted environment of the Internet can provide effective defense against today’s threats.

In this session, you will learn about:

  • Network Threat Deception
  • DNS Cache Poisoning Protection
  • Precision DoS/DDoS Attack Protection
Watch Webinar


Ready to Learn More?

Speak with an Expert


UPDATED : 2017-04-13 15:39:19