公司规模
1,000+
地区
- America
国家
- United States
产品
- Peakflow SP
- ASERT
- Active Threat Feed (ATF)
- Fingerprint Sharing Alliance (FSA)
技术栈
- IP flow technology
实施规模
- Enterprise-wide Deployment
影响指标
- Cost Savings
- Customer Satisfaction
技术
- 网络安全和隐私 - 网络安全
适用行业
- 电信
适用功能
- 商业运营
用例
- 网络安全
服务
- 系统集成
关于客户
Covad Communications is a leading service provider in the United States, offering broadband, voice over IP (VoIP), and wireless services to more than 57 million homes and businesses in 235 major U.S. markets. As the owner and operator of the largest national broadband network, Covad handles multiple gigabits of traffic daily. Ensuring the reliability and efficiency of its vast nationwide network is crucial for the company. This means that the service provider has zero tolerance for distributed denial of service (DDoS) attacks, botnets, and other security threats that can degrade network performance and jeopardize customer relationships.
挑战
Covad Communications, a leading U.S. service provider, faced the dual challenges of network security and traffic engineering. The company needed to proactively defend against DDoS attacks and optimize network performance. The rising number of network attacks was a significant challenge for the service provider. Customers typically held their providers accountable for such external attacks, viewing them as problems within the provider network and equating them with poor service. Additionally, the extra costs due to attack traffic could add up to tens of thousands of dollars a month. Therefore, the ability to quickly identify and shut down these attacks was key to both customer loyalty and cost-effective operations.
解决方案
To mitigate these threats and optimize network performance, Covad deployed Peakflow SP—a single solution for its network security and traffic engineering needs. Peakflow SP leverages IP flow technology to provide pervasive, cost-effective network visibility. It also features comprehensive threat management that enables providers, like Covad, to surgically mitigate DDoS and zero-day threats before they impact business services. Covad also relies on the unique “fingerprint sharing” feature in Peakflow SP to accelerate attack detection and mitigation. Fingerprints are network behavioral patterns of known or emerging threats. These fingerprints are created by the Arbor Security Engineering & Response Team (ASERT) and distributed via a service called Active Threat Feed (ATF).
运营影响
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.
Case Study
Vodafone Hosted On AWS
Vodafone found that traffic for the applications peak during the four-month period when the international cricket season is at its height in Australia. During the 2011/2012 cricket season, 700,000 consumers downloaded the Cricket Live Australia application. Vodafone needed to be able to meet customer demand, but didn’t want to invest in additional resources that would be underutilized during cricket’s off-season.
Case Study
SKT, Construction of Smart Office Environment
SK T-Tower is the headquarters of SK Telecom. Inside the building, different types of mobile devices, such as laptops, smartphones and tablets, are in use, and with the increase in WLAN traffic and the use of quality multimedia data, the volume of wireless data sees an explosive growth. Users want limitless Internet access in various places in addition to designated areas.