www.netscout.com
Open in
urlscan Pro
146.88.245.215
Public Scan
Submitted URL: https://atlas.arbor.net/about/
Effective URL: https://www.netscout.com/product/omnis-atlas-intelligence-feed?utm_source=google&utm_medium=organic
Submission Tags: falconsandbox
Submission: On March 02 via api from US — Scanned from DE
Effective URL: https://www.netscout.com/product/omnis-atlas-intelligence-feed?utm_source=google&utm_medium=organic
Submission Tags: falconsandbox
Submission: On March 02 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET /search
<form action="/search" method="get" accept-charset="UTF-8" class="ns-menu__search">
<label for="search" class="visually-hidden">Search</label>
<input placeholder="Search..." type="text" id="search" name="search" value="" maxlength="128" class="" tabindex="-1">
<input type="submit" id="submit-search" value="Search" class="">
<button type="button" class="ns-menu__search__wrapper__close" aria-label="Close"><svg class="svg-inline--fa fa-times fa-w-10" title="close" aria-labelledby="svg-inline--fa-title-3fCX8zBLyXEo" data-prefix="fal" data-icon="times" role="img"
xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512" data-fa-i2svg="">
<title id="svg-inline--fa-title-3fCX8zBLyXEo">close</title>
<path fill="currentColor"
d="M193.94 256L296.5 153.44l21.15-21.15c3.12-3.12 3.12-8.19 0-11.31l-22.63-22.63c-3.12-3.12-8.19-3.12-11.31 0L160 222.06 36.29 98.34c-3.12-3.12-8.19-3.12-11.31 0L2.34 120.97c-3.12 3.12-3.12 8.19 0 11.31L126.06 256 2.34 379.71c-3.12 3.12-3.12 8.19 0 11.31l22.63 22.63c3.12 3.12 8.19 3.12 11.31 0L160 289.94 262.56 392.5l21.15 21.15c3.12 3.12 8.19 3.12 11.31 0l22.63-22.63c3.12-3.12 3.12-8.19 0-11.31L193.94 256z">
</path>
</svg><!-- <i class="fal fa-times" title="close"></i> Font Awesome fontawesome.com --></button>
</form>
GET /search
<form action="/search" method="get" accept-charset="UTF-8" class="ns-menu__search">
<label for="search" class="visually-hidden">Search</label>
<input placeholder="Search..." type="text" id="search" name="search" value="" maxlength="128" class="" tabindex="0">
<input type="submit" id="submit-search" value="Search" class="">
<button type="button" class="ns-menu__search__wrapper__close" aria-label="Close"><svg class="svg-inline--fa fa-times fa-w-10" title="close" aria-labelledby="svg-inline--fa-title-MzRbrR43qteW" data-prefix="fal" data-icon="times" role="img"
xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512" data-fa-i2svg="">
<title id="svg-inline--fa-title-MzRbrR43qteW">close</title>
<path fill="currentColor"
d="M193.94 256L296.5 153.44l21.15-21.15c3.12-3.12 3.12-8.19 0-11.31l-22.63-22.63c-3.12-3.12-8.19-3.12-11.31 0L160 222.06 36.29 98.34c-3.12-3.12-8.19-3.12-11.31 0L2.34 120.97c-3.12 3.12-3.12 8.19 0 11.31L126.06 256 2.34 379.71c-3.12 3.12-3.12 8.19 0 11.31l22.63 22.63c3.12 3.12 8.19 3.12 11.31 0L160 289.94 262.56 392.5l21.15 21.15c3.12 3.12 8.19 3.12 11.31 0l22.63-22.63c3.12-3.12 3.12-8.19 0-11.31L193.94 256z">
</path>
</svg><!-- <i class="fal fa-times" title="close"></i> Font Awesome fontawesome.com --></button>
</form>
Text Content
Skip to main content * Under Attack? Call 1-734-794-5099 * Contact Us * Careers * Investors * Blog Search close * Enterprise Solutions * Cloud Application Performance & Security * nGenius Enterprise Performance Management * Cloud Performance Monitoring * Data Center Transformation * Cloud & Co-Lo Monitoring * Cloud Migration * Software Defined Network * SaaS & UCaaS * Performance Management * Application Performance Management * Unified Communications & Collaboration * Network Performance Management * VPN/VDI * NETSCOUT Visibility as a Service * Cybersecurity & DDoS Protection * Omnis Security Portfolio * NetOps and SecOps Collaboration * Omnis Smart Edge Protection * Comprehensive DDoS Protection * Cybersecurity Stack Optimization * 5G Transformation * 5G for Enterprise * Private 4G/5G * Technology Partners * Dell Technologies * VMware * AWS * Microsoft * Palo Alto Networks * Google Cloud * Cisco Systems * Citrix * Red Hat * Oracle * ServiceNow * F5 * Communication Service Provider Solutions * 5G Ready Now * LTE/VoLTE/VoWi-Fi * OTT Visibility * Arbor DDoS Protection * Cloud and Digital Transformation * Cloud Visibility * Network Function Virtualization/Cloud * Analytics * Omnis Automation * Business Analytics * Radio Access Networking (RAN) * RAN Optimization & Automation * RAN Monitoring and Troubleshooting * GeoMarketing * Cable/MSO and Fixed Networks * Cable/MSO and Fixed Networks * Fiber (FTTx) Network Monitoring * Internet of Things (IoT) * Testing & Optimization * Products * Enterprise * nGeniusONE for Enterprise * InfiniStreamNG * nGeniusPULSE * nGeniusEDGE Server * Edge Adaptor * nGenius Business Analytics * nPoint * vSTREAM * PFS Packet Broker * Security * Omnis Cyber Intelligence * Omnis CyberStream * Omnis IDS * nGenius Decryption Appliance * Omnis Threat Horizon * PFS Packet Broker * Arbor DDoS * Arbor Sightline * Arbor Sightline with Insight * Arbor Sightline with Sentinel * Arbor Threat Mitigation System * Arbor Edge Defense * Arbor Cloud * Arbor Managed Services * Arbor Global DDoS Threat Intelligence * Communication Service Provider * TrueCall * nGenius Session Analyzer * nGeniusONE for Carrier * nGenius Business Analytics * ISNG-RAN * InfiniStreamNG * vSTREAM * TestStream Lab Automation Infrastructure * SpectraSecure DDoS Resilience Testing * Spectra2 Communications Testing * Industries * Education * Financial Services * Capital Markets * Retail Banking * Government * Department of Defense * Federal Civilian Agencies * State and Local Governments * Healthcare * Insurance * Manufacturing * Pharmaceutical * Retail * Transportation * Utilities * Resources & Education * Resource Library * Learning Center * NETSCOUT University * Blog * DDoS Threat Intelligence Report * Events * Problem Solvers Series * Solution Webinars * Support & Services * Overview * My.NETSCOUT * NO LATENCY * Company * Executive Team * Board of Directors * Careers * Newsroom * About Us * Partners * Corporate Responsibility * Voice of the Customer Under Attack? Menu Close Search close * Enterprise Solutions * Cloud Application Performance & Security * nGenius Enterprise Performance Management * Cloud Performance Monitoring * Data Center Transformation * Cloud & Co-Lo Monitoring * Cloud Migration * Software Defined Network * SaaS & UCaaS * Performance Management * Application Performance Management * Unified Communications & Collaboration * Network Performance Management * VPN/VDI * NETSCOUT Visibility as a Service * Cybersecurity & DDoS Protection * Omnis Security Portfolio * NetOps and SecOps Collaboration * Omnis Smart Edge Protection * Comprehensive DDoS Protection * Cybersecurity Stack Optimization * 5G Transformation * 5G for Enterprise * Private 4G/5G * Technology Partners * Dell Technologies * VMware * AWS * Microsoft * Palo Alto Networks * Google Cloud * Cisco Systems * Citrix * Red Hat * Oracle * ServiceNow * F5 * Communication Service Provider Solutions * 5G Ready Now * LTE/VoLTE/VoWi-Fi * OTT Visibility * Arbor DDoS Protection * Cloud and Digital Transformation * Cloud Visibility * Network Function Virtualization/Cloud * Analytics * Omnis Automation * Business Analytics * Radio Access Networking (RAN) * RAN Optimization & Automation * RAN Monitoring and Troubleshooting * GeoMarketing * Cable/MSO and Fixed Networks * Cable/MSO and Fixed Networks * Fiber (FTTx) Network Monitoring * Internet of Things (IoT) * Testing & Optimization * Products * Enterprise * nGeniusONE for Enterprise * InfiniStreamNG * nGeniusPULSE * nGeniusEDGE Server * Edge Adaptor * nGenius Business Analytics * nPoint * vSTREAM * PFS Packet Broker * Security * Omnis Cyber Intelligence * Omnis CyberStream * Omnis IDS * nGenius Decryption Appliance * Omnis Threat Horizon * PFS Packet Broker * Arbor DDoS * Arbor Sightline * Arbor Sightline with Insight * Arbor Sightline with Sentinel * Arbor Threat Mitigation System * Arbor Edge Defense * Arbor Cloud * Arbor Managed Services * Arbor Global DDoS Threat Intelligence * Communication Service Provider * TrueCall * nGenius Session Analyzer * nGeniusONE for Carrier * nGenius Business Analytics * ISNG-RAN * InfiniStreamNG * vSTREAM * TestStream Lab Automation Infrastructure * SpectraSecure DDoS Resilience Testing * Spectra2 Communications Testing * Industries * Education * Financial Services * Capital Markets * Retail Banking * Government * Department of Defense * Federal Civilian Agencies * State and Local Governments * Healthcare * Insurance * Manufacturing * Pharmaceutical * Retail * Transportation * Utilities * Resources & Education * Resource Library * Learning Center * NETSCOUT University * Blog * DDoS Threat Intelligence Report * Events * Problem Solvers Series * Solution Webinars * Support & Services * Overview * My.NETSCOUT * NO LATENCY * Company * Executive Team * Board of Directors * Careers * Newsroom * About Us * Partners * Corporate Responsibility * Voice of the Customer * Under Attack? Call 1-734-794-5099 * Contact Us * Careers * Investors * Blog 1. Home 2. Products 3. Omnis ATLAS Intelligence Feed (AIF) OMNIS ATLAS INTELLIGENCE FEED (AIF) AUTOMATED THREAT INTELLIGENCE FOR SMART DDOS PROTECTION * Overview open/close * Overview * Benefits * Features * Resources * Related Pages ACTIVE THREAT INTELLIGENCE AT A GLOBAL SCALE As DDoS attacks continue to increase in frequency and complexity, DDoS attack threat intelligence becomes vital for automated DDoS attack protection. Derived from NETSCOUT’s ATLAS network, an unmatched source of visibility into global DDoS attack activity, artificial intelligence, and human insight from NETSCOUT’s ATLAS Security Engineering and Response Team (ASERT), the ATLAS Intelligence Feed automatically arms all NETSCOUT Arbor DDoS attack protection products with the latest DDoS attack tactics, known sources of DDoS attacks and Indicators of Compromise so organizations can automatically protect themselves from DDoS attacks and other cyber threats. BENEFITS AUTOMATED DDOS ATTACK PROTECTION Based on Netscout’s unique, Internet-wide visibility into the details of DDoS attacks, we are able to provide real-time threat intelligence to our products about where attack traffic is originating from and what the attacks look like, to enable accurate, surgical, automated blocking of up to 90% of DDoS attack traffic. BLOCKING INBOUND AND OUTBOUND CYBER THREATS Cyber Threats are a primary driver for our smart perimeter defense systems for the enterprise. NETSCOUT solutions not only block threats trying to get into the network but also detect and block communication from malware already resident inside the network trying to get out. INTERNET TRAFFIC INTELLIGENCE Generates operationally valuable information to identify Over The Top (OTT) traffic to understand the content of traditionally layer 4 flow data. This information can also identify traffic that may not require blocking during security protection activity like web search crawlers or conferencing applications. Click to enlarge image AUTOMATED THREAT INTELLIGENCE IMPROVES SECURITY POSTURE As cyber threats continue to increase in frequency and sophistication, mature security teams will rely upon not only the latest cybersecurity technology, but also highly curated threat intelligence that arms these products enabling them to conduct more agile incident response and remediation – all to ultimately avoid the downtime or data breach that puts their organization in the news. Solution Brief ATLAS INTELLIGENCE FEED (AIF) The ATLAS Intelligence Feed (AIF) continuously arms the NETSCOUT AED product with highly curated, actionable threat intelligence. Download PDF FEATURES * DDoS: Automated DDoS Reputation Blocking By identifying current active attackers from our unique worldwide ATLAS DDoS attack data, and identifying current active hosts that are part of DDoS botnets, AIF enables our products to detect and block inbound DDoS attacks quickly, automatically, and accurately, without the risk of false positives that can come from non-human curated automation operating in software alone. * Cyber Threats: Inbound Blocking of Cyber Threats AIF identifies known active sources of Internet vulnerability scanning and brute force exploit attempts, as well as other bulk commodity threats. This enables our products to detect and block commodity threats before they enter the network, and help reduce the load on other security devices that may be struggling to keep up during active attacks. * Cyber Threats: Internal Threat Detection and Blocking Using the breadth of our global attack intelligence, we will detect, analyze and identify malware that may beinvolved in probing activities currently operating on your network and identify other advanced persistent threats. * Internet Intelligence: Identify and report on OTT traffic Identify and report on Over The Top (OTT) traffic from Content Providers using scalable flow data. * DDoS: Prevent blocking of legitimate services Prevent blocking of legitimate services during security related blocking activities. Click to enlarge image (All Products) - Block known, active sources of DDoS attack traffic (e.g. specific IP addresses, botnet hosts) based on real-time global ATLAS intelligence. * Adds IP Filter Lists in TMS Mitigations and Templates * Augments inbound DDoS blocking in AED DDoS: Automated DDoS Reputation Blocking By identifying current active attackers from our unique worldwide ATLAS DDoS attack data, and identifying current active hosts that are part of DDoS botnets, AIF enables our products to detect and block inbound DDoS attacks quickly, automatically, and accurately, without the risk of false positives that can come from non-human curated automation operating in software alone. Click to enlarge image (All Products) - Blocks inbound scanning, brute force attempts, and other bulk inbound cyber threats at your network perimeter. Our botnet intelligence feed uses our Honeypot network to understand when known botnet hosts are trying to infect other hosts on the network. This becomes actionable intelligence because we correlate the scan results with actual attack data from our worldwide collection to identify the which botnet hosts are launching attacks in real time. * Augments inbound Cyber Threat blocking Cyber Threats: Inbound Blocking of Cyber Threats AIF identifies known active sources of Internet vulnerability scanning and brute force exploit attempts, as well as other bulk commodity threats. This enables our products to detect and block commodity threats before they enter the network, and help reduce the load on other security devices that may be struggling to keep up during active attacks. Click to enlarge image Threat Detection (Sentinel and AED) and Blocking (AED only) - Malware IoCs enable NETSCOUT solutions to detect malware communication with a special focus on known botnet Command and Control infrastructure. NETSCOUT solutions detect infected hosts and threats resident inside the network, including APTs, and in the case of AED disrupts kill chain blocks and their outbound communication to prevent downloading additional malware payloads or communicating with command and control servers that are part of the kill chain. * In Sightline this enables threat Indicators in MO configuration * In AED malware coverage is expanded to Nation-State APTs, Malware Downloaders & Expanded Malware Distribution and Exploitation Cyber Threats: Internal Threat Detection and Blocking Using the breadth of our global attack intelligence, we will detect, analyze and identify malware that may beinvolved in probing activities currently operating on your network and identify other advanced persistent threats. Click to enlarge image * Provides traffic analysis reports for OTT traffic Internet Intelligence: Identify and report on OTT traffic Identify and report on Over The Top (OTT) traffic from Content Providers using scalable flow data. (All Products) – Helps to avoid blocking search crawlers and other desirable web content that may trip DDoS countermeasures and be blocked during attack. * Improves accuracy of attack blocking while avoiding blocking legitimate traffic. * Provides significantly more intelligence from expanded analysis pipeline and intelligence sharing partnerships DDoS: Prevent blocking of legitimate services Prevent blocking of legitimate services during security related blocking activities. RESOURCES Case Study South Staffordshire College Stops Virtual Classroom Downtime with Real Time DDoS Protection Due to the on-premises real-time mitigation capabilities of Omnis AED, this College saw its virtual class application availability recover 100%. White Paper How to Analyze and Reduce the Risk of DDoS Attacks There are multiple ways to stop a DDoS attack. This paper will compare an “As-Is” scenario using a firewall to multiple “To-Be” scenarios using different NETSCOUT® DDoS attack... Data Sheet AIF Service for Arbor Threat Mitigation System (TMS) ATLAS Intelligence Feed (AIF) for NETSCOUT Arbor Threat Mitigation System (TMS) is a subscription-based service designed to optimize the TMS defenses to protect the network... Data Sheet ATLAS Intelligence Feed (AIF) for AED The ATLAS Intelligence Feed (AIF) empowers users with policies and countermeasures to address attacks as part of an advanced threat or DDoS attack. Data Sheet ATLAS Intelligence Feed Service for Sightline Learn more about this product from the NETSCOUT data sheet. View more resources RELATED PAGES Product ARBOR THREAT MITIGATION SYSTEM FOR DDOS ATTACKS Arbor TMS is a powerful DDoS mitigator that filters out malicious traffic while allowing good traffic to pass through. Step up your DDoS threat mitigation with Arbor. Learn more Product ARBOR SIGHTLINE NETWORK VISIBILITY SOFTWARE Arbor Sightline is a powerful DDoS attack detection and network visibility software platform for the world's largest networks. Identify attack traffic with ease. Learn more Solution NETSCOUT REAL-TIME ADVANCED THREAT INTELLIGENCE Detailed cyber threat analysis and protection from NETSCOUT is powered by our advanced global threat intelligence from our expert research teams and unmatched technology. Learn more GUARDIANS OF THE CONNECTED WORLD® * Discover * Enterprise Solutions * Communication Service Provider Solutions * Products * Industries * Support & Services * Learn * Resource Library * Learning Center * MyNETSCOUT * Events * Webinars * Blog * About * Careers * For Investors * News & Media * Partners * Connect * 1-888-357-7667 * Contact Us * * * * * * © 2023 NETSCOUT * Terms & Conditions * Data Privacy and Trust Center * Transparency in Supply Chains * Privacy Policy * Vendor Portal * Do Not Sell My Info * California Privacy Notice * UK Disclosure * Cookie Preferences AddThis Sharing Sidebar Share to FacebookFacebookShare to LinkedInLinkedInShare to TwitterTwitterShare to Email AppEmail App Hide Show Close AddThis