Arbor's anti-DDOS technology has been integrated into Alcatel-Lucent's service routers Alcatel-Lucent is now offering a router with technology from Arbor Networks that defends against distributed denial-of-service attacks, the two companies said on Wednesday.The companies have partnered to put Arbor’s Threat Management System (TMS), which filters out attack traffic, into Alcatel-Lucent’s 7750 model router. It’s the first time that Arbor has embedded the software into a router, as it sells stand-alone TMS appliances. TMS will be integrated as a blade that goes into the service router, said Tom Bienkowski, director of product marketing for Arbor. Each blade can handle 5 gigabits per second of traffic and will fit inside the SR-7 and SR-12 versions of the 7750 router.Companies large and small increasingly see DDOS attacks, which bombard websites with traffic intended to cause sites to go offline. The hacktivist group Anonymous has waged DDOS campaigns against many companies such as MasterCard and PayPal as punishment for policies they oppose. With TMS, service providers using the 7750 will be able to filter out attack traffic at the “edge” of their networks as it comes in, Bienkowski said. If a service provider detects a DDOS attack coming into its network, the malicious traffic is rerouted to a regional “scrubbing” data center in order to sort out the legitimate traffic from attack traffic.But that can be expensive, since some service providers may have to pay other service providers in order to send the traffic to their data center. Essentially, they would be paying to send attack traffic, Bienkowski said. The new product also gives service providers a chance to make more money, along the lines of others services provided above and beyond mere connectivity, such as VPN (virtual private network), Bienkowski said. So far, 20 service providers are testing the system.Send news tips and comments to jeremy_kirk@idg.com Related content news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Security feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe