RAD is a global leader for telecom access solutions. As an industry pioneer for over 40 years, RAD reliably supplies worldwide communications service providers and critical infrastructure operators with best-of-breed Ethernet access devices, industrial IoT gateways, 5G xHaul, and Operational WAN solutions. Offering always-on connectivity from anywhere, along with data-driven, AI-powered actionable insights, RAD is distinguished for its supply-chain stability, which outsteps the market in delivery times. Founded in 1981, RAD serves as the anchor of the $1.6 billion RAD Group, an umbrella of independent companies that develop diverse networking and data communications solutions.
Contact

Contact Us

This information will be used according to our Privacy Policy

Scroll to top of page

You are here

The Problem with Scrubbing Centers

RADinsight complements traditional solutions that are lagging in providing protection from newer attack vectors:

  • Scrubbing centers are an excellent tool for larger businesses, but their detection mechanism is not tuned for smaller organizations.
  • They are slow and limited in their ability to scale up to handle the full volume of threats. They also overload your network.
  • By design, scrubbing centers cannot protect from malicious outbound traffic generated by endpoints within the network – malicious bots installed offline, either on enterprise hosts or IoT devices.
  • No protection for L2 VPNs.
  • No treatment of malicious traffic coming from partnering networks for out-of-footprint service reach.
  • Other inline solutions inspect complete traffic, requiring a substantial hardware footprint and creating additional weak points in the network.

RADinsight as the First Line of Defense

RADinsight TI detects and mitigates volumetric and zero-day attacks in seconds. It protects the network from starvation and is used as a first line of defense with scrubbing center activated on demand.

Operating as close as possible to the source of the attack – at L2 demarcation points and at inter-carrier demarcation points, RADinsight TI’s ML-based anomaly detection engine eliminates the need to set up a high baseline as a starting point. It can therefore detect low-volume attacks at less than 1%.

Being software-based, RADinsight TI operates without the need for traffic rerouting and without affecting device bandwidth or introducing latency.

Threat Intelligence: How It Works

RADinsight TI works by constantly collecting data from the carrier edges and monitoring all traffic to identify attacks. Once an attack is detected, closed-loop enforcement is applied via an ACL installed on the carrier edge.

Highlights

  • Dashboards provide real-time status of protected elements.
  • Configurable security policies for automated blocking of malicious traffic.
  • Optional interworking with a third-party security orchestration engine.
  • Full cloud-native solution - based on microservices and Kubernetes

RADinsight Threat Intelligence 

AI-driven threat intelligence with network embedded security

RADinsight TI - Threat Intelligence at the Edge

Watch

 

AI-driven threat intelligence with network embedded securi

Download Solution Brief

RADinsight TI

Threat Intelligence at the Edge

RADinsight TI detects and mitigates DDoS attacks threatening CSP network and enterprise/business normal operations, utilizing an EAD/NID’s unique capabilities to see all ingress and egress traffic at the CSP and customer edge, and block malicious flows.
 

RADinsight TI detects and stops cyber-attacks within seconds. It operates via carrier and network edge devices already in your network.
 

• SaaS solution closes current security gaps

• Prevents volumetric DDoS attacks

• Faster than scrubbing centers

• Mitigation at the attack location

• AI and ML help detect even small anomalies

• Protects from inbound and outbound attacks

RADinsight TI - Threat Intelligence at the Edge

Key Take-Aways

Detection
Strong detection mechanism

Zero-day & signature attacks. Orchestrated attacks

Mitigation
Mitigation within seconds

through ACL in edge devices, close to attack origin

Optimized architecture
Optimized architecture

No traffic rerouting. No additional weak point. No impact on user experience

Software-based
Pure software-based

Cloud native solution

RADinsight TI Quick Specs

  • Cloud-based on-demand subscription service
  • Protects from low-volume and short inbound attacks at carrier edges 
  • Protects from inbound threats from partner networks at peering points/E-Access
  • Protects from outbound threats at carrier edges
  • Integrates with the CSP’s attack life-cycle management system

Contact Us

Got a specific question in mind? Need a quote? One of our experts will be happy to provide you with further information. Please fill out this short form and we'll make sure someone contacts you.

This information will be used according to our Privacy Policy

What would you like to do?