Network Security

The Global State of Information Security Survey 2016 reported that there was a 109% increase in the number of detected security incidents with now 23% of Australian organisation starting to implement a Chief Security Offer role within the next 12 months. But unfortunately, that’s not possible for everyone. Here’s some of the ways we’re helping mid-size organisations protect their network.

Trusted network security solutions

Our range of network security products is aimed at increasing network visibility, providing your network with perimeter protection, intranet security and protecting from application level attacks. This is achieved through our three network security solutions: Network Monitoring, DDoS Defender and Intrusion Defender.

Network Monitoring

Our proactive network monitoring tool, SecureView, provides real-time granular visibility giving you more control over utilisation, performance and security.

What does it do?

With sophisticated Network Behavioural Analysis (NBA), SecureView is a network monitoring system that learns your normal traffic profile and automatically alerts you to abnormalities due to malware, data leakage, unauthorised access, and malicious security threats. Granular reporting enables the network administrator to identify sources of potential bottlenecks, inefficiencies and breeches of internal policy. Secure View is enabled by Arbor Networks, Pravail Network Security Intelligence (NSI).


  • Gain real-time visibility into network traffic between sites.
  • Stop existing and emerging internal network threats, such as viruses, botnet armies and worm outbreaks.
  • Control user access and eliminate insider misuse.
  • Ensure accurate capacity planning for critical applications, such as Voice over Internet Protocol (VoIP).
  • Instantly detect unwanted protocols, such as P2P and IM.
  • Verify compliance with HIPAA, PCI, SOX and other regulations via automatic network security alerts, forensics analysis and reports.
  • Protect internal assets from fraud and data leakage.
  • Establish and track usage policies and alert on unauthorized user access.
  • Monitor VoIP, IPTV and VoD across the network.
  • Compliance assurance: HIPAA, PCI, NERC, ITIL, and ISO 17799.

DDoS Protection

DDos Defender detects and classifies internet traffic into suspect and legitimate, blocking potentially suspect traffic.

Why do you need DDoS Defefender?

Denial of Service (DoS) attacks attempt to consume an internet facing server's resources to near exhaustion so that there are no resources left to handle requests from legitimate clients. Ultimately this means that an organisation can have their websites, ecommerce processing system, email, data servers and other IT applications connected to the internet, targeted and brought down, costing them monetary loss and brand reputation damage.


DDoS Defender can stop DDoS attacks by detecting and classifying internet traffic into suspect and legitimate and responding by blocking the potentially suspect traffic well before it reaches the client’s network edge. DDoS Defender gives DDoS protection using Arbor Networks technology, the world’s leading provider in this space.

Intrusion Detection Systems

Intrusion Defender monitors network traffic and multiple system processes to identify malicious behaviour and reacts in real-time to halt this behaviour.

Why do you need Intrusion Defender?

Internet facing applications and databases are always under threat from highly sophisticated intrusions. Often these intrusions are attempted through typically trusted sources and allowed protocols and can pass undetected by traditional network firewall security systems. An intrusion can mean significant direct financial loss, customer privacy breaches, brand damage and compliance failure resulting in further financial penalties.


Intrusion Defender is an intrusion prevention system that ultimately monitors network traffic and multiple system processes to identify malicious, undesirable or anomalous behaviour and reacts in real-time to halt this behaviour. Intrusion Defender consists of a centralised management console that correlates threats against the network and sensors that passively aggregate network and user intelligence and take action to block attacks. This solution gives you total network visibility, granular control and intelligent IT security automation. Intrusion Defender specifically protects against threats such as:

  • Worms
  • Trojans
  • Backdoor attacks
  • Spyware
  • Port scans
  • SQL injection
  • Buffer overflow
  • P2P attacks
  • TCP segmentation and IP fragmentation
  • Several blended threats.