Skip navigation
Skip navigation
You are using an outdated browser. Please upgrade your browser.

Arbor Networks, will be making the following announcements in briefings to be held with journalists attending The RSA Conference.

• Announcement of a UK based, internationally operating enterprise customer that is protecting its entire internal network (in more than 60 locations) with what we believe to be the largest internal security deployment to date


• a technology announcement looking at the trend toward placing virtual perimeters on the inside of the enterprise network to protect against worms, misuse and provide government compliance

In addition there are opportunities to talk to

• Dr Jose Nazario, who is speaking at RSA on Thursday, February 17, 2005 -- 4:50 PM to 5:40 PM on Wormability: A Formula for Predicting Worms. Jose will explore key identifying markers that can be used to determine whether a network vulnerability will be used in a worm attack. These markers provide unique insight into the likely worm landscape, and they have been combined into a mathematical model that has deepened understanding of the worm problem and the challenges facing networks as new vulnerabilities emerge.


• Arbor's newly appointed President, Tom Schuster, to chat about his vision for how Arbor is planning to evolve its enterprise and service providers solutions in the future

Feb 14-18, in San Francisco, (

To obtain more information or to request a briefing slot contact

Mo Murphy, on or 0207 686 0625

About Arbor
Arbor Networks protects the world's largest networks from known and unknown Internet attacks and operational vulnerabilities. Arbor Networks' Peakflow platform is the most broadly deployed network integrity platform in the world, with more than 100 customers that include leading service providers, MSOs in North America, Europe and Asia Pacific, the U.S. Department of Defense, and Fortune 500 companies. Arbor's systems protect organizations from zero-day security threats such as DDoS attacks and worms, and operational vulnerabilities such as inefficient peering and routing instability.

This press release was distributed by ResponseSource Press Release Wire on behalf of Folliard in the following categories: Business & Finance, Computing & Telecoms, for more information visit