Allied Telesis Self-Defending Network

Additional Info

CompanyAllied Telesis
Company size (employees)1,000 to 4,999
Type of solutionSoftware


The conventional way to protect a network from attackers and threats is to use a firewall to inspect all traffic to and from the Internet. This is a very common design, which focuses on protection from the Internet, but leaves the network vulnerable to attacks from within the network itself, from connected endpoint devices and external media.
Ideally, a network would defend itself based upon the threat detected and the device that caused the problem. Enter the Allied Telesis Self-Defending Network solution. We created this solution to work with your existing firewall to instantly respond to insider threats and automatically decide the appropriate reaction for any detected attack.
The major benefit of the Self-Defending Network is immediate and accurate threat response, without any manual intervention. Actions are configurable depending on the firewall event, so that inadvertent visits to questionable webpages can be distinguished from malicious attempts to steal data.
Suspect endpoints can be automatically isolated whether they are wired or wireless, ensuring there are no weaknesses anywhere on your network. The Allied Telesis Self-Defending Network does not require any special software or agents to be installed on the endpoint. Instead of shutting down the user’s device, we control the network to restrict access until remediation can be applied. We can block a threat emanating from a data center server just as easily as one from a mobile device.
The Self-Defending Network also monitors and protects traffic moving within a corporate network without adding unacceptable latency. Our solution allows the security appliance to monitor a copy of the traffic (i.e. “one-armed”) so no latency is introduced, and threats can be blocked instantly and automatically.

How we are different

There are three key features that differentiate our solution from other vendors:
• Instead of shutting down the user’s device, we control the network to restrict access until remediation can be applied, so no endpoint agent software is required which simplifies installation and operation, and enables any endpoint to be isolated whether they are wired or wireless.
• The Self-Defending Network can be used in “one-armed” mode to monitor traffic moving within a network (“east-west” traffic) without adding latency. This is critically important for insider threat detection in high-speed applications like datacenters where latency must be avoided.
• Our solution is very open and interoperates with security appliances and network switches from many vendors, including our own. We control the network either by using the OpenFlow protocol, which is an open standard, or via a special API for Allied Telesis switches, for an enhanced experience.