Hi [[ session.user.profile.firstName ]]

A10 Networks

  • Date
  • Rating
  • Views
  • Flexibly Allocate and Distribute Secure Application Services
    Flexibly Allocate and Distribute Secure Application Services
    John Gudmundson, A10 Networks Recorded: Nov 15 2018 47 mins
    With the evolving nature of application deployment, it is critical that these services be dynamically allocable, fully portable, scale on-demand and procured by a simplified license.

    You will see a live demonstration of FlexPool™, a software subscription for capacity pooling. This will allow you the flexibility to allocate and distribute secure application services whenever and wherever you need them.

    Join A10 Networks and learn how to:
    •Achieve on-demand provisioning of app services in seconds
    •Maximize ROI with license portability and pay-as-you-grow
    •Use modern DevOps tools to simplify license management
  • 4 Key considerations for Load Balancing & Traffic Insights for Kubernetes
    4 Key considerations for Load Balancing & Traffic Insights for Kubernetes
    Akshay Mathur, Senior Product Manager; Sudarsan Raghavan, Director, Software Engineering at A10 Networks Recorded: Nov 13 2018 47 mins
    Adoption of containers is an accelerating trend in the application deployment space. Kubernetes has become the de-facto standard for container orchestration and management.

    Please join A10 and DevOps when we discuss the 4 key consideration’s when moving applications to a Kubernetes environment.

    You will learn how to:
    * Ensure application availability and security
    * Easily drilldown to contextual data and quickly pin-point problem areas
    * Automate and expediate app deployment
    * Simplify and make your IT operations more agile
  • How to Defend Against Reflected Amplification DDoS Attacks
    How to Defend Against Reflected Amplification DDoS Attacks
    Don Shin, Sr. Product Marketing Manager at A10 Networks, Takahiro Mitsuhata, Technical Marketing Lead at A10 Networks Recorded: Nov 8 2018 41 mins
    DDoS attacks are growing in complexity, but to effectively protect your business against them, it’s essential to have a deeper understanding of your attacker’s tactics, techniques and procedures.

    Join us on this first webinar in the DDoS Defense Insights series, to learn how to defend against one of the most common and disruptive types of cyberattacks: reflected amplification flood attacks. Spoiler alert: port blocking isn’t the right answer.

    We will also show you a demonstration on how A10 Networks’ solution can protect your network against these devastating attacks.

    In this webinar you will learn about:
    * Reflected amplification DDoS attacks and how they are preformed
    * Weapons that are used in these types of attacks
    * Strategies for blocking these attacks without damaging legitimate users
  • The Threat You Can’t See: SSL, Cyberattacks, and You
    The Threat You Can’t See: SSL, Cyberattacks, and You
    Nick Cavalancia, IT Pro Today; Babur Nawaz Khan and Almas Raza, A10 Networks Recorded: Oct 24 2018 58 mins
    The goal for every security strategy is to spot the threat before an attack is successful. But, without visibility into encrypted traffic, identifying threat activity (whether involving internal or external threat actors) via deep packet inspection is not only difficult, but probably impossible. With cyber criminals increasingly using encryption for cyberattacks, your security strategy can be left with a visibility gap, keeping you in the dark and unaware of current threat activity.

    So, why is SSL visibility important to your security strategy, and what should you do about it?

    In this educational webcast, join IT Pro Today contributor and Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Parth Jagirdar and Almas Raza from A10 Networks as they discuss:

    * The state of the art of attack – Encryption trends, benefits and popularity
    * What’s hiding within your network traffic – Challenges of encryption
    * Best practices for complete visibility for superior network security without compromising performance
  • [SPANISH WEBINAR] La entrega de aplicaciones acaba de volverse más eficiente
    [SPANISH WEBINAR] La entrega de aplicaciones acaba de volverse más eficiente
    Yovani Piamba, Manager, Systems Engineering - NOLA, at A10 Networks Recorded: Sep 21 2018 55 mins
    Adoptar una estrategia híbrida y en múltiples nubes para la entrega de su aplicación también puede llevar a perder la percepción del rendimiento de su aplicación. Compartiremos y demostraremos las últimas funciones de análisis centradas en la aplicación en Harmony Controller 4.1. Nuestro controlador más nuevo ayuda a las organizaciones a obtener información útil sobre el rendimiento de las aplicaciones, la experiencia del usuario final y los problemas de seguridad, y permite una resolución de problemas más rápida y fácil.

    El controlador Harmony de múltiples nubes brinda inteligencia conectada a través de múltiples servicios de aplicaciones seguras A10: ADC / balanceo de carga, inspección SSL, Gi-Firewall y NAT de grado de operador.

    Al unirse al seminario web, aprenderá cómo:
    * Simplificar y agilizar sus operaciones de TI
    * Asegurar la disponibilidad de la aplicación
    * Desglosar fácilmente a datos contextuales y rápidamente identificar las áreas problemáticas
    * Acceder a aplicaciones centralizadas, redes y análisis de seguridad desde un único panel de cristal
    * Habilitar el análisis de autoservicio para varios propietarios de aplicaciones
  • [PORTUGUESE WEBINAR] A entrega de aplicações acaba de se tornar mais eficiente
    [PORTUGUESE WEBINAR] A entrega de aplicações acaba de se tornar mais eficiente
    Ricardo de Melo, System Engineer Brazil, A10 Networks Recorded: Sep 21 2018 44 mins
    Adotar uma estratégia híbrida e em várias nuvens para a entrega de suas aplicações tambiém pode levar a perda da percepção de rendimento de suas aplicações. Compartiremos e demostraremos as últimas funções de análises centralizadas nas aplicações com o Harmony Controller 4.1. Nosso mais novo controlador ajuda as organizações a obter informação útil sobre o rendimento das aplicações, a experiência do usuário final e os problemas de segurança, além de permitir uma resolução de problemas de forma muito mais rápida e fácil.

    O Harmony Controller de múltiplas nuvens nos entrega inteligência conectada através de uma série de serviços de aplicações seguras da A10: ADC / balanceamento de carga, inspeção SSL, Gi-Firewall e Carrier Grade NAT.

    Ao se conectar a este webinar, você aprenderá como:
    * Simplificar e agilizar suas operações de TI
    * Assegurar a disponibilidade da aplicação
    * Separar facilmente os dados contextuais e rapidamente identificar as áreas problemáticas
    * Acessar aplicações centralizadas, redes e análises de segurança a partir de um único painel
    * Habilitar a análise de auto-serviço para vários proprietários de aplicações
  • Optimize Your Application Delivery, Gain Visibility and Cut Cloud Costs
    Optimize Your Application Delivery, Gain Visibility and Cut Cloud Costs
    Greg Schulz, Microsoft MVP, VMware vExpert, and founder of Server StorageIO & Kamal Anand, Vice President, Cloud A10 Networks Recorded: Sep 20 2018 58 mins
    Businesses today are migrating their application workloads to hybrid infrastructures, spanning from on-premises to public clouds. They expect to get better ease of use, rapid deployment, elastic scaling, automation, and increased operational efficiency. They don’t expect hidden costs or a loss of control—but that is exactly what many organizations experience.

    Learn to manage cost, complexity, and control of your application workloads in this interactive fireside chat. Greg Schulz, MVP, StorageIO, and Kamal Anand, Vice President of Cloud, A10 Networks, will be looking at the trends, tools, and best practices you can apply right now to make your cloud-based application delivery a success.

    In this 30-minute webinar, you will learn to:
    * Boost your productivity and application performance
    * Avoid getting locked into a single public cloud platform
    * Gain visibility and deep insights into your applications
    * Eliminate unexpected monthly expenses
    * Steps you can take today, during, or right after the fireside chat
  • SSL Traffic Inspection: Needed Visibility But At What Cost?
    SSL Traffic Inspection: Needed Visibility But At What Cost?
    Barbara Filkins, Sr. SANS Analyst; Parth Jagirdar, A10 Networks Recorded: Sep 19 2018 61 mins
    We all agree encryption on network traffic is necessary, both to improve the confidentiality and integrity of the information in motion as well as to comply with numerous regulations (like HIPAA). But while we think of it as being used for good, it can also be used for evil. Hackers can use it to hide malicious intent, whether stealing data sent via email or to cloud storage to protecting malware C&C communications.

    Given the growth in both the use of network-based encryption and network attacks targeting encrypted traffic to bypass controls, how can organizations keep up?

    Simply turning on SSL inspection in a NG firewall can substantially degrade performance. Buying a new firewall is a costly endeavor. SANS will explore the concerns faced by an organization that realizes it must improve visibility into its encrypted traffic, laying out both the business and the technical issues and how to approach both.
  • The 5 Benefits of Implementing Advanced Load Balancing in Azure
    The 5 Benefits of Implementing Advanced Load Balancing in Azure
    Kamal Anand, Vice President of Cloud at A10 Networks; Keith Vidal, Director, Marketplace at Microsoft Recorded: Sep 13 2018 50 mins
    Businesses today are rapidly migrating their application workloads to Microsoft Azure Cloud or hybrid infrastructures, spanning on-premises to public clouds. Application teams are also embracing containers and Kubernetes for container orchestration. They expect to get better ease of use, rapid deployment, elastic scaling, automation, and increased operational efficiency.

    Learn the benefits of implementing modern, advanced load balancing in Azure – cloud-native in Azure, integrated with Kubernetes and multi-cloud. See a demonstration!

    In this 45-minute webinar, you will learn how to:

    * Gain visibility and deep insights into your applications
    * Increase security of your applications
    * Reduce troubleshooting times
    * Leverage the same technology and policies across Azure and on-premise
    * Boost your productivity and application performance
  • Seeing Inside Encrypted Traffic
    Seeing Inside Encrypted Traffic
    Randy Smith - Ultimate Window Security; Parth Jagirdar - A10 Networks Recorded: Sep 6 2018 90 mins
    Most of the traffic flowing through your firewall today is encrypted. In some ways that’s a good thing because encryption enables businesses to communicate securely with customers/partners and protects the privacy and integrity of data. But it creates new problems for information security folks because the only data you can actually see in the packet header is nothing but IP addresses and port numbers. There’s some monitoring and analytics you can do with that information such as with threat intelligence feeds and session profiling, but your hands are really tied if you can’t decrypt the traffic.

    The bad guys know that and actively use encryption to evade network-based security technologies. They are increasingly enhancing their APT payloads to hide their communications with command and control servers as well as the actual exfiltration of stolen information inside encrypted connections disguised to look like legitimate web traffic.

    Attackers passively benefit from the prevalence of encryption. For instance, when an attacker compromises a legitimate website and uses it to deliver or stage malicious content, the fact that that legit website uses https means your network-based probes and monitoring agents are blind to the content. This leaves organizations wide open to malware attacks amongst others.

    So, we obviously need visibility into encrypted data flowing between our network and the Internet and ideally even between portions of our internal network. But how do you get that visibility in the first place? Without breaking network performance? And what about compliance requirements specific to certain types of data or privacy regulations?

    In this webinar we will show you how:
    * SSL decryption works
    * Common sources of performance degradation
    * ICAP support is critical to successful SSL decryption
    * Decryption needs to be policy based to avoid compliance problems

Embed in website or blog