Hi [[ session.user.profile.firstName ]]

A10 Networks

  • Date
  • Rating
  • Views
  • Estrategias para extender la vida útil de IPv4 y introducir IPv6 en proveedores
    Estrategias para extender la vida útil de IPv4 y introducir IPv6 en proveedores
    José de Abreu, SE LATAM from A10 Networks Recorded: Dec 12 2018 57 mins
    El agotamiento global de los bloques libres de direcciones IPv4 disponibles y la adopción de IPv6, imponen una serie de nuevos retos al crecimiento y la rentabilidad de los proveedores de servicios. En la gran mayoría de los casos, los proveedores de servicios deben diseñar e implantar estrategias de corto y largo plazo, para preservar un recursos extremadamente escaso como lo son sus direcciones IPv4 y migrar su red, servicios y suscriptores hacia IPv6.

    Agenda:
    - Preservación de direccionamiento IPv4
    - Migración y coexistencia con IPv6
    - Aspectos legales, visibilidad y trazabilidad de los usuarios
  • Estratégias para extender a vida útil de IPv4 e introduzir IPv6 em provedores
    Estratégias para extender a vida útil de IPv4 e introduzir IPv6 em provedores
    Thiago de Lima, SE Brazil from A10 Networks Recorded: Dec 12 2018 56 mins
    O esgotamento global dos blocos livres de endereços IPv4 disponíveis e a adoção de IPv6, impõem uma série de novos desafios ao crescimento e a rentabilidade dos provedores de serviços. Na maior parte dos casos, os provedores de serviços devem desenhar e implantar estratégias de curto e longo prazo, para preservar recursos extremadamente escasso como são seus endereçamentos IPv4 e migrar sua rede, serviços e assinantes para IPv6.

    Agenda:
    - Preservação de endereços IPv4
    - Migração e coexistência com IPv6
    - Aspectos legais, visibilidade e acessibilidade dos usuários
  • Amplie seu portfolio com A10
    Amplie seu portfolio com A10
    Bruna Wells, Channel Sales Director LATAM Recorded: Dec 5 2018 49 mins
    Durante este webinar você conhecerá mais sobre a empresa A10 Networks, seus principais produtos e seu programa de canais.
  • Flexibly Allocate and Distribute Secure Application Services
    Flexibly Allocate and Distribute Secure Application Services
    John Gudmundson, A10 Networks Recorded: Nov 15 2018 47 mins
    With the evolving nature of application deployment, it is critical that these services be dynamically allocable, fully portable, scale on-demand and procured by a simplified license.

    You will see a live demonstration of FlexPool™, a software subscription for capacity pooling. This will allow you the flexibility to allocate and distribute secure application services whenever and wherever you need them.

    Join A10 Networks and learn how to:
    •Achieve on-demand provisioning of app services in seconds
    •Maximize ROI with license portability and pay-as-you-grow
    •Use modern DevOps tools to simplify license management
  • Evolution of Security in 5G Networks
    Evolution of Security in 5G Networks
    Roy Chua, Founder & Principal, AvidThink; Yasir Liaqatullah, VP, Product Management, A10 Networks Recorded: Nov 15 2018 58 mins
    As communications service providers (CSPs) upgrade their networks to support new 5G and IoT applications, new security considerations will come into play. Beyond just scaling up traditional protection again DDoS and improving SGi/GiLAN firewalls, CSPs need to take a more comprehensive view of mobile security. This joint analyst webinar between SDxCentral and A10 Networks will highlight new security concerns and architectural considerations that CSPs need to understand in light of new business and consumer applications on their 5G networks.
  • 4 Key considerations for Load Balancing & Traffic Insights for Kubernetes
    4 Key considerations for Load Balancing & Traffic Insights for Kubernetes
    Akshay Mathur, Senior Product Manager; Sudarsan Raghavan, Director, Software Engineering at A10 Networks Recorded: Nov 13 2018 47 mins
    Adoption of containers is an accelerating trend in the application deployment space. Kubernetes has become the de-facto standard for container orchestration and management.

    Please join A10 and DevOps when we discuss the 4 key consideration’s when moving applications to a Kubernetes environment.

    You will learn how to:
    * Ensure application availability and security
    * Easily drilldown to contextual data and quickly pin-point problem areas
    * Automate and expediate app deployment
    * Simplify and make your IT operations more agile
  • How to Defend Against Reflected Amplification DDoS Attacks
    How to Defend Against Reflected Amplification DDoS Attacks
    Don Shin, Sr. Product Marketing Manager at A10 Networks, Takahiro Mitsuhata, Technical Marketing Lead at A10 Networks Recorded: Nov 8 2018 41 mins
    DDoS attacks are growing in complexity, but to effectively protect your business against them, it’s essential to have a deeper understanding of your attacker’s tactics, techniques and procedures.

    Join us on this first webinar in the DDoS Defense Insights series, to learn how to defend against one of the most common and disruptive types of cyberattacks: reflected amplification flood attacks. Spoiler alert: port blocking isn’t the right answer.

    We will also show you a demonstration on how A10 Networks’ solution can protect your network against these devastating attacks.

    In this webinar you will learn about:
    * Reflected amplification DDoS attacks and how they are preformed
    * Weapons that are used in these types of attacks
    * Strategies for blocking these attacks without damaging legitimate users
  • SSL Insight: Comprehensive SSL Visibility
    SSL Insight: Comprehensive SSL Visibility
    Babur Nawaz Khan and Almas Raza,Technical Marketing Engineers at A10 Networks Recorded: Nov 8 2018 32 mins
    A10’s Thunder SSLi is a purpose-built decryption solution that eliminates the SSL/TLS blind spot, providing full visibility into encrypted traffic. This increases security effectiveness at a fraction of the cost by offloading CPU-intensive SSL operations from your existing security solutions. Join us for an overview of A10’s Thunder SSLi, which provides a compelling and scalable enterprise security solution to arm your existing security infrastructure for today’s cyber threat landscape, and future-proofs your infrastructure without compromising network performance or security.
  • The Threat You Can’t See: SSL, Cyberattacks, and You
    The Threat You Can’t See: SSL, Cyberattacks, and You
    Nick Cavalancia, IT Pro Today; Babur Nawaz Khan and Almas Raza, A10 Networks Recorded: Oct 24 2018 58 mins
    The goal for every security strategy is to spot the threat before an attack is successful. But, without visibility into encrypted traffic, identifying threat activity (whether involving internal or external threat actors) via deep packet inspection is not only difficult, but probably impossible. With cyber criminals increasingly using encryption for cyberattacks, your security strategy can be left with a visibility gap, keeping you in the dark and unaware of current threat activity.

    So, why is SSL visibility important to your security strategy, and what should you do about it?

    In this educational webcast, join IT Pro Today contributor and Microsoft Cloud and Datacenter MVP, Nick Cavalancia, along with Parth Jagirdar and Almas Raza from A10 Networks as they discuss:

    * The state of the art of attack – Encryption trends, benefits and popularity
    * What’s hiding within your network traffic – Challenges of encryption
    * Best practices for complete visibility for superior network security without compromising performance
  • [SPANISH WEBINAR] La entrega de aplicaciones acaba de volverse más eficiente
    [SPANISH WEBINAR] La entrega de aplicaciones acaba de volverse más eficiente
    Yovani Piamba, Manager, Systems Engineering - NOLA, at A10 Networks Recorded: Sep 21 2018 55 mins
    Adoptar una estrategia híbrida y en múltiples nubes para la entrega de su aplicación también puede llevar a perder la percepción del rendimiento de su aplicación. Compartiremos y demostraremos las últimas funciones de análisis centradas en la aplicación en Harmony Controller 4.1. Nuestro controlador más nuevo ayuda a las organizaciones a obtener información útil sobre el rendimiento de las aplicaciones, la experiencia del usuario final y los problemas de seguridad, y permite una resolución de problemas más rápida y fácil.

    El controlador Harmony de múltiples nubes brinda inteligencia conectada a través de múltiples servicios de aplicaciones seguras A10: ADC / balanceo de carga, inspección SSL, Gi-Firewall y NAT de grado de operador.

    Al unirse al seminario web, aprenderá cómo:
    * Simplificar y agilizar sus operaciones de TI
    * Asegurar la disponibilidad de la aplicación
    * Desglosar fácilmente a datos contextuales y rápidamente identificar las áreas problemáticas
    * Acceder a aplicaciones centralizadas, redes y análisis de seguridad desde un único panel de cristal
    * Habilitar el análisis de autoservicio para varios propietarios de aplicaciones

Embed in website or blog