Hi [[ session.user.profile.firstName ]]

5 Tactics to Combat the DDoS of Things

The second half of 2016 represented an unprecedented uptick in the volume, size and scope of distributed denial of service (DDoS) attacks.

This barrage took advantage of unsecured Internet of Things (IoT) devices to build massive botnets and launch mammoth DDoS attacks. For the first time, DDoS attacks exceeded the 1 Tbps threshold.

Be proactive in DDoS protection and mitigation. Register for A10’s exclusive webinar and learn how to actively defend against looming IoT-powered DDoS attacks. In this webinar, you will learn:

* Why you’re already at cyber war
* What you can learn from Mirai
* How to improve your DDoS mitigation plan
* How to dynamically respond to attacks
* The importance of cost-effective scale
Recorded Mar 30 2017 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chase Cunningham, Don Shin of A10networks
Presentation preview: 5 Tactics to Combat the DDoS of Things

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Grow Subscribers and Demand with CGNAT Infrastructure Jun 11 2020 8:00 am UTC 60 mins
    Terry Young, Director 5G and Service Provider Product Marketing; Hesham Elsherif, Principal Systems Engineer, A10 Networks
    The global pandemic has pushed Internet traffic up 50% in some markets and service providers across the world are scrambling to increase capacity as subscribers work and play more at home and as enterprises shift to on-line business models. One area that can quickly get overwhelmed is the CGNAT infrastructure – that capability in service provider networks that manages the pool of IPv4 and IPv6 addresses.

    During this session we are going to discuss the challenges now faced by service providers, including real world case studies. We will also review some of the features and products that comprise A10 Networks’ Carrier Grade NAT (CGNAT) solution and how A10 can help service providers and enterprises optimize existing CGNAT infrastructure, meet short term capacity requirements, extend the IPv4 lifetime and transition to IPv6.

    The session will cover:
    • Recent surge in Internet Demand and what it means for service providers
    • Market Trends – the Need for CGNAT and IPv7 Migration
    • Operator Challenges in meeting CGNAT capacity
    • Real World Case Studies
    • A10 CGN Solution Overview
  • How to Grow Subscribers and Demand with CGNAT Infrastructure Recorded: May 19 2020 54 mins
    Terry Young, Director 5G and Service Provider Product Marketing, A10 Networks; Jose De Abreu, SE Director, A10 Networks
    The global pandemic has pushed Internet traffic up 50% in some markets and service providers across the world are scrambling to increase capacity as subscribers work and play more at home and as enterprises shift to on-line business models. One area that can quickly get overwhelmed is the CGNAT infrastructure – that capability in service provider networks that manages the pool of IPv4 and IPv6 addresses.

    During this session we are going to discuss the challenges now faced by service providers, including real-world case studies. We will also review some of the features and products that comprise A10 Networks’ Carrier Grade NAT (CGNAT) solution and how A10 can help service providers and enterprises optimize existing CGN infrastructure, meet short term capacity requirements, extend the IPv4 lifetime and transition to IPv6.

    The session will cover:
    - Recent surge in Internet Demand and what it means for service providers
    - Market Trends: the Need for CGNAT and IPv4 – IPV6 Migration
    - Operator Challenges in meeting CGNAT capacity
    - Real World Case Studies
    - A10 CGN Solution Overview
  • Usando sua infraestrutura CGN para aumentar e otimizar serviços à assinantes Recorded: Apr 23 2020 72 mins
    Ivan Marzariolli, Country Manager Brazil, A10 Networks
    A pandemia global elevou o tráfego da Internet em 50%. Alguns mercados e provedores de serviços em todo o mundo estão se esforçando para aumentar a capacidade à medida que os assinantes trabalham e se divertem mais em casa e à medida que a empresa passa para os modelos de negócios on-line. Durante esta sessão, discutiremos os desafios agora enfrentados pelos provedores de serviços, incluindo caso de estudos do mundo real. Também revisaremos alguns dos recursos e produtos que compõem a solução da A10 Networks NAT (Carrier Grade NAT) (CGNAT) e como a A10 pode ajudar os provedores e empresas de serviços a otimizar a infraestrutura CGN existente, atender aos requisitos de capacidade de curto prazo, estender a vida útil do IPv4 e fazer a transição para o IPv6.
  • Uso de su infraestructura CGN para crecer y optimizar servicios y suscriptores Recorded: Apr 23 2020 64 mins
    Jose De Abreu, Director de SE para América Latina
    La pandemia global ha elevado el tráfico de Internet un 50% en algunos mercados y los proveedores de servicios en todo el mundo están luchando para aumentar la capacidad a medida que los suscriptores trabajan y juegan más en casa y la empresa se cambia a modelos de negocios en línea. Durante esta sesión, analizaremos los desafíos que enfrentan los proveedores de servicios, incluyendo los casos de estudio del mundo real. También revisaremos algunas de las características y productos que comprenden la solución A10 Networks NAT de grado de operador (CGNAT) y cómo A10 puede ayudar a los proveedores de servicios y a las empresas a optimizar la infraestructura CGN existente, cumplir con los requisitos de capacidad a corto plazo, extender la vida útil de IPv4 y la transición a IPv6.
  • Cloud Security 101: Simple Strategies for Safeguarding Your Business Recorded: Apr 16 2020 62 mins
    Bill Kleyman, Switch; Paul Nicholson, Senior Director, Product Marketing from A10
    Switch EVP Bill Kleyman addressed the fundamentals of cloud security, exploring the key controls and policies that define how data, systems, applications and infrastructure are protected in the cloud environment.

    In this webinar you will learn:
    * How to separate fears from facts about cloud security
    * The essential security features and controls to look for with cloud vendors and why they’re important
    * The basic steps you should take to prevent or minimize cybersecurity threats in a cloud environment

    Immediately following, Paul Nicholson, senior director, product marketing from A10 is interviewed on the key findings from the recent survey report - Mapping to the Multi-cloud Environment highlighting application delivery controllers as they relate to cloud security, visibility and container environments.
  • Mapping the Multi-cloud Enterprise Recorded: Feb 25 2020 39 mins
    Paul Nicholson, Sr. Dir, Product Marketing at A10 Networks , Dave Murray, Principal, EVP at Global Fluency
    As the race to the cloud accelerates, both the benefits and the challenges of multi-cloud environments are becoming ever clearer. There is no question that multi-cloud deployments now play a foundational role in everything from internal business needs to digital transformation initiatives.

    In this webcast you will learn:
    * The recent findings on the fast-evolving state of multi-cloud adoption management practices
    * How multi-cloud platforms will shape IT over the coming years
    * What’s needed to improve security in multi-cloud environments
  • The Threats Students Face Online and How We Can Protect Them? Recorded: Jan 30 2020 61 mins
    Babur Nawaz Khan, Technical Marketing Engineer, A10 Networks; Nick Cavalancia, Microsoft MVP
    Webinar Abstract: A rise in encryption over the Internet is making it hard to comply with CIPA mandates aimed at protecting and shielding school-age children from malicious and harmful content.

    In this webinar you will learn how:
    * Lax security policies can be exploited by outsiders and students
    * Different preventive security solutions can be used to protect students
    * Encrypted traffic visibility improves your school or library’s security posture
  • IoT Evolution in a 5G World: Architectures & Security Strategies Recorded: Dec 17 2019 63 mins
    Jim Hodges, Chief Analyst at Heavy Reading; Ravi Raj Bhat, CTO at A10 Networks
    The deployment of Internet of Things (IoT) devices on a massive scale will have far-reaching service and security implications for service provider networks. This session will commence by covering the technology options for IoT deployment, including cellular IoT (e.g. NB-IoT and LTE-M) in 4G, how they will evolve with 5G deployments, and how 5G will help accelerate the deployment of cellular IoT.

    This session will also document how the acceleration of IoT deployment increases the overall security threat to 5G networks. In order to address these threats, new strategies are necessary. One such strategy that will be covered is the adoption of a two-tiered security approach that is optimally positioned to handle security challenges posed by IoT and 5G adoption. Finally, the webinar will explore the role that governments and regulation will play in securing IoT and 5G networks.
  • [Panel] What Makes One DDoS Defense Better Than Another Recorded: Dec 12 2019 60 mins
    Jim Frey, VP Strategic Alliance, Kentik Andrew Shoemaker, Founder and Chief Engineer, NimbusDDOS Don Shin, Sr PMM A10Networks
    Cloud and communications service providers are expanding their defenses in the face of devastating DDoS attacks. Every organizations looks for the “best” protection, but how can you find the best in the noise of marketing clutter?

    Join our expert panel as we analyze the essential criteria you need to consider before investing in your next DDoS defense solution.

    In this webinar you will learn:

    · Why precision matters in DDoS protection
    · How automation puts time on your side
    · How scale impacts effectiveness and ROI
    · How to choose a DDoS solution that is affordable and future-proofed
  • A better alternative to Symantec Bluecoat SSL Visibility (TLS Decryption) Recorded: Dec 10 2019 44 mins
    Babur Nawaz Khan, Technical Marketing Manager; Pasu Balakathiresan, Director of Product Management
    The cyber threat landscape is rapidly evolving, and attackers are increasingly leveraging the cover of encryption to outmaneuver our enterprise defenses. Dedicated TLS decryption solutions are more relevant than ever before, and Symantec’s, (formerly Bluecoat), SSL Visibility solution is one of the contenders in this area.

    However, with the recent disruptive acquisition by Broadcom, the future of the solution has been questioned, and its limitations with performance, deployment flexibility and functionality have had customers looking for a better alternative that meets their needs.

    To improve the security posture of Enterprises, helping them protect their data and users, we will discuss what is required for an effective TLS Decryption strategy, including:

    * The encrypted blind spot and the evolving threat landscape
    * Why the “Secure Decrypt Zone” approach is important for your security infrastructure
    * Why A10 Networks SSL Insight is a better alternative to Symantec’s SSL Visibility
  • Migration Best Practices: Moving from F5 - Lessons from the Real World Recorded: Oct 24 2019 44 mins
    Paul Nicholson-Sr. Dir, Product Marketing; Saurabh Sureka-Dir. Product Management at A10 Networks
    Application delivery controllers (ADC) have evolved to include options for service consolidation or disaggregation with containerized microservices and basic commodity server load balancing for this new multi-cloud era. A10 Networks ADC provide new alternatives for F5 BIG-IP customers who want to modernize their infrastructures.

    A10 Networks has helped customers of all sizes migrate from F5 BIG-IP and VIPRION software and hardware. This webinar explores the real-world lessons learned and how migration was successfully achieved, all while increasing capabilities, and lowering overall TCO.

    Enterprises and service providers alike are looking to the key factors they have to consider in the future.

    Join the webinar and learn:
    * The state of ADC evolution
    * Multi-cloud adoption challenges
    * How to overcome the top-five BIG-IP migration challenges
    * How to reduce TCO
  • ISSA International Series; Attack of the BotNets- Internet of Terror loT Recorded: Oct 22 2019 115 mins
    ISSA International
    Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?

    Moderator:
    Mark Kadrich, Principal, Kadrich InfoSec Consulting Services

    Speakers:
    Don Shin, Lead DDoS Defender Advocate, A10 Networks
    Ryan Leirvik, Principal, Cybersecurity Management Solutions Practice, GRIMM
    David Merritt, VP, Applied Cognitive Solutions
  • SSL Visibility for Healthcare – Because Prevention is Better than the Cure Recorded: Oct 10 2019 54 mins
    Babur Nawaz Khan and Mike Dunn at A10 Networks
    The healthcare industry is trusted to hold some of the most sensitive and important personal information about individuals from all around the country. Unfortunately, this makes it one of the biggest targets on the radars of cyber criminals.
    With the rise in new sophisticated attacks and the threat of damaging data breaches always looming on the horizon, healthcare providers always need to be prepared to defend themselves against whatever may come their way.

    In this educational webcast, A10 Networks’ Babur Nawaz Khan and Mike Dunn will discuss:

    * The threats that healthcare providers face
    * How encryption is playing a role in helping attackers gain access to sensitive data
    * How centralized decryption, coupled with a multi-layered security approach, can help protect you and your data
  • How To Protect Your Users During a Flash Crowd or DDoS Attack Recorded: Oct 8 2019 58 mins
    Tarun Aggrawal, DDoS Solution Architect, and Don Shin, Product Marketing Manager, A10 Networks
    Your primary goal of DDoS defense should be to ensure the availability of services to legitimate users. Many DDoS defenders miss the nuances of this priority because IT gets graded on a measurable five-nines uptime, but rarely on user experience. This often leads to the use of indiscriminating DDoS prevention measures like Remote Trigger Black Hole (RTBH) and rate-limiting that are plagued with false positives. DDoS defenders must have mitigation strategies that put the user first.

    Join Tarun Aggrawal, DDoS Solution Architect, and Don Shin, Product Marketing Manager from A10 Networks, for another DDoS Defender’s Insights webinar. We will dig into how you can implement defenses that apply adaptive policies that block attackers while protecting users during DDoS attacks or flash crowds events.

    In this webinar, you will learn:

    • Why traffic shaping and RTBH should be the last course of action
    • How to distinguish users from attackers
    • Types of mitigation strategies and when to apply them safely
    • How to handle a flash crowd event
  • Application Management in a Multi-cloud World Recorded: Oct 3 2019 57 mins
    Peter Varhol- Technology Strategy Researchs; Almas Raza- A10 Networks
    As you expand your application delivery from on-premises to hybrid and multi-cloud environments; there are many things to consider. A typical multi-cloud architecture utilizes two or more public clouds as well as multiple private clouds to get the best performance and redundancy possible while keeping costs manageable.

    Managing an IT portfolio, or even one application, across a multi-cloud environment requires centralized tools for global monitoring, traffic analysis, and load balancing to ensure security and optimal user experiences around the world. Container architectures along with Kubernetes container orchestration provide an additional layer of complexity.


    This webinar will dive into:

    * Typical multi-cloud architectures using containers and Kubernetes
    * The challenges of managing applications in these architectures
    * How centralized tools enable observability and insight into keeping the environment efficient
    * Guidance for IT professionals and managers seeking solutions for building and managing their multi-cloud solutions
  • 5 Ways to Beat Gaming Booters with Zero-Trust DDoS Defenses Recorded August 23, Recorded: Aug 23 2019 61 mins
    Richard Groves Director of Research & Development & Don Shin at A10 Networks
    Gaming, for entertainment or gambling, seems to bring out the worst in people. Bad actors cut corners to gain an unearned competitive edge with new ways to cheat or attack hosting platforms.

    Online gaming DDoS defenders need modern approaches to balance the operations in favor of fair and continuous games.

    Watch this on-demand webinar with Rich Groves, Director of Security Research and Don Shin, Security Advocate at A10 Networks to learn about the challenges and best practices that help ensure your users have unfettered access to the online games that drive your business.
  • The Security Risk in SSL/TLS Traffic Recorded: Aug 22 2019 60 mins
    Nick Cavalancia - Microsoft, Babur Khan - A10 Networks
    Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures.

    So, how should organizations ensure all traffic is inspected - even in the most complex of environments?

    In this educational webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Babur Khan, Technical Marketing Engineer with A10 Networks, as they discuss:

    * The state of encryption: for better and for worse
    * Why encryption puts the organization at risk
    * How to make decryption certain while maintaining centralized visibility
  • [Webinar em Português] Thunder TPS, o anti-DDoS da A10 Recorded: Jul 5 2019 33 mins
    Ricardo de Melo, Systems Engineer Brazil
    Ricardo de Melo, engenheiro da A10, irá apresentar o anti-DDoS da empresa em um panorama técnico e de forma sucinta. Ou seja, como a solução estaria posicionada na topologia de um provedor de internet ou outra empresa, como funciona seu sistema de detecção e mitigação e seu suporte. Ao final, abriremos para perguntas.
  • Application Traffic Visibility - What You Can’t See Can Cost You Recorded: May 28 2019 43 mins
    Almas Raza, Product Marketing, A10 Networks
    Apps are spanning across on-premises to multi-cloud. The path to digital transformation will enable organizations of all sizes to compete by using the right technology to drive innovation and time-to-market. The freedom to run applications on-premises and in multi-cloud can provide flexibility, simplify enterprise IT infrastructure, reduce cost and deploy innovative solutions that drive growth. But it also can have unique challenges.

    In this 45-minute webinar, you will learn:

    * Why traffic visibility plays a critical role in application delivery
    * The challenges in gaining deep insights into highly distribute applications on-premises and in multi-cloud
    * How visibility helps you secure your application, increase operational efficiency, and reduce administrative workload
  • How to Defend HTTP/HTTPS Applications from DDoS Attacks Recorded: May 23 2019 62 mins
    Rich Groves and Don Shin, A10 Networks
    DDoS attacks against encrypted web and application-based services continue to skirt traditional volumetric-focused DDoS defenses.

    To distinguish real users from malicious bots, organizations must implement a layered defense that provides full attack spectrum protection with minimal exposure of private data for HTTP and HTTPS services.

    Join our webinar to learn best practices to ensure your users have unfettered access to the applications that drive your business.

    In this webinar you will learn:

    • HTTP and HTTPS attack techniques
    • How layered DDoS and application security pipelines can achieve DDoS resilience
    • Mitigation strategies that prevent collateral damage against real users
    • Techniques that minimize the expense of decrypting attack traffic

    Featured presenters:
    Rich Groves, Director of Research and Development, A10 Networks
    Don Shin, Sr. Product Marketing Manager, A10 Networks
Secure Application Services
A10 modernizes the delivery of applications with analytics-driven visibility, performance and security solutions, via hardware or software, on premise or in the cloud.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 5 Tactics to Combat the DDoS of Things
  • Live at: Mar 30 2017 6:25 pm
  • Presented by: Chase Cunningham, Don Shin of A10networks
  • From:
Your email has been sent.
or close