Hi [[ session.user.profile.firstName ]]

[Panel] What Makes One DDoS Defense Better Than Another

Cloud and communications service providers are expanding their defenses in the face of devastating DDoS attacks. Every organizations looks for the “best” protection, but how can you find the best in the noise of marketing clutter?

Join our expert panel as we analyze the essential criteria you need to consider before investing in your next DDoS defense solution.

In this webinar you will learn:

· Why precision matters in DDoS protection
· How automation puts time on your side
· How scale impacts effectiveness and ROI
· How to choose a DDoS solution that is affordable and future-proofed
Recorded Dec 12 2019 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jim Frey, VP Strategic Alliance, Kentik Andrew Shoemaker, Founder and Chief Engineer, NimbusDDOS Don Shin, Sr PMM A10Networks
Presentation preview: [Panel] What Makes One DDoS Defense Better Than Another

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • IoT Evolution in a 5G World: Architectures & Security Strategies Recorded: Dec 17 2019 63 mins
    Jim Hodges, Chief Analyst at Heavy Reading; Ravi Raj Bhat, CTO at A10 Networks
    The deployment of Internet of Things (IoT) devices on a massive scale will have far-reaching service and security implications for service provider networks. This session will commence by covering the technology options for IoT deployment, including cellular IoT (e.g. NB-IoT and LTE-M) in 4G, how they will evolve with 5G deployments, and how 5G will help accelerate the deployment of cellular IoT.

    This session will also document how the acceleration of IoT deployment increases the overall security threat to 5G networks. In order to address these threats, new strategies are necessary. One such strategy that will be covered is the adoption of a two-tiered security approach that is optimally positioned to handle security challenges posed by IoT and 5G adoption. Finally, the webinar will explore the role that governments and regulation will play in securing IoT and 5G networks.
  • [Panel] What Makes One DDoS Defense Better Than Another Recorded: Dec 12 2019 60 mins
    Jim Frey, VP Strategic Alliance, Kentik Andrew Shoemaker, Founder and Chief Engineer, NimbusDDOS Don Shin, Sr PMM A10Networks
    Cloud and communications service providers are expanding their defenses in the face of devastating DDoS attacks. Every organizations looks for the “best” protection, but how can you find the best in the noise of marketing clutter?

    Join our expert panel as we analyze the essential criteria you need to consider before investing in your next DDoS defense solution.

    In this webinar you will learn:

    · Why precision matters in DDoS protection
    · How automation puts time on your side
    · How scale impacts effectiveness and ROI
    · How to choose a DDoS solution that is affordable and future-proofed
  • Decrypting SSL Traffic: Best Practices for Security, Compliance and Productivity Recorded: Dec 10 2019 44 mins
    Babur Nawaz Khan, Technical Marketing Manager; Pasu Balakathiresan, Director of Product Management
    The cyber threat landscape is rapidly evolving, and attackers are increasingly leveraging the cover of encryption to outmaneuver our enterprise defenses. Dedicated TLS decryption solutions are more relevant than ever before, and Symantec’s, (formerly Bluecoat), SSL Visibility solution is one of the contenders in this area.

    However, with the recent disruptive acquisition by Broadcom, the future of the solution has been questioned, and its limitations with performance, deployment flexibility and functionality have had customers looking for a better alternative that meets their needs.

    To improve the security posture of Enterprises, helping them protect their data and users, we will discuss what is required for an effective TLS Decryption strategy, including:

    * The encrypted blind spot and the evolving threat landscape
    * Why the “Secure Decrypt Zone” approach is important for your security infrastructure
    * Why A10 Networks SSL Insight is a better alternative to Symantec’s SSL Visibility
  • Migration Best Practices: Moving from F5 - Lessons from the Real World Recorded: Oct 24 2019 44 mins
    Paul Nicholson-Sr. Dir, Product Marketing; Saurabh Sureka-Dir. Product Management at A10 Networks
    Application delivery controllers (ADC) have evolved to include options for service consolidation or disaggregation with containerized microservices and basic commodity server load balancing for this new multi-cloud era. A10 Networks ADC provide new alternatives for F5 BIG-IP customers who want to modernize their infrastructures.

    A10 Networks has helped customers of all sizes migrate from F5 BIG-IP and VIPRION software and hardware. This webinar explores the real-world lessons learned and how migration was successfully achieved, all while increasing capabilities, and lowering overall TCO.

    Enterprises and service providers alike are looking to the key factors they have to consider in the future.

    Join the webinar and learn:
    * The state of ADC evolution
    * Multi-cloud adoption challenges
    * How to overcome the top-five BIG-IP migration challenges
    * How to reduce TCO
  • ISSA International Series; Attack of the BotNets- Internet of Terror loT Recorded: Oct 22 2019 115 mins
    ISSA International
    Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?

    Mark Kadrich, Principal, Kadrich InfoSec Consulting Services

    Don Shin, Lead DDoS Defender Advocate, A10 Networks
    Ryan Leirvik, Principal, Cybersecurity Management Solutions Practice, GRIMM
    David Merritt, VP, Applied Cognitive Solutions
  • SSL Visibility for Healthcare – Because Prevention is Better than the Cure Recorded: Oct 10 2019 54 mins
    Babur Nawaz Khan and Mike Dunn at A10 Networks
    The healthcare industry is trusted to hold some of the most sensitive and important personal information about individuals from all around the country. Unfortunately, this makes it one of the biggest targets on the radars of cyber criminals.
    With the rise in new sophisticated attacks and the threat of damaging data breaches always looming on the horizon, healthcare providers always need to be prepared to defend themselves against whatever may come their way.

    In this educational webcast, A10 Networks’ Babur Nawaz Khan and Mike Dunn will discuss:

    * The threats that healthcare providers face
    * How encryption is playing a role in helping attackers gain access to sensitive data
    * How centralized decryption, coupled with a multi-layered security approach, can help protect you and your data
  • How To Protect Your Users During a Flash Crowd or DDoS Attack Recorded: Oct 8 2019 58 mins
    Tarun Aggrawal, DDoS Solution Architect, and Don Shin, Product Marketing Manager, A10 Networks
    Your primary goal of DDoS defense should be to ensure the availability of services to legitimate users. Many DDoS defenders miss the nuances of this priority because IT gets graded on a measurable five-nines uptime, but rarely on user experience. This often leads to the use of indiscriminating DDoS prevention measures like Remote Trigger Black Hole (RTBH) and rate-limiting that are plagued with false positives. DDoS defenders must have mitigation strategies that put the user first.

    Join Tarun Aggrawal, DDoS Solution Architect, and Don Shin, Product Marketing Manager from A10 Networks, for another DDoS Defender’s Insights webinar. We will dig into how you can implement defenses that apply adaptive policies that block attackers while protecting users during DDoS attacks or flash crowds events.

    In this webinar, you will learn:

    • Why traffic shaping and RTBH should be the last course of action
    • How to distinguish users from attackers
    • Types of mitigation strategies and when to apply them safely
    • How to handle a flash crowd event
  • Application Management in a Multi-cloud World Recorded: Oct 3 2019 57 mins
    Peter Varhol- Technology Strategy Researchs; Almas Raza- A10 Networks
    As you expand your application delivery from on-premises to hybrid and multi-cloud environments; there are many things to consider. A typical multi-cloud architecture utilizes two or more public clouds as well as multiple private clouds to get the best performance and redundancy possible while keeping costs manageable.

    Managing an IT portfolio, or even one application, across a multi-cloud environment requires centralized tools for global monitoring, traffic analysis, and load balancing to ensure security and optimal user experiences around the world. Container architectures along with Kubernetes container orchestration provide an additional layer of complexity.

    This webinar will dive into:

    * Typical multi-cloud architectures using containers and Kubernetes
    * The challenges of managing applications in these architectures
    * How centralized tools enable observability and insight into keeping the environment efficient
    * Guidance for IT professionals and managers seeking solutions for building and managing their multi-cloud solutions
  • 5 Ways to Beat Gaming Booters with Zero-Trust DDoS Defenses Recorded August 23, Recorded: Aug 23 2019 61 mins
    Richard Groves Director of Research & Development & Don Shin at A10 Networks
    Gaming, for entertainment or gambling, seems to bring out the worst in people. Bad actors cut corners to gain an unearned competitive edge with new ways to cheat or attack hosting platforms.

    Online gaming DDoS defenders need modern approaches to balance the operations in favor of fair and continuous games.

    Watch this on-demand webinar with Rich Groves, Director of Security Research and Don Shin, Security Advocate at A10 Networks to learn about the challenges and best practices that help ensure your users have unfettered access to the online games that drive your business.
  • The Security Risk in SSL/TLS Traffic Recorded: Aug 22 2019 60 mins
    Nick Cavalancia - Microsoft, Babur Khan - A10 Networks
    Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures.

    So, how should organizations ensure all traffic is inspected - even in the most complex of environments?

    In this educational webcast, join Microsoft Cloud and Datacenter MVP, Nick Cavalancia, and Babur Khan, Technical Marketing Engineer with A10 Networks, as they discuss:

    * The state of encryption: for better and for worse
    * Why encryption puts the organization at risk
    * How to make decryption certain while maintaining centralized visibility
  • [Webinar em Português] Thunder TPS, o anti-DDoS da A10 Recorded: Jul 5 2019 33 mins
    Ricardo de Melo, Systems Engineer Brazil
    Ricardo de Melo, engenheiro da A10, irá apresentar o anti-DDoS da empresa em um panorama técnico e de forma sucinta. Ou seja, como a solução estaria posicionada na topologia de um provedor de internet ou outra empresa, como funciona seu sistema de detecção e mitigação e seu suporte. Ao final, abriremos para perguntas.
  • Application Traffic Visibility - What You Can’t See Can Cost You Recorded: May 28 2019 43 mins
    Almas Raza, Product Marketing, A10 Networks
    Apps are spanning across on-premises to multi-cloud. The path to digital transformation will enable organizations of all sizes to compete by using the right technology to drive innovation and time-to-market. The freedom to run applications on-premises and in multi-cloud can provide flexibility, simplify enterprise IT infrastructure, reduce cost and deploy innovative solutions that drive growth. But it also can have unique challenges.

    In this 45-minute webinar, you will learn:

    * Why traffic visibility plays a critical role in application delivery
    * The challenges in gaining deep insights into highly distribute applications on-premises and in multi-cloud
    * How visibility helps you secure your application, increase operational efficiency, and reduce administrative workload
  • How to Defend HTTP/HTTPS Applications from DDoS Attacks Recorded: May 23 2019 62 mins
    Rich Groves and Don Shin, A10 Networks
    DDoS attacks against encrypted web and application-based services continue to skirt traditional volumetric-focused DDoS defenses.

    To distinguish real users from malicious bots, organizations must implement a layered defense that provides full attack spectrum protection with minimal exposure of private data for HTTP and HTTPS services.

    Join our webinar to learn best practices to ensure your users have unfettered access to the applications that drive your business.

    In this webinar you will learn:

    • HTTP and HTTPS attack techniques
    • How layered DDoS and application security pipelines can achieve DDoS resilience
    • Mitigation strategies that prevent collateral damage against real users
    • Techniques that minimize the expense of decrypting attack traffic

    Featured presenters:
    Rich Groves, Director of Research and Development, A10 Networks
    Don Shin, Sr. Product Marketing Manager, A10 Networks
  • Best Practices for Application Delivery, Security, & Visibility in the Cloud Recorded: Apr 30 2019 43 mins
    Almas Raza, Product Marketing, A10 Networks
    A key initiative in the path to digital transformation is developing new and migrating existing application workloads to include a multi-cloud infrastructure. Applications span from on-premise to public, private, and hybrid environments and include modern application architecture based on containers and Kubernetes.

    Organizations expect to achieve agility and rapid deployment, better ease of use, elastic scaling, automation, and increased operational efficiency. But in this brave new world, how can you ensure that your applications are secure and that you have visibility regardless of where your apps reside?

    In this 45-minute webinar, you will learn how to:

    * Deliver consistent application policy control wherever apps reside
    * Provide integrated security and compliance across multiple-environments
    * Manage more distributed and complex application environments with automation
    * Gain visibility and deep insights into applications traffic for faster troubleshooting
  • Requirements of Optimized Traffic Flow and Security in Kubernetes Recorded: Apr 10 2019 41 mins
    John Allen, Sr. Systems Engineer, A10 Networks
    The adoption of containers is an accelerating trend in the application deployment space and Kubernetes has become the de-facto standard for container orchestration and management. However, many are still learning about Kubernetes and how it can benefit their organization.

    In this webinar you will learn to:
    * Make your application development more agile
    * Enhance security and compliance between microservices
    * Correlate traffic flow and security
    * Drill down to contextual data and quickly pin-point problem areas
  • Detecting Threats in Encrypted Traffic Recorded: Mar 28 2019 77 mins
    Babur Khan, Product Marketing
    In this webinar, learn how SSL decryption works from a technology standpoint and the technical challenges related to performance, network topology and routing.

    You will learn:

    * Encryption trends, benefits and popularity
    * What’s hiding within your network traffic – Challenges of encryption
    * Best practices for complete visibility for superior network security while Preserving Security, Compliance and Performance
  • [Webinar en Español] SSL Insight: Visibilidad Total de SSL Recorded: Mar 15 2019 43 mins
    Pablo Javier Marini, System Engineer SOLA
    El Thunder SSL de A10 es una solución de decodificación desarrollada especialmente para eliminar el punto ciego de SSL/TLS, proporcionando una visibilidad total del tráfico cifrado. Esto aumenta la eficacia de la seguridad en una fracción del costo, descargando las intensas operaciones SSL de la CPU de sus soluciones de seguridad existentes.

    Únete a nosotros para entender más sobre el Thunder SSL de A10, una solución de seguridad corporativa atractiva y escalable para componer su infraestructura de seguridad actual y prepararla para el creciente escenario de amenazas cibernéticas sin comprometer el rendimiento o la seguridad de la red.
  • [Webinar em Português] SSL Insight: Visibilidade Total de SSL Recorded: Feb 27 2019 44 mins
    Ricardo de Melo, Systems Engineer Brazil
    O Thunder SSL da A10 é uma solução de decodificação desenvolvida especialmente para eliminar o ponto cego de SSL/TLS, fornecendo visibilidade total do tráfego criptografado. Isso aumenta a eficácia da segurança em uma fração do custo, descarregando as intensas operações SSL da CPU de suas soluções de segurança existentes.

    Junte-se a nós para entender mais sobre o Thunder SSL da A10, uma solução de segurança corporativa atrativa e escalonável para compor sua infraestrutura de segurança atual e prepará-la para o crescente cenário de ameaças cibernéticas sem comprometer o desempenho ou a segurança da rede.
  • How to defend DNS services from DDoS attacks of all types Recorded: Feb 26 2019 58 mins
    Don Shin, Security Product Marketing; Jian Liu, Systems Engineer at A10 Networks
    DNS services continue to be one of the top targets for DDoS attacks. When DNS services are disrupted, service providers and their subscribers are taken offline, which can inflict damage and result in loss of revenue and customers.

    Join this DDoS Defense Insight webinar to learn how to defend against one of the most common and disruptive types of cyberattacks: DNS DDoS attacks.

    In this webinar, you will learn:
    * How DNS works and what makes it vulnerable
    * Which strategies DNS attackers use including the infamous water torture attack
    * What are the strategies for blocking brute force, DNS floods and pseudo random domain attacks
    * How to minimize damage to your legitimate users during an attack
  • Preventing DDoS Attacks Requires More Than Just Blocking Traffic Recorded: Feb 7 2019 79 mins
    Randy Smith, Monterey Technology Group; Don Shin at A10 Networks
    In the past 12 months we’ve seen groundbreaking volumetric attacks that exceed 1.2 terabytes, but it takes much less than that to shut the doors of most businesses.

    Watch this webinar to learn about attack techniques and gain insight into weapons used for massive DDoS attacks. We will discuss the four critical strategies needed to prevent system failure, while protecting your users.

    In this webinar you will learn:
    * How to identify anomalies in attacker behavior
    * How Threat Intelligence can go from informational to actionable
    * How machine learning assists with identifying patterns
    * Which multi-modal defense techniques can help improve your security posture
Secure Application Services
A10 modernizes the delivery of applications with analytics-driven visibility, performance and security solutions, via hardware or software, on premise or in the cloud.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [Panel] What Makes One DDoS Defense Better Than Another
  • Live at: Dec 12 2019 7:00 pm
  • Presented by: Jim Frey, VP Strategic Alliance, Kentik Andrew Shoemaker, Founder and Chief Engineer, NimbusDDOS Don Shin, Sr PMM A10Networks
  • From:
Your email has been sent.
or close