Click here to close now.

SYS-CON MEDIA Authors: VictorOps Blog, Tim Hinds, Mike Kavis, Plutora Blog, Andreas Grabner

News Feed Item

A10 Networks and Webroot Partner to Extend Web Classification to A10 Thunder ADCs

A10 Customers Can Satisfy Security and Regulatory Requirements by Decrypting SSL Traffic While Excluding Traffic to Regulated Data and Sensitive Sites Like Banking and Healthcare

SAN JOSE, CA and BROOMFIELD, CO -- (Marketwired) -- 08/05/14 -- A10 Networks (NYSE: ATEN), a technology leader in application networking, and Webroot, the market leader in cloud-based, real-time Internet threat detection, announced that A10 will integrate the Webroot BrightCloud® Web Classification Service into the A10 Thunder Application Delivery Controller (ADC) product line, improving performance, efficacy and compliance of SSL traffic decryption.

Using the Webroot BrightCloud Web Classification Service with A10's SSL Intercept feature, customers can analyze and secure SSL traffic while bypassing communications to sensitive sites such as banking and healthcare applications. The combined solution enables organizations to protect end user devices and applications, while meeting regulatory requirements that forbid the decryption or logging of confidential data. By adding Web Classification to Thunder ADC, customers using A10's innovative SSL Intercept feature can granularly control which types of SSL or TLS traffic to decrypt and which types to forward without inspection.

Thunder ADC's SSL Intercept feature eliminates the blind spot imposed by SSL encryption, offloading CPU-intensive SSL decryption functions that enable security devices to inspect all encrypted traffic. Thunder ADC decrypts SSL-encrypted traffic and forwards it to third-party security devices like firewalls, threat prevention platforms, or monitoring and analytics products for deep packet inspection (DPI).

While dedicated security devices can inspect and analyze network traffic, they are rarely designed to decrypt SSL traffic at high speeds. In fact, some security products cannot decrypt SSL traffic at all. SSL Intercept offloads CPU-intensive encryption and decryption tasks from dedicated security devices, boosting application performance.

"Our customers use a wide array of security products to analyze and protect their users and their data," said Jason Matlof, A10 Networks vice president of marketing. "Unfortunately, many of these security products cannot inspect SSL traffic, exposing organizations to attack and data exfiltration. By partnering with Webroot, we can provide visibility into SSL traffic without unnecessarily decrypting communications to highly sensitive websites and federally regulated data."

"We are excited to partner with A10 Networks and integrate our market-leading web classification capabilities with A10 Networks' innovative SSL inspection solution," said Scott Merkle, vice president of enterprise and OEM sales at Webroot. "Together, we can empower organizations to identify threats lurking in SSL traffic while maintaining compliance with regulatory requirements."

The Webroot BrightCloud Web Classification Service enables network and security vendors to help enterprise customers protect users against web threats and meet regulatory compliance requirements. The advanced, self-learning Webroot® Intelligence Network continuously scans the internet, leaving no place for threats to hide. Using a highly sophisticated combination of global threat sensors, machine learning algorithms and human classification, Webroot maintains and expands its knowledge of website classifications and integrates this information into the BrightCloud Web Classification Service.

Webroot and A10 Networks integration benefits:

  • Comprehensive website coverage: Webroot scores and classifies over 460 million domains in more than 45 languages to correctly identify and categorize websites.
  • Highly accurate web categorization: Advanced machine learning classifies websites at a rate of over 2,500 per second with an extremely low error rate.
  • Automated classification updates: Thunder ADC can automatically download new URL updates and -- with the optional cloud service -- perform cloud-based lookups for unknown URLs.
  • Industry-first URL classification in an ADC: A10 has delivered the first SSL Intercept feature with web classification in an enterprise-grade application delivery controller. A10 customers can quickly enable and configure the Web Classification Service in their Thunder ADC appliances.

Availability
The Web Classification Service for Thunder ADC is available as an annual subscription for Thunder and AX ADC product lines in ACOS (Advanced Core Operating System) 4.0, available in Q4. A10 Networks will be available to discuss the Webroot integration at Black Hat on August 5-7, 2014 in Las Vegas, Booth #659.

About A10 Networks
A10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: http://www.a10networks.com

About Webroot
Webroot is the market leader in cloud-based, real-time Internet threat detection for consumers, businesses and enterprises. We have revolutionized Internet security to protect all the ways you connect online. Webroot delivers real-time advanced Internet threat protection to customers through its BrightCloud® security intelligence platform, and its SecureAnywhere™ suite of security products for endpoints, mobile devices and corporate networks. Over 7 million consumers, 1.5 million business users and 1.3 million mobile users are protected by Webroot. Market-leading security companies, including A10 Networks, Cisco Systems, F5 Networks, Gateprotect, Intel Security, Microsoft, Palo Alto Networks, Proofpoint, RSA Security and others choose Webroot to provide advanced Internet threat protection for their products and services. Founded in 1997 and headquartered in Colorado, Webroot is the largest privately held Internet security company in the United States -- operating globally across North America, Europe and the Asia Pacific region. For more information on our products and services, visit www.webroot.com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add sc...
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Data-intensive companies that strive to gain insights from data using Big Data analytics tools can gain tremendous competitive advantage by deploying data-centric storage. Organizations generate large volumes of data, the vast majority of which is unstructured. As the volume and velocity of this unstructured data increases, the costs, risks and usability challenges associated with managing the unstructured data (regardless of file type, size or device) increases simultaneously, including end-to-...
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, includin...
The excitement around the possibilities enabled by Big Data is being tempered by the daunting task of feeding the analytics engines with high quality data on a continuous basis. As the once distinct fields of data integration and data management increasingly converge, cloud-based data solutions providers have emerged that can buffer your organization from the complexities of this continuous data cleansing and management so that you’re free to focus on the end goal: actionable insight.
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to mak...