Click here to close now.

SYS-CON MEDIA Authors: Pat Romanski, William Schmarzo, Elizabeth White, Carmen Gonzalez, JP Morgenthal

News Feed Item

A10 Networks and Webroot Partner to Extend Web Classification to A10 Thunder ADCs

A10 Customers Can Satisfy Security and Regulatory Requirements by Decrypting SSL Traffic While Excluding Traffic to Regulated Data and Sensitive Sites Like Banking and Healthcare

SAN JOSE, CA and BROOMFIELD, CO -- (Marketwired) -- 08/05/14 -- A10 Networks (NYSE: ATEN), a technology leader in application networking, and Webroot, the market leader in cloud-based, real-time Internet threat detection, announced that A10 will integrate the Webroot BrightCloud® Web Classification Service into the A10 Thunder Application Delivery Controller (ADC) product line, improving performance, efficacy and compliance of SSL traffic decryption.

Using the Webroot BrightCloud Web Classification Service with A10's SSL Intercept feature, customers can analyze and secure SSL traffic while bypassing communications to sensitive sites such as banking and healthcare applications. The combined solution enables organizations to protect end user devices and applications, while meeting regulatory requirements that forbid the decryption or logging of confidential data. By adding Web Classification to Thunder ADC, customers using A10's innovative SSL Intercept feature can granularly control which types of SSL or TLS traffic to decrypt and which types to forward without inspection.

Thunder ADC's SSL Intercept feature eliminates the blind spot imposed by SSL encryption, offloading CPU-intensive SSL decryption functions that enable security devices to inspect all encrypted traffic. Thunder ADC decrypts SSL-encrypted traffic and forwards it to third-party security devices like firewalls, threat prevention platforms, or monitoring and analytics products for deep packet inspection (DPI).

While dedicated security devices can inspect and analyze network traffic, they are rarely designed to decrypt SSL traffic at high speeds. In fact, some security products cannot decrypt SSL traffic at all. SSL Intercept offloads CPU-intensive encryption and decryption tasks from dedicated security devices, boosting application performance.

"Our customers use a wide array of security products to analyze and protect their users and their data," said Jason Matlof, A10 Networks vice president of marketing. "Unfortunately, many of these security products cannot inspect SSL traffic, exposing organizations to attack and data exfiltration. By partnering with Webroot, we can provide visibility into SSL traffic without unnecessarily decrypting communications to highly sensitive websites and federally regulated data."

"We are excited to partner with A10 Networks and integrate our market-leading web classification capabilities with A10 Networks' innovative SSL inspection solution," said Scott Merkle, vice president of enterprise and OEM sales at Webroot. "Together, we can empower organizations to identify threats lurking in SSL traffic while maintaining compliance with regulatory requirements."

The Webroot BrightCloud Web Classification Service enables network and security vendors to help enterprise customers protect users against web threats and meet regulatory compliance requirements. The advanced, self-learning Webroot® Intelligence Network continuously scans the internet, leaving no place for threats to hide. Using a highly sophisticated combination of global threat sensors, machine learning algorithms and human classification, Webroot maintains and expands its knowledge of website classifications and integrates this information into the BrightCloud Web Classification Service.

Webroot and A10 Networks integration benefits:

  • Comprehensive website coverage: Webroot scores and classifies over 460 million domains in more than 45 languages to correctly identify and categorize websites.
  • Highly accurate web categorization: Advanced machine learning classifies websites at a rate of over 2,500 per second with an extremely low error rate.
  • Automated classification updates: Thunder ADC can automatically download new URL updates and -- with the optional cloud service -- perform cloud-based lookups for unknown URLs.
  • Industry-first URL classification in an ADC: A10 has delivered the first SSL Intercept feature with web classification in an enterprise-grade application delivery controller. A10 customers can quickly enable and configure the Web Classification Service in their Thunder ADC appliances.

Availability
The Web Classification Service for Thunder ADC is available as an annual subscription for Thunder and AX ADC product lines in ACOS (Advanced Core Operating System) 4.0, available in Q4. A10 Networks will be available to discuss the Webroot integration at Black Hat on August 5-7, 2014 in Las Vegas, Booth #659.

About A10 Networks
A10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: http://www.a10networks.com

About Webroot
Webroot is the market leader in cloud-based, real-time Internet threat detection for consumers, businesses and enterprises. We have revolutionized Internet security to protect all the ways you connect online. Webroot delivers real-time advanced Internet threat protection to customers through its BrightCloud® security intelligence platform, and its SecureAnywhere™ suite of security products for endpoints, mobile devices and corporate networks. Over 7 million consumers, 1.5 million business users and 1.3 million mobile users are protected by Webroot. Market-leading security companies, including A10 Networks, Cisco Systems, F5 Networks, Gateprotect, Intel Security, Microsoft, Palo Alto Networks, Proofpoint, RSA Security and others choose Webroot to provide advanced Internet threat protection for their products and services. Founded in 1997 and headquartered in Colorado, Webroot is the largest privately held Internet security company in the United States -- operating globally across North America, Europe and the Asia Pacific region. For more information on our products and services, visit www.webroot.com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In a world of ever-accelerating business cycles and fast-changing client expectations, the cloud increasingly serves as a growth engine and a path to new business models. Dynamic clouds enable businesses to continuously reinvent themselves, adapting their business processes, their service and software delivery and their operations to achieve speed-to-market and quick response to customer feedback. As the cloud evolves, the industry has multiple competing cloud technologies, offering on-premises ...
SYS-CON Events announced today that SUSE, a pioneer in open source software, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. SUSE provides reliable, interoperable Linux, cloud infrastructure and storage solutions that give enterprises greater control and flexibility. More than 20 years of engineering excellence, exceptional service and an unrivaled partner ecosystem power the products and support that help ...
As the world moves from DevOps to NoOps, application deployment to the cloud ought to become a lot simpler. However, applications have been architected with a much tighter coupling than it needs to be which makes deployment in different environments and migration between them harder. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, Netflix and so on is at the heart of CloudFoundry – a complete developer-oriented Platform as a Service (PaaS...
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. The DevOps Summit at Cloud Expo – to be held June 3-5, 2015, at the Javits Center in New York City – will expand the DevOps community, enable a wide...
The web app is Agile. The REST API is Agile. The testing and planning are Agile. But alas, Data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes which force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software orga...
The world is at a tipping point where the technology, the device and global adoption are converging to such a point that we will see an explosion of a world where smartphone devices not only allow us to talk to each other, but allow for communication between everything – serving as a central hub from which we control our world – MediaTek is at the heart of both driving this and allowing the markets to drive this reality forward themselves. The next wave of consumer gadgets is here – smart, con...
Cloud Expo, Inc. has announced today that Andi Mann returns to DevOps Summit 2015 as Conference Chair. The 4th International DevOps Summit will take place on June 9-11, 2015, at the Javits Center in New York City. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at ...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
CA Technologies has announced it has signed a definitive agreement to acquire Rally Software Development Corp. for $19.50 per share, which equates to approximately $480 million, net of cash acquired. The transaction has been unanimously approved by both Boards of Directors, and is expected to close in the second quarter of CA’s fiscal 2016. Based in Boulder, CO, Rally has approximately 500 employees across four continents and FY 2015 sales of $88 million. “Software applications are changing the...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...