Click here to close now.

SYS-CON MEDIA Authors: Pat Romanski, Carmen Gonzalez, Liz McMillan, Blue Box Blog, Lori MacVittie

News Feed Item

A10 Networks Announces Significant Enterprise Security Feature Enhancements for Thunder Application Delivery Controller (ADC) Portfolio

New Features Enable Organizations to Keep Up With Evolving Security Threats and Compliance Standards Required to Protect Brand, Intellectual Property, and Revenue

SAN JOSE, CA -- (Marketwired) -- 08/05/14 -- A10 Networks (NYSE: ATEN), a technology leader in application networking, today announced significant enterprise security feature enhancements to its A10 Thunder ADC portfolio, providing enterprise customers with the latest security technologies required to combat evolving security threats that can damage employee productivity, brand reputation, and bottom-line revenue.

Combating security risks in an increasingly connected digital world challenges enterprise organizations worldwide. Complex Distributed Denial of Service (DDoS) attacks are growing at an alarming rate. Encrypted web traffic is also rapidly growing, allowing hackers to bypass security defenses, such as firewalls, intrusion prevention systems (IPS) and malware detection systems, effectively creating an open door to hackers. Government intelligence data collection initiatives have created demand to further increase the amount of encrypted traffic, as well as ensure that data at rest cannot be decrypted in the future. All these threats are increasing against a backdrop of massive traffic growth and a proliferation of connected devices, making the challenge of protecting critical data a constant struggle for network operators. Therefore, it is essential that vendors innovate quickly and deliver the latest protection technologies in their products.

To help organizations cope with these rising threats, A10 is adding a host of new security features to its Thunder ADC appliances and form factors, including:

  • Industry leading SSL Intercept visibility with selective bypass for user confidentiality powered by Webroot URL classification -- the first URL bypass for SSL in an ADC product. See related announcement.
  • Enhanced SSL Offload capabilities that can increase consumer peace of mind with Perfect Forward Secrecy (PFS) and ECDH (Elliptic Curve Diffie-Hellman) cryptography. Forward secrecy and strong new ciphers impede the decryption of data after the fact, and ephemeral keys generate and then discard unique keys after each session.
  • ICSA certified Web Application Firewall enhancements that improve security accuracy and coverage, enabling organizations to reduce the risk of devastating web attacks and meet compliance requirements. New features include XML and JSON protection, open redirect attack mitigation, granular HTTP protocol compliance rules, and integration of WAF security policies with aFleX scripting policies.
  • Broadened Application Access Management features that centralize user authentication using trusted identity management systems, including new support of industry standard SAML authentication with iDP interoperability.

These new features complement existing security functionality on Thunder ADC appliances such as high performance server DDoS protection, DNS Application Firewall, access control lists, and many more security functions.

Supporting Quotes
"Because ADCs sit at the critical ingress to most networks, it is a natural place to locate advanced security capabilities so threats can be stopped or mitigated before they can enter the network," said Jason Matlof. "A10 has been adding security features such as DDoS mitigation, Web Application Firewall (WAF), and SSL offload functionality to its ADC portfolio for years, allowing security functions to be delivered with the very high performance characteristic of our ADCs. Today's announcement further strengthens our enterprise security portfolio to include some of the most advanced security features, allowing our customers to keep ahead of evolving security threats."

A10 will be demonstrating its security solutions and capabilities at the Black Hat trade show in Las Vegas this week at Booth #659.

Availability
These new features will be available in ACOS 4.0 in 2H 2014 and are included at no additional charge through A10's popular "All Inclusive Licensing" pricing model.

About A10 Networks
A10 Networks is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: www.a10networks.com

A10 Networks, A10 Thunder, vThunder, ACOS, aCloud, aFleX, aXAPI, aVCS, Virtual Chassis, SoftAX, and aFlow are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Secure Infrastructure & Services will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Secure Infrastructure & Services (SIAS) is a managed services provider of cloud computing solutions for the IBM Power Systems market. The company...
Enterprise IoT is an exciting and chaotic space with a lot of potential to transform how the enterprise resources are managed. In his session at @ThingsExpo, Hari Srinivasan, Sr Product Manager at Cisco, will describe the challenges in enabling mass adoption of IoT, and share perspectives and insights on architectures/standards/protocols that are necessary to build a healthy ecosystem and lay the foundation to for a wide variety of exciting IoT use cases in the years to come.
SYS-CON Events announced today that CenturyLink, Inc., a leader in the network services market, has been named “Platinum Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. CenturyLink is the third largest telecommunications company in the United States and is recognized as a leader in the network services market by technology industry analyst firms. The company is a global leader in cloud infrastructure and ...
Docker is becoming very popular--we are seeing every major private and public cloud vendor racing to adopt it. It promises portability and interoperability, and is quickly becoming the currency of the Cloud. In his session at DevOps Summit, Bart Copeland, CEO of ActiveState, discussed why Docker is so important to the future of the cloud, but will also take a step back and show that Docker is actually only one piece of the puzzle. Copeland will outline the bigger picture of where Docker fits a...
SYS-CON Events announced today the DevOps Foundation Certification Course, being held June ?, 2015, in conjunction with DevOps Summit and 16th Cloud Expo at the Javits Center in New York City, NY. This sixteen (16) hour course provides an introduction to DevOps – the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will res...
As cloud gives an opportunity to businesses to buy services externally – how is cloud impacting your customers? In his General Session at 15th Cloud Expo, Fabio Gori, Director of Worldwide Cloud Marketing at Cisco, provided answers to big questions: Do you see hybrid cloud as where the world is going? What benefits does it bring? And how does Cisco connect all of these clouds? He also discussed Intercloud and Cisco’s investment on it.
SYS-CON Events announced today that B2Cloud, a provider of enterprise resource planning software, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. B2cloud develops the software you need. They have the ideal tools to help you work with your clients. B2Cloud’s main solutions include AGIS – ERP, CLOHC, AGIS – Invoice, and IZUM
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch ...
A new definition of Big Data & the practical applications of the defined components & associated technical architecture models This presentation introduces a new definition of Big Data, along with the practical applications of the defined components and associated technical architecture models. In his session at Big Data Expo, Tony Shan will start with looking into the concept of Big Data and tracing back the first definition by Doug Laney, and then he will dive deep into the description of 3V...
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and eas...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on T...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...