A10 Networks Blog

Select a Topic

  • All Topics

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Donald Shin

  • Dr. Vincent Berk

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Takahiro Mitsuhata

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

July 19, 2019

Five Questions to Ask Before Delivering Your Applications to the Cloud

The time has come for enterprises around the world to face the truth: the traditional data center is dead and gone. In its place, multi-cloud, hybrid and container-based infrastructures have risen. According to research from Aberdeen shared in the ebook, “Five Questions to Ask Yourself Before You Deliver Your Applications to the Cloud,” (a collaboration between A10 Networks and Aberdeen),” 33 percent of businesses have implemented a hybrid cloud, and 23 percent plan to within the next year. What’s more, 80 percent of businesses using the cloud have a multi-cloud strategy. While cloud migration offers an abundance of benefits, from Read more

July 18, 2019

New Approaches to DDoS Protection Offer Better Security and Economic Scale

Distributed denial of service (DDoS) attacks are only going to increase over time and attackers have an ever-expanding opportunity to use new device types, like IoT to mount even larger attacks. Attacks sizes have jumped an order of magnitude in just the last five years. 41 percent of companies surveyed by IDC faced DDoS attacks more than 10 times per year; 3 percent were attacked over 100 times. Over 20 million total devices have been found to be exploitable as DDoS reflectors. Enterprises are challenged with detecting and mitigating DDoS attacks in-house and attackers are rapidly adapting their methods to Read more

July 17, 2019

TLS 1.3 – Status, Concerns & Impact

It is common knowledge that in August, 2018, TLS 1.3 was ratified by the Internet Engineering Task Force (IETF), which has made it the new standard for connection security on the internet. The approved version of the RFC is an upgrade of the TLS 1.2 standard, which had been under discussion for over two years by the IETF. TLS 1.3 primarily focuses on the speed and security of connections. However, TLS 1.3 comes with its own set of challenges and concerns, especially for the network traffic inspection industry. In this article, we will look at some of the major developments Read more

July 16, 2019

Enforcing GDPR – A New Era of Accountability and Fines

In September 2018, British Airways announced that a data breach had occurred on their website and app. It was initially estimated that the data related to around 380,000 card payments was compromised. However, recent estimates suggest that the breach affected around 500,000 users. The attack was carried out by hackers using a skimming attack, where traffic was diverted to a fraudulent website, tricking users into exposing their data as they made purchases through the British Airways website or app. The data stolen was not limited to just credit card transactions, however, but also included details like names, street and email Read more


July 15, 2019

Remember Roaming? Let Your Subscribers Roam Securely

When subscribers avoided using roaming, security of the roaming wasn’t that important. Now the environment has all changed. Here’s my subscriber experience with roaming and why roaming security should be an essential part of every mobile operator’s security strategy. Several years ago, when traveling to Spain, I quickly found out that my U.S. mobile carrier did not have interconnection agreements with the local provider (even though they claimed they did). As I quickly dashed between Wi-Fi-enabled cafes, I tried (unsuccessfully) to find my way to a local restaurant using the map application on my mobile phone. Lost, tired and near Read more


July 15, 2019

GTP Security – Essential for 4G and Evolving 5G Networks

5G promises higher speeds, lower latency, a multitude of new IoT applications and, for the mobile network operator, massive disruption in existing network technologies and business models. At stake: $1.3T in new 5G-enabled revenue, with 10X the growth rates of historic mobile network revenues. Battling declining revenue growth with lower profitability, mobile network operators are aggressively pursuing this new opportunity. Operators are aware that secure, seamless interconnection with low latency and high speed is essential for a quality subscriber experience that will capture the new industrial and commercial 5G opportunities. And international roaming is now part of a broader business Read more

July 11, 2019

How to Defend DNS Services from All Types of DDoS Attacks

First invented in 1983, the internet Domain Name System (DNS) is older than the World Wide Web itself. Only a select few people had access to the internet in the 1980s. Today, however, there are 4.1 billion internet users worldwide, 1.94 billion websites and about 342 million registered domain names, according to Hosting Facts. When you consider that each of those websites and domain names relies on a naming system that’s more than thirty years old, it becomes clear that effective DNS services defense is not only important — it’s imperative. Companies must be particularly conscious of defending their DNS Read more

July 9, 2019

Decrypting SSL Traffic: Best Practices for Security, Compliance, and Productivity

Today, encryption has become ubiquitous — Google reports that as of June 1, 2019, 94 percent of traffic across all its products and services is encrypted. Google is not the only company reporting a rise in the use of encryption though; all the commonly used browsers, including Safari and Mozilla, are witnessing the same trend. So, what does this rising wave of encryption mean for organizations, and what can they do about it? That’s what we’ll explain ahead. Read on to learn: How encryption can put organizations at risk. Why SSL/TLS (Secure Sockets Layer/Transport Layer Security) decryption is critical. What Read more


June 25, 2019

A10 Networks and Dell EMC Partner to Deliver 5G Security and Multi-cloud Solutions to Customers

The market opportunity around 5G security and multi-cloud is expanding rapidly. A10 Networks is providing AI-driven network and application security for enterprises and service providers. To help Dell’s customers rapidly adopt our software solutions on Dell’s hardware, we executed a global reseller agreement to become an Extended Global Technology Partner of Dell. This agreement enables Dell EMC to resell our full product line of multi-cloud and 5G security solutions, including vThunder® Application Delivery Controllers (ADCs), Carrier-Grade Networking (CGN), Convergent Firewall (CFW), SSL Insight (SSLi) and the A10 Harmony® Controller. “Dell EMC is a recognized leader in the worldwide server market Read more

June 24, 2019

This Is How Much Time and Money a DDoS Attack Will Cost You

This Is How Much Time and Money a DDoS Attack Will Cost You You don’t have to look at any statistics to know that DDoS attacks aren’t just inconvenient. They can also cost your organization valuable time and money. But just how much time and money? That’s what we’re here to show you with help from the 2018 IDG DDoS Report. How Many Hours of Downtime Do DDoS Attacks Cause? According to the IDG report, 36 percent of companies experiencing more than five DDoS attacks suffer an average downtime of seven to 12 hours. By contrast, 34 percent of companies Read more


June 19, 2019

The Urgency of Network Security in the Shared LTE/5G Era

Is mobile network security really that urgent? Well….yes! The 5G non-standalone (NSA) models defined by 3GPP provide a path for mobile network operators to upgrade existing RAN to 5G while still leveraging a common 4G core. The core functions remain unchanged in this transition. So why the urgency? The mobile ecosystem, use cases, traffic and usage patterns and cybercriminal expertise are all changing significantly, pushing forward – regardless of whatever network technology is deployed. Surging roaming traffic, automation-empowered cybercriminals, lightly protected IoT devices and smartphones and new mission-critical applications have deepened the threats that can be launched against networks and Read more