A10 Networks Blog

Select a Topic

  • All Topics

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Donald Shin

  • Dr. Vincent Berk

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Takahiro Mitsuhata

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

July 17, 2019

TLS 1.3 – Status, Concerns & Impact

It is common knowledge that in August, 2018, TLS 1.3 was ratified by the Internet Engineering Task Force (IETF), which has made it the new standard for connection security on the internet. The approved version of the RFC is an upgrade of the TLS 1.2 standard, which had been under discussion for over two years by the IETF. TLS 1.3 primarily focuses on the speed and security of connections. However, TLS 1.3 comes with its own set of challenges and concerns, especially for the network traffic inspection industry. In this article, we will look at some of the major developments Read more

July 16, 2019

Enforcing GDPR – A New Era of Accountability and Fines

In September 2018, British Airways announced that a data breach had occurred on their website and app. It was initially estimated that the data related to around 380,000 card payments was compromised. However, recent estimates suggest that the breach affected around 500,000 users. The attack was carried out by hackers using a skimming attack, where traffic was diverted to a fraudulent website, tricking users into exposing their data as they made purchases through the British Airways website or app. The data stolen was not limited to just credit card transactions, however, but also included details like names, street and email Read more


July 15, 2019

Remember Roaming? Let Your Subscribers Roam Securely

When subscribers avoided using roaming, security of the roaming wasn’t that important. Now the environment has all changed. Here’s my subscriber experience with roaming and why roaming security should be an essential part of every mobile operator’s security strategy. Several years ago, when traveling to Spain, I quickly found out that my U.S. mobile carrier did not have interconnection agreements with the local provider (even though they claimed they did). As I quickly dashed between Wi-Fi-enabled cafes, I tried (unsuccessfully) to find my way to a local restaurant using the map application on my mobile phone. Lost, tired and near Read more


July 15, 2019

GTP Security – Essential for 4G and Evolving 5G Networks

5G promises higher speeds, lower latency, a multitude of new IoT applications and, for the mobile network operator, massive disruption in existing network technologies and business models. At stake: $1.3T in new 5G-enabled revenue, with 10X the growth rates of historic mobile network revenues. Battling declining revenue growth with lower profitability, mobile network operators are aggressively pursuing this new opportunity. Operators are aware that secure, seamless interconnection with low latency and high speed is essential for a quality subscriber experience that will capture the new industrial and commercial 5G opportunities. And international roaming is now part of a broader business Read more

July 11, 2019

How to Defend DNS Services from All Types of DDoS Attacks

First invented in 1983, the internet Domain Name System (DNS) is older than the World Wide Web itself. Only a select few people had access to the internet in the 1980s. Today, however, there are 4.1 billion internet users worldwide, 1.94 billion websites and about 342 million registered domain names, according to Hosting Facts. When you consider that each of those websites and domain names relies on a naming system that’s more than thirty years old, it becomes clear that effective DNS services defense is not only important — it’s imperative. Companies must be particularly conscious of defending their DNS Read more

July 9, 2019

Decrypting SSL Traffic: Best Practices for Security, Compliance, and Productivity

Today, encryption has become ubiquitous — Google reports that as of June 1, 2019, 94 percent of traffic across all its products and services is encrypted. Google is not the only company reporting a rise in the use of encryption though; all the commonly used browsers, including Safari and Mozilla, are witnessing the same trend. So, what does this rising wave of encryption mean for organizations, and what can they do about it? That’s what we’ll explain ahead. Read on to learn: How encryption can put organizations at risk. Why SSL/TLS (Secure Sockets Layer/Transport Layer Security) decryption is critical. What Read more


June 25, 2019

A10 Networks and Dell EMC Partner to Deliver 5G Security and Multi-cloud Solutions to Customers

The market opportunity around 5G security and multi-cloud is expanding rapidly. A10 Networks is providing AI-driven network and application security for enterprises and service providers. To help Dell’s customers rapidly adopt our software solutions on Dell’s hardware, we executed a global reseller agreement to become an Extended Global Technology Partner of Dell. This agreement enables Dell EMC to resell our full product line of multi-cloud and 5G security solutions, including vThunder® Application Delivery Controllers (ADCs), Carrier-Grade Networking (CGN), Convergent Firewall (CFW), SSL Insight (SSLi) and the A10 Harmony® Controller. “Dell EMC is a recognized leader in the worldwide server market Read more

June 24, 2019

This Is How Much Time and Money a DDoS Attack Will Cost You

This Is How Much Time and Money a DDoS Attack Will Cost You You don’t have to look at any statistics to know that DDoS attacks aren’t just inconvenient. They can also cost your organization valuable time and money. But just how much time and money? That’s what we’re here to show you with help from the 2018 IDG DDoS Report. How Many Hours of Downtime Do DDoS Attacks Cause? According to the IDG report, 36 percent of companies experiencing more than five DDoS attacks suffer an average downtime of seven to 12 hours. By contrast, 34 percent of companies Read more


June 19, 2019

The Urgency of Network Security in the Shared LTE/5G Era

Is mobile network security really that urgent? Well….yes! The 5G non-standalone (NSA) models defined by 3GPP provide a path for mobile network operators to upgrade existing RAN to 5G while still leveraging a common 4G core. The core functions remain unchanged in this transition. So why the urgency? The mobile ecosystem, use cases, traffic and usage patterns and cybercriminal expertise are all changing significantly, pushing forward – regardless of whatever network technology is deployed. Surging roaming traffic, automation-empowered cybercriminals, lightly protected IoT devices and smartphones and new mission-critical applications have deepened the threats that can be launched against networks and Read more

June 12, 2019

How to Deploy the A10 Networks Secure Service Mesh in Red Hat OpenShift

What is Red Hat OpenShift? Red Hat OpenShift is a comprehensive enterprise-grade platform built for containers with Kubernetes. With Red Hat OpenShift, developers can easily deploy applications using a library of supported technologies, so teams can choose the languages, frameworks, and databases they use to build and deploy their services. (visit here to know more about Red Hat OpenShift) What is A10 Networks’ Secure Service Mesh? A10 Networks’ Secure Service Mesh solution provides an easy, automated way to integrate enterprise-grade security and load-balancing/traffic management with comprehensive application visibility and analytics with no change to applications, and across their entire lifecycle. Read more

June 6, 2019

Top Seven DDoS Protection Challenges

Although there are now more DDoS protection solutions available than ever before, companies still tend to face a few major hurdles with DDoS defense. From attack complexity to a lack of granular control, the challenges that organizations are up against are as varied as they are difficult. Here, we’ll look at the top-seven DDoS protection challenges according to the new 2018 IDG DDoS Report: Types of attacks are complex and diverse (48 percent). Need broader protection against DDoS attacks (39 percent). Attacks are coming from too many places (37 percent). Requires too much manual intervention (34 percent). Usage is cost Read more