• |

A10 Networks Blog

Select a Topic

  • All Topics

  • 5G

  • A10 News

  • Cloud & Networking

  • Cyber Security

  • Events

  • Glossary

  • Network Management

  • Network Security

  • Network Traffic

  • Open Source

  • Technical Articles

Select Author

  • All Authors

  • A10 PSIRT Team

  • A10 Staff

  • Ahmad Nassiri

  • Akshay Mathur

  • Almas Raza

  • Amar Kapadia

  • Andrew Hickey

  • Arshad Khan

  • Babur Khan

  • Bruna Wells

  • Chris White

  • Derek Kang

  • Dhrupad Trivedi

  • Donald Shin

  • Geoff Blaine

  • George Nikaido

  • Gunter Reiss

  • Jeffrey Hughes

  • Jessica Dimaro

  • Jian Liu

  • Jim Frey

  • Kamal Anand

  • Karin Gilles

  • Ken Ludeman

  • Konstantin Dunaev

  • Leah McLean

  • Lee Chen

  • Michael Wheeler

  • Mike Thompson

  • Paul Harms

  • Paul Nicholson

  • Ravi Raj Bhat

  • Rex Chang

  • Rich Groves

  • Robert Keith

  • Sanjai Gangadharan

  • Saurabh Sureka

  • Siddhartha Aggarwal

  • Simon Jackson

  • Steve Hotz

  • Subeh Sharma

  • Sudarsan Raghavan

  • Takahiro Mitsuhata

  • Tarun Aggrawal

  • Terry Young

  • Tracy Schriver

  • Wendi Wolfgram

  • Yasir Liaqatullah

April 1, 2020

COVID-19 Pandemic Causes Massive Shift in Work Styles

How Can A10 Networks Help? As the shelter-in-place orders spread across the country and around the world, it has placed a huge burden on businesses of all sizes and the service providers that serve them and millions of their customers around the globe. While a massive shift to working from home is an obvious consequence of these orders, it has likely taken most by surprise as bandwidth requirements skyrocketed within a few short weeks. At the very same time, we are grappling with the reality of schools being closed, in-person events being cancelled and social distancing becoming the new black. Read more


April 1, 2020

Will COVID-19 Impact Adoption of 5G Services?

A10 Networks is based in San Jose, Calif. and as of March 17, we have been under orders to “shelter in place” and nearly everyone is working from home. All schools are closed, and restaurants are open for takeout only. As my co-workers and friends adjust to this new style of working and connecting, I’ve noticed a willingness to try new technology from people that I think of as very “non-technical.” So, in the long-term, this will bode well for overcoming adoption barriers for 5G. Here are some examples of small companies and individuals that likely would never have explored Read more

April 1, 2020

How to Prevent Cyber Foul Play During the COVID-19 Pandemic

COVID-19 Brings New Cyber Threats and Cyber Attacks Unless you were on a long desert meditation trip like Jared Leto, it is impossible not to have heard about the Coronavirus or COVID-19 (Coronavirus Disease) pandemic sweeping through the globe. At the time of writing this blog, there have been over half a million confirmed cases of COVID-19 in over 200 countries worldwide. At this point the pandemic is truly a global event of epic proportions, hopefully the last event of its kind we will see in our lifetimes. We’ve all heard about the ways we can protect ourselves and our Read more

March 25, 2020

Curing Healthcare Cybersecurity – A Better Way To Protect Patient Data

The Hippocratic Oath commands doctors to “first, do no harm.” Healthcare professionals have a proud tradition of honoring this commitment to their patients—but in today’s data-centric world, they face an equal obligation to secure the Protected Health Information (PHI), Personally Identifiable Information (PII), and financial data of their patients as well. And ironically, one of the most common “security” measures healthcare organizations take to strengthen cybersecurity, i.e., encryption of data on the go, can actually make patient data more vulnerable to attacks. By using encryption to protect communications, they make it impossible for firewalls and other security devices to detect Read more

March 19, 2020

Security in a Multi-cloud Environment

Vigilance and Responsibility Required for Multi-cloud Secure Application Delivery As companies leverage a multi-cloud strategy to improve IT operations and provide better services to their customers, they can’t afford to overlook the implications for security. This is especially true with the emergence of a new paradigm to run multiple disparate compute environments for application delivery. In fact, while issues like creeping complexity, non-existent cross-platform visibility, and multiple vendor standards all compete for IT focus in a multi-cloud environment, enterprise leaders cite security as the top challenge of all. This trend was illustrated in a recent global survey of IT and Read more

March 18, 2020

What You Need to Know About DDoS Weapons Today

A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to target and overwhelm vulnerable servers with massive traffic. Twenty years after its introduction, DDoS remains as effective as ever—and continues to grow in frequency, intensity, and sophistication. That makes DDoS defense a top cybersecurity priority for every organization. The first step: understanding the threat you face. To help organizations take a proactive approach to DDoS defense, A10 Networks recently published a report on the current DDoS landscape, including the weapons being used, the locations where attacks are being launched, Read more

March 13, 2020

A10 Networks Provides Update on Operations related to the COVID-19 Pandemic

Since late January, A10 Networks has been monitoring the developments related to the spread of COVID-19 across the world. In early February, we made the difficult decision, out of the utmost caution and concern for the well-being of our employees, partners and customers, to pull out of MWC 2020 in Barcelona this year. It proved to be the right decision as this event, and thousands of others, have since been cancelled in the face of the growing threat. Restricting Travel and Establishing Work from Home Options Beginning in February, we instituted restricted travel policies to only business-critical travel to ensure our Read more


March 6, 2020

Jim Brisimitzis on 5G, Edge Computing and AI

In the “5G: Secure What Matters” blog post series, we showcase thought leaders and their unique perspectives on the intersection of 5G, security, and technology. We recently sat down with Jim Brisimitzis, the founder of Seattle’s 5G Open Innovation Lab, to get his views on 5G. Tell us about yourself? I’m the founder of Seattle’s 5G Open Innovation Lab. Prior to joining the lab, I launched the Microsoft for Startups program in the US and Canada, was part of Microsoft Ventures, incubated products in edge/hybrid computing, and held roles at PeopleSoft, Oracle, and Nortel Networks. Enterprise tech has been my Read more


March 5, 2020

Enabling DNS over HTTPS (DoH) with Thunder CFW

Encryption is the foundation for securing data on the internet. Encrypted HTTP (HTTPS) has one of the largest shares of traffic on the internet today and is now the de facto standard. Domain Name Server (DNS) traffic, however, has been a clear-pass unencrypted channel on the internet. DNS, defined in the simplest terms, is used to resolve the address of an application on the internet. When the DNS traffic is unencrypted, it is vulnerable to manipulation and privacy exploitation via eavesdropping. Imagine driving an autonomous car and all your neighbors have visibility into and control over your destination. What is Read more

March 3, 2020

Next-generation Application Delivery Controllers

It’s no longer about Capacity but Visibility and Actionable Telemetry Years ago, when I first started working with load balancers, I would talk about how load balancing was the basis for all application delivery controllers (ADCs). We can still have a technical discussion about the benefits of different load-balancing algorithms like least connection vs. round robin vs. slow start, etc. but what separates a load balancer from an ADC is the ability to accelerate traffic and optimize back-end resources. While many features and functions have been added to ADCs over the years, the design and functionality requirements have recently changed. Read more

February 27, 2020

McAfee and A10 Networks Secure the Network Edge Against Modern Attacks

McAfee recently announced updates to their partnership program, particularly, the McAfee Security Innovation Alliance (SIA). With SIA, customers can benefit from highly interoperable and integrated security solutions that work together to provide a better defense against rising, and evolving, cyber-attacks. A10 Networks, with its Thunder SSLi® (SSL Insight) solution, has joined the McAfee SIA program, working seamlessly with McAfee’s Network Security Platform (NSP) in order to provide a complete, fool-proof security solution. Encryption Can Expose Your Network to Modern Cyber Threats Encryption can be a double-edged sword. As we have discussed before, encryption can preserve user privacy and prevent snooping Read more