Résultat de la Recherche | A10 Networks
  • |

Intérêts

Types D'actifs

Les Industries

Chaînes de Production

Solutions

Total Search Results: 142
Brochures

A10 Networks Corporate Backgrounder

This document provides an overview of A10's business

Reports

5G and Edge Computing: Deployment and Monetization Strategies

As we upgrade our devices and carriers invest in scaling networks, adoption of 5G continues to grow. Gartner research has projected that by 2025, 75% of data will be processed at the edge, while market research firms agree that edge computing is a sizeable and quickly growing market segment. Download...

Reports

Toward a More Secure 5G World

Next-generation 5G networks are widely seen as one of the most fundamental technology developments of our current century. Much has been written about the potential of these ultra-high-speed, low-latency networks to drive a new era of digital innovation, breakthrough applications, and revenue growth for mobile operators and the economy as...

Resource

A10 Networks Delivers Comprehensive 5G Security

Mobile networks operators are struggling with escalating security threats while moving to 5G mobile and fixed wireless access infrastructure. Existing security solutions are inadequate and do not have the flexibility to adapt to new distributed topologies. Read this report by Moor Insights & Strategy to learn about the market need...

Reports

RCR Wireless Report: What's the Status of 5G Globally?

5G has taken the world by storm. According to a recent Ericsson Mobility Report, roughly 50 service providers around the world have already announced the availability of commercial 5G networks and that momentum is only expected to grow. Download this free RCR Wireless report to learn about: Operator policies and...

Case Studies

Tier-1 Cable Provider Protects Subscriber Privacy with Encrypted DNS at Scale with A10 Networks Thunder CFW

As the use of encrypted DNS grows, this cable operator can assure subscriber privacy and security without sacrificing performance or impacting the user experience. The company deployed encrypted DNS protocol, DNS over HTTPS (DoH) with Thunder CFW.

Infographics

DDoS Weapons & Attack Vectors

Do you know which vulnerable servers and weapons are used globally to perform crushing DDoS attacks at massive scale? A10 Networks tracked nearly 6 million DDoS weapons. Download this infographic to learn about A10 Networks' finding and what you need to know about the threats targeting you today.

Brochures

Signaling Security Plays a Key Role in Meeting New 5G Requirements

Near perfect network and service availability is a top priority for mobile operators as they scale up their networks for 5G traffic demands. The signaling or control plane interfaces in multi-generational mobile networks play a key role in 4G networks and in meeting new 5G requirements. Protecting interfaces and protocols...

Case Studies

Global Gaming Company ZAPS DDoS Attacks in Real-Time with ZAPR

Gaming provider selects A10 Thunder TPS to detect attacks across its global network and mitigate DDoS attacks at the edge. Leverages Zero-Day Automation Protection (ZAP) for its Zero Trust approach to cybersecurity.

Deployment Guides

Deploying Reactive DDoS Protection Using A10 aGalaxy System

This deployment guide contains an overview of the DDoS protection architecture in asymmetric reactive mode, the deployment workflow and information captures from the A10 aGalaxy Management System, A10 Thunder TPS and A10 Thunder TPS Detector running Static Baseline (Detection 1.0).

Case Studies

SK Telecom

SK Telecom (SKT), the largest mobile operator in South Korea, launched the world's first commercial 5G service and needed to scale and secure its next-generation 5G ready network. SKT deployed Thunder CFW with Harmony Controller.

Solution Briefs

High-performance Virtual Network Functions for 5G Mobile Networks

Mobile network operators must quickly transform networks to virtualized 5G architectures to gain critical cost and service agility benefits, but security, performance, interoperability, and operations complexity remain key challenges. This solution brief describes A10 Networks comprehensive set of high-performance virtual network functions (VNFs) that are built for the unique security...

Videos

What is Mirai and How do You Protect Yourself Against it?

In this video, Solutions Architect, Ahmad Nassiri, explains what the Mirai DDoS attack is, the way it works and how to protect your networks against it.

Videos

The Effect of DDoS Attacks on Carrier-grade NAT Devices

In this video, Solutions Architect, Glen Turner, discusses what happens when a carrier-grade NAT infrastructure and IP NAT pools are subjected to DDoS attacks.