Résultat de la Recherche | A10 Networks
  • |

Intérêts

Types D'actifs

Les Industries

Chaînes de Production

Solutions

Total Search Results: 34
Reports

5G and Edge Computing: Deployment and Monetization Strategies

As we upgrade our devices and carriers invest in scaling networks, adoption of 5G continues to grow. Gartner research has projected that by 2025, 75% of data will be processed at the edge, while market research firms agree that edge computing is a sizeable and quickly growing market segment. Download...

Reports

Toward a More Secure 5G World

Next-generation 5G networks are widely seen as one of the most fundamental technology developments of our current century. Much has been written about the potential of these ultra-high-speed, low-latency networks to drive a new era of digital innovation, breakthrough applications, and revenue growth for mobile operators and the economy as...

Videos

SSL Insight - Beyond Simple SSL/TLS Decryption

Privacy concerns of internet users have started a new trend, compelling more websites to SSL encrypted application traffic. However, while SSL/TLS encryption provides privacy, it also creates a huge blind spot in corporate defenses, which opens an organization up to malware attacks. A10 Networks SSL Insight® is the industry’s leading...

Infographics

Toward a More Secure 5G World

This infographic includes key data points from the Q1 2020 5G survey conducted by the BPI Network in partnership with A10.

Resource

A10 Networks Delivers Comprehensive 5G Security

Mobile networks operators are struggling with escalating security threats while moving to 5G mobile and fixed wireless access infrastructure. Existing security solutions are inadequate and do not have the flexibility to adapt to new distributed topologies. Read this report by Moor Insights & Strategy to learn about the market need...

Case Studies

Middle East Telecom Giant Scales Out Security for Massive 5G-Rollout

Deploying A10 Networks Thunder CFW in a scale-out approach enabled the service provider to optimize the performance, security, and cost of its 4G mobile network and to meet its aggressive plans for 5G.

Reports

RCR Wireless Report: What's the Status of 5G Globally?

5G has taken the world by storm. According to a recent Ericsson Mobility Report, roughly 50 service providers around the world have already announced the availability of commercial 5G networks and that momentum is only expected to grow. Download this free RCR Wireless report to learn about: Operator policies and...

Case Studies

Tier-1 Cable Provider Protects Subscriber Privacy with Encrypted DNS at Scale with A10 Networks Thunder CFW

As the use of encrypted DNS grows, this cable operator can assure subscriber privacy and security without sacrificing performance or impacting the user experience. The company deployed encrypted DNS protocol, DNS over HTTPS (DoH) with Thunder CFW.

White Papers

Zero Trust is Incomplete Without TLS Decryption

The Zero Trust model aims to enhance the security of networks against cyber attacks, whether they are initiated from outside the network or within. However, with the rise of encryption of internet traffic, it is becoming increasingly difficult to implement the Zero Trust model in an effective way. In this...

Solution Briefs

Secure and Protect DNS Traffic With DNS Over HTTPS (DoH)

A10 Networks offers DNS over HTTPS (DoH) natively through its Thunder® CFW for those organizations, that want to offer this capability to their subscribers. As demonstrated by service provider production use, the solution can handle the scale and DNS security requirements that DoH will deliver.

Brochures

Signaling Security Plays a Key Role in Meeting New 5G Requirements

Near perfect network and service availability is a top priority for mobile operators as they scale up their networks for 5G traffic demands. The signaling or control plane interfaces in multi-generational mobile networks play a key role in 4G networks and in meeting new 5G requirements. Protecting interfaces and protocols...

Videos

Customizing your TLS Decryption to Preserve User Privacy and Compliance

In this video, A10 Networks Technical Product Manager Mubeen Alam explains what privacy and compliance concerns users have when it comes to decryption of their network traffic and how those concerns can be addressed with a decryption solution like A10's SSL Insight.

Videos

How to configure selective decryption on SSL Insight - AppCentric Templates Use Case Series

In this video, we explore the configuration for selectively bypassing network traffic decryption on SSL Insight by specifying website domains or selecting relevant web categories (e.g. financial or healthcare information).

Videos

SSL Insight integration with OPSWAT Metadefender ICAP Server - AppCentric Templates Use Case Series

This video shows how SSL Insight can be configured to decrypt SSL/TLS traffic and how it enables OPSWAT MetaDefender Core and ICAP Server to inspect all traffic in clear-text for hidden malware.