Résultat de la Recherche | A10 Networks
  • |

Intérêts

Types D'actifs

Les Industries

Chaînes de Production

Solutions

Total Search Results: 131
Brochures

A10 Networks Corporate Backgrounder

This document provides an overview of A10's business

Reports

5G and Edge Computing: Deployment and Monetization Strategies

As we upgrade our devices and carriers invest in scaling networks, adoption of 5G continues to grow. Gartner research has projected that by 2025, 75% of data will be processed at the edge, while market research firms agree that edge computing is a sizeable and quickly growing market segment. Download...

Reports

Toward a More Secure 5G World

Next-generation 5G networks are widely seen as one of the most fundamental technology developments of our current century. Much has been written about the potential of these ultra-high-speed, low-latency networks to drive a new era of digital innovation, breakthrough applications, and revenue growth for mobile operators and the economy as...

Videos

SSL Insight - Beyond Simple SSL/TLS Decryption

Privacy concerns of internet users have started a new trend, compelling more websites to SSL encrypted application traffic. However, while SSL/TLS encryption provides privacy, it also creates a huge blind spot in corporate defenses, which opens an organization up to malware attacks. A10 Networks SSL Insight® is the industry’s leading...

Videos

Preserving IPv4 Infrastructure and Transitioning to IPv6

IPv4 has been a major tech topic since 2011, despite IPv4 addresses becoming depleted (ipv4 exhaustion) in late 2016. Service providers must devise a strategy to preserve the life of their IPv4 infrastructure and evolve their networks to transition to IPv6. In this video, we about how service providers can...

Infographics

Toward a More Secure 5G World

This infographic includes key data points from the Q1 2020 5G survey conducted by the BPI Network in partnership with A10.

Resource

A10 Networks Delivers Comprehensive 5G Security

Mobile networks operators are struggling with escalating security threats while moving to 5G mobile and fixed wireless access infrastructure. Existing security solutions are inadequate and do not have the flexibility to adapt to new distributed topologies. Read this report by Moor Insights & Strategy to learn about the market need...

Case Studies

Middle East Telecom Giant Scales Out Security for Massive 5G-Rollout

Deploying A10 Networks Thunder CFW in a scale-out approach enabled the service provider to optimize the performance, security, and cost of its 4G mobile network and to meet its aggressive plans for 5G.

Reports

RCR Wireless Report: What's the Status of 5G Globally?

5G has taken the world by storm. According to a recent Ericsson Mobility Report, roughly 50 service providers around the world have already announced the availability of commercial 5G networks and that momentum is only expected to grow. Download this free RCR Wireless report to learn about: Operator policies and...

Case Studies

Tier-1 Cable Provider Protects Subscriber Privacy with Encrypted DNS at Scale with A10 Networks Thunder CFW

As the use of encrypted DNS grows, this cable operator can assure subscriber privacy and security without sacrificing performance or impacting the user experience. The company deployed encrypted DNS protocol, DNS over HTTPS (DoH) with Thunder CFW.

White Papers

Zero Trust is Incomplete Without TLS Decryption

The Zero Trust model aims to enhance the security of networks against cyber attacks, whether they are initiated from outside the network or within. However, with the rise of encryption of internet traffic, it is becoming increasingly difficult to implement the Zero Trust model in an effective way. In this...

Infographics

DDoS Weapons & Attack Vectors

Do you know which vulnerable servers and weapons are used globally to perform crushing DDoS attacks at massive scale? A10 Networks tracked nearly 6 million DDoS weapons. Download this infographic to learn about A10 Networks' finding and what you need to know about the threats targeting you today.

Solution Briefs

Secure and Protect DNS Traffic With DNS Over HTTPS (DoH)

A10 Networks offers DNS over HTTPS (DoH) natively through its Thunder® CFW for those organizations, that want to offer this capability to their subscribers. As demonstrated by service provider production use, the solution can handle the scale and DNS security requirements that DoH will deliver.

Brochures

Signaling Security Plays a Key Role in Meeting New 5G Requirements

Near perfect network and service availability is a top priority for mobile operators as they scale up their networks for 5G traffic demands. The signaling or control plane interfaces in multi-generational mobile networks play a key role in 4G networks and in meeting new 5G requirements. Protecting interfaces and protocols...

Reports

HardenStance Briefing: A10 Helps SKT Build Leadership in 5G

SK Telecom, the mobile industry 5G leader outlines their 5G and MEC strategy, and their relationship with A10. Written by Patrick Donegan of Hardenstance and based on an in depth written interview with SKT, this report describes the deployment success of this South Korean mobile operator and how they plan...