Threat Intelligence Service
The A10 Threat Intelligence Service provides customers an actionable list of known bad actors on the Internet. A10's application networking and security solutions benefit from these lists, by blocking traffic from and to these bad destinations without the need to involve validation techniques. This offloads the platform's CPUs and increases security efficacy.
How it benefits your business
Identifies bad actors and bans them from your network
An astounding number of threat intelligence sources are analyzed to maintain a current list of bad actors on the Internet, in various categories. Customize your areas of interest on the Threat Intelligence Portal and keep your local defense policies current.
Expands protection and efficacy
Threat categories expand beyond DDoS botnets; for example, scanners, spammers and bots used for click fraud are identified. Prevent compromised devices inside your network from communicating with command and control servers outside.
Increases appliance capacity
Thunder ADC and Thunder TPS resources are offloaded when traffic from identified bad sources is blocked. There is no need to invoke botnet validation features for sources already marked bad. Bad sources are included when there is a high certainty, so no arbitrary reputation scores are involved.
Easy to manage Threat Intelligence Portal
Use recommended list of categories, or customize to areas of interest only.
Threat Intelligence Proxy
Synchronize updates from the Threat Intelligence Cloud to a proxy host in your DMZ.
Simple and effective
Immediately block traffic from IP addresses that are evidently bad without the need for confusing reputation scores.