Datasheets & Brochures

eBook

  • 2016 IDG Connect DDoS SurveyOverview

    IDG (commissioned by A10 Networks®) conducted a survey of over 120 North American IT/Security decision makers to gain insights into Enterprise capabilities to deal with the rise of multi-vector DDoS attacks. The study assessed how DDoS attacks impact these enterprises, steps to address such threats, effectiveness levels of existing protection solutions and perceived barriers to increased protection, desired capabilities, investment focus and desired vendor characteristics.

  • 2016 Ponemon Study: Uncovering Hidden Threats within Encrypted TrafficOverview

    How is malware hiding inside of SSL traffic?

    Are organizations equipped to detect encrypted threats? Are you? The findings, based on an exclusive study by the Ponemon Institute, answer the tough questions around SSL decryption and inspection. Explore the realities of this growing attack vector with this exclusive eBook.

  • 6 Keys to Eliminating SSL Blind Spots: What You Need for SSL InspectionOverview

    REGISTER TO DOWNLOAD

    Traditional firewalls and security systems can’t keep up with the increasing onslaught of malicious encrypted traffic. To protect your data—and your bottom line—it’s critical that you effectively inspect all SSL traffic. Download the eBook to learn the 6 keys for uncovering hidden threats, while ensuring performance and compliance.

    From the eBook:
    “The hard truth is: Without SSL inspection in place, your organization is at risk of an attack. Hackers hiding in encrypted traffic can infiltrate your networks, install malware, and steal data across multiple end-points.

    Your best defense against malicious encrypted traffic is an SSL inspection platform that meets 6 key requirements.”

  • DDoS Trends ReportOverview

    This report contains the observations and insights derived from distributed denial of service (DDoS) attack mitigations enacted on behalf of, and in cooperation with, customers of Verisign DDoS Protection Services from April 1, 2016 through June 30, 2016 ("Q2 2016") and the security research of Verisign iDefense® Security Intelligence Services conducted during that time. It represents a unique view into the attack trends unfolding online, including attack statistics and behavioral trends for Q2 2016.

  • Exposing Hidden Threats: Why Your Organization Needs SSL InspectionOverview

    Rising Cost of Breaches and Data Privacy Concerns Are Driving Encryption. Learn how to protect your data against hidden threats.

Back to top

Infographics

  • 4 Reasons You Need a High Performance ADCOverview

    1. Bandwidth growth is outpacing budgets
    2. SSL requirements are skyrocketing
    3. More devices = more connections with always-on access
    4. Internet attacks are growing

  • How Hidden Encrypted Threats Impact Federal Organizations TodayOverview

    What dangers are pushing past your security infrastructure to steal secret, sensitive and critical federal data?

    Based on exclusive findings from the Ponemon Institute, A10 Networks’ latest infographic, “Hidden Threats in Encrypted Traffic,” reveals the telling reasons federal agencies aren’t decrypting SSL traffic.

  • How Hidden Encrypted Threats Impact Financial Organizations TodayOverview

    What dangers are pushing past your security infrastructure to steal sensitive customer information and payment data?

    Based on exclusive findings from the Ponemon Institute, A10 Networks’ latest infographic, “Hidden Threats in Encrypted Traffic,” reveals the telling reasons financial institutions aren’t decrypting SSL traffic.

  • How Hidden Encrypted Threats Impact Healthcare Organizations TodayOverview

    What dangers are pushing past your security infrastructure to steal ePHI and EMR data?

    Based on exclusive findings from the Ponemon Institute, A10 Networks’ latest infographic, “Hidden Threats in Encrypted Traffic,” reveals the telling reasons healthcare isn’t decrypting SSL traffic.

  • How Hidden Encrypted Threats Impact Retail Organizations TodayOverview

    What dangers are pushing past your security infrastructure to steal sensitive customer information and payment data?

    Based on exclusive findings from the Ponemon Institute, A10 Networks’ latest infographic, “Hidden Threats in Encrypted Traffic,” reveals the telling reasons retailers aren’t decrypting SSL traffic.

  • Malicious Traffic Hides Behind EncryptionOverview

    SSL encryption is a must for protecting valuable professional or personal data, but it can also introduce risks. A proactive defense against hidden attacks requires SSL inspection. A10 Networks’ SSL Insight decrypts SSL traffic for analysis by a broad range of security solutions, delivering critical visibility for protection from advanced threats.

  • Top 6 Dangers of Not Inspecting SSL TrafficOverview

    Make sure that today’s—and tomorrow’s—most sophisticated hackers can’t break through your corporate security defenses by hiding in SSL traffic. Defend your organization against malicious SSL traffic.

Back to top

Brochures

  • 6 Discoveries IT Security Pros Need to Know about SSL InspectionOverview

    Most security professionals recognize malicious activity hiding in SSL traffic as a growing threat, but few feel they are adequately equipped to address the problem. So how concerned should we be? A10 Networks provides six critical outlooks from Ponemon’s exclusive study.

  • A10 Technical Assistance Center Support GuideOverview

    A10 Networks is Committed to Your Complete Satisfaction 

    Through teamwork, technology, expert knowledge, professionalism, and a commitment to excellence, A10's support team addresses customer issues as its main priority. A10's Technical Assistance Center (TAC), a worldwide customer service team, provides technical support on A10 Networks products recognizing the company's mission to become the industry leader in both pre-sale and post-sale support...

  • Top 8 Reasons to Choose A10 Networks (for Service Providers)Overview

    A10 Networks solutions help service providers improve customer satisfaction, monetize their networks and grow revenues. Accelerate, secure and optimize application delivery to drive down your costs, enhance service availability and quickly respond to dynamic market requirements. Learn the top eight reasons global service providers choose A10 Networks.

Back to top

Data Sheets

  • A10 Lightning Application Delivery ServiceOverview

    The A10 Lightning Application Delivery Service (ADS) optimizes the delivery and security of cloud-native applications and services running over public or private clouds. It is offered as a software-as-a-service (SaaS) platform from A10 Networks. For organizations embracing the cloud and application centricity, ADS increases operational efficiency, offloads IT administrators from cumbersome tasks and reduces risk.

  • Global License Manager User GuideOverview

    This document provides a step-by-step procedure on how to obtain an activation key license for your A10 appliance using
    A10 Networks’ Global License Manager (GLM) after A10 Networks approves the order, along with instructions on how to
    import your activation key license to your A10 appliance.

  • Thunder CFW High-Performance Versatile FirewallOverview

    A10 Networks® Thunder® Convergent Firewall (CFW) is a high-performance, all-inclusive and flexible security solution featuring a Secure Web Gateway, Data Center Firewall, Gi/SGi Firewall and site-to-site IPsec VPN for enterprises and service providers. Thunder CFW uncovers threats in SSL traffic and blocks access to malicious websites at the enterprise perimeter. It also protects high-value assets in the data center from network and Distributed Denial of Service (DDoS) attacks. A10 Thunder CFW offers the performance and the versatility you need to safeguard your applications, your users and your infrastructure.

  • Thunder SSLi Data SheetOverview

    The A10 Networks Thunder® SSLi product line’s SSL Insight feature eliminates the blind spot imposed by SSL encryption, offloading CPU-intensive SSL decryption functions that enable security devices to inspect encrypted traffic – not just clear text. Thunder SSLi decrypts SSL-encrypted traffic and forwards it to a third-party security device like a firewall for deep packet inspection (DPI). Once the traffic has been analyzed and scrubbed, Thunder SSLi re-encrypts it and forwards it to the intended destination.

  • aGalaxy Management SolutionsOverview

    In large networks, multiple A10 Thunder™ and AX Series appliances, physical or virtual, are deployed to enable business-critical systems to reach their users. While full control of A10 Thunder and AX Series devices can be achieved effectively by direct CLI, GUI or aXAPI outof- the-box by default, the benefit of central and automated management increases as more appliances are added. 

    A10’s aGalaxy™ network management solution enables a network administrator to manage any A10 device from a single point. aGalaxy is a robust network monitoring and network management solution that offers an intuitive interface that can be utilized to perform and automate a variety of essential tasks. For example, aGalaxy allows effi cient centralized monitoring, upgrades, SSL certificate management, aFleX TCL script management, configuration, backups and restore.

  • Thunder Application Delivery Controller (ADC)Overview

    A10 Thunder® ADC product line of high-performance, next-generation application delivery controllers enable customers’ applications to be highly available, accelerated and secure. Thunder ADC is our premium ADC product line, delivering performance scalability up to 150 Gbps, the broadest range of form factors (physical, virtual and hybrid), and with expanded system resources designed to support future feature needs.

  • Thunder Carrier-Grade Networking (CGN)Overview

    A10 Thunder® CGN product line of Carrier Grade Networking gateways provide highperformance, highly transparent address and protocol translation enterprises and services for service providers to extend their IPv4 network connectivity, while simultaneously making the transition to IPv6. Thunder CGN is our premium CGN product line, delivering performance scalability up to 150 Gbps and with expanded system resources designed to support future feature needs.

  • Thunder Protection System (TPS)Overview

    A10 Thunder® TPS product line of Threat Protection Systems provides high-performance, network-wide protection against distributed denial of service (DDoS) attacks, and enables service availability against a variety of volumetric, protocol, resource and other sophisticated application attacks.

  • Professional ServicesOverview

    A10 Networks Professional Services offerings allow customers to quickly put their investment into production. Professional Services consultants deliver a powerful combination of engineering, support, customer service and business consulting to complement your network team. Several offerings are available to match needs to the right activities and effort. Our templatized, replicable approach, consultant training and strong project management support result in consistently high quality services for our customers.

  • AX ADCOverview

    A10 AX ADC product line of high-performance, application delivery controllers enable customers’ applications to be highly available, accelerated and secure. AX ADC is our original ADC product line, delivering performance scalability up to 115 Gbps.

  • AX CGNOverview

    A10 AX CGN product line of Carrier Grade Networking gateways provides high-performance, highly transparent address and protocol translation services for service providers to extend their IPv4 network connectivity, while simultaneously making the transition to IPv6. AX CGN is our original CGN product line, delivering performance scalability up to 115 Gbps.

Back to top

FAQs

  • A10 Lightning Application Delivery Service (ADS) FAQOverview

    The A10 Lightning Application Delivery Service is a cloud-native solution to optimize the delivery and security of cloud-native applications and services. It provides key application services, including traffic management with advanced elastic load-balancing, application security, and analytics for applications on public, private and hybrid clouds. It is purpose-built for containers and microservices-based application architectures and elegantly integrates with DevOps processes.

Back to top