• Advanced Core Operating SystemOverview

    Discover how A10 Networks' ACOS is increasingly the platform of choice for enterprises, service providers, Web giants and government organizations seeking to optimize the performance and security of their data center applications and networks.

Back to top

Application Acceleration and Server Load Balancing

  • A10 Helps Microsoft Disrupt Notorious ZeroAccess BotnetOverview

    On The Whiteboard editor Pamela Woon talks to the Digital Crimes Unit who fights organized crime on the Internet.

  • A10 Networks Acquires Appcito: Kamal Anand, Founder & CEO, Appcito Overview

    Appcito co-founder and CEO Kamal Anand discusses Appcito being acquired by A10 Networks and how it helps expedite the vision of secure application delivery in the cloud.

  • A10 Networks Acquires Appcito: Kishore Inampudi, Director of Product Management, A10 Networks Overview

    A10 Networks director of product management Kishore Inampudi discusses the company’s cloud strategy, industry challenges and how organizations can accelerate their business to not only be cloud-ready, but cloud-native. This is achieved by bridging traditional data centers with modern cloud environments.

  • A10 Networks Acquires Appcito: Lee Chen, Founder & CEO, A10 NetworksOverview

    A10 Networks founder and CEO Lee Chen discusses the acquisition of Appcito, a secure, cloud-based application delivery expert. The acquisition accelerates A10’s delivery of the A10 Harmony Cloud solution across data centers and public, private or hybrid clouds.

  • Application Intelligence Report (AIR) Overview Overview

    Neil Wu Becker, A10 Networks VP of Worldwide Marketing & Communications, gives an overview of A10’s Application Intelligence Report (AIR -, a global research project that examines the behavior and attitudes of the global workforce toward the use of business and personal apps, and their impact on risk, security, and corporate culture.

  • aXAPI: REST-based Application Programming Interface (API)Overview

    The aXAPI is a REST-based Application Programming Interface (API) enabling remote interaction from third-party applications to control an A10 Networks AX Series server load balancer.


  • Case Study: Tremor Video selects A10 next-gen ADC for present and future scalability requirementsOverview

    Tremor Videos' Senior Director of Systems Engineering, Presley Acuna, shares why A10 Networks was selected to meet their high-volume video advertising demands. Their need to consolidate disparate platforms that meet current and anticipated performance requirement was met. And A10's world class support team provided Tremor Video with the necessary tools from beginning to end for a quick and efficient deployment.

  • Cash goes VirtualOverview

    PayNearMe, a financial technology provider, implements A10 Lightning ADS to manage, control and secure workloads in the public cloud and significantly reduce operating expenses.

  • Global Server Load Balancing (GSLB)Overview

    A10 Networks Systems Engineer, Todd Harcourt, presents an overview to Global Server Load Balancing and how A10 Networks can help manage traffic to multiple geographic sites and also provide disaster recovery for a backup site.


  • Introducing The AX 3030 Application Delivery ControllerOverview

    A10 Networks introduces the AX 3030, a new 1U appliance in our AX Series Application Delivery Controller family that lowers the barrier to entry for 10 gigabit connectivity. 


  • Introduction to the AX Series aFleX Scripting ToolOverview

    The AX Series aFleX scripting tool enables advanced, highly-flexible and efficient Layer 7 traffic management. aFleX technology is based on the industry-standard TCL programming language. aFleXs do not introduce performance degradation, even when numerous features are turned on, due to AXs scalable Advanced Core Operating System (ACOS) architecture that is tuned for multi-core CPUs.


  • Micron 21 chose A10 Networks ADCs for their flexibility and performanceOverview

    Micron21’s data centre in Melbourne, Australia, is home to thousands of clients representing hundreds of thousands of Internet websites and cloud services, including local, national and international businesses and government agencies.

    When Micron21 began searching for a more effective load-balancing solution, the chosen technology needed to meet extremely high standards. Micron 21 chose A10 Networks ADCs for their flexibility and performance, with a capability of running 20 gigabits worth of load balance performance per device.

  • The AX 1030 Application Delivery ControllerOverview

    A10 Networks introduces the AX 1030, a high-performance entry level Application Delivery Controller in our AX Series family.

  • The AX 3200-12 Application Delivery ControllerOverview

    A10 Networks' AX 3200-12 delivers high performance and network attack protection in a mid-range Application Delivery Controller.

  • The AX 3400 Application Delivery ControllerOverview

    A10 Networks' AX 3400 delivers exceptional performance and network attack protection in a mid-range Application Delivery Controller, previously available only in the high end ADC market.


  • The AX 5200-11 Application Delivery ControllerOverview

    A10 Networks introduces the AX 5200-11, the world's fastest Application Delivery Controller, the new high-end model in our AX Series family.

  • Virtual Chassis Solution for Application DeliveryOverview

    The AX Virtual Chassis System (aVCS) allows our customer to have a single point of management for up to eight AX Series devices and increases the total aggregate throughput within a virtual chassis system.

  • Yahoo! JAPAN Selects A10 Thunder ADC for Fast, Reliable Streaming VideoOverview

    Leading technology company installs A10 Thunder Application Delivery Controllers for video delivery service GYAO Corporation! To meet the fast-growing demand for HD video streaming, GYAO! needed scalable network infrastructure that could handle traffic peaks exceeding 800 Gbps. By implementing A10’s next-generation Thunder ADC solution, GYAO! improved its video streaming performance while achieving major savings: 80 percent lower cost per port.

Back to top

Cyber Security / DDoS Protection

  • A Security Detail for 5G and Mobile ThreatsOverview

    Mobile security is serious business, especially as carriers prepare for the avalanche of connected devices expected as they transition from 4G to 5G.

  • A10 AIR: The Many Faces of Identity TheftOverview

    According to the A10 Application Intelligence Report, or A10 AIR (, our global research project that examines the use of apps and how our attitude, behavior and experience involving apps impacts personal and corporate security, more than one in 10, or 13 percent, of respondents say they’ve been the victim of identity theft.

  • A10 and Cisco SSL Traffic Inspection Solution Video Sponsored by Cisco SecurityOverview

    To detect and stop cyber attacks, Cisco customers must be able to inspect all traffic, including encrypted traffic. This video, sponsored by Cisco Security, shows how A10 Thunder SSLi intercepts SSL traffic and sends it unencrypted to Cisco FirePOWER or Cisco ASA platforms for inspection and attack prevention.

  • Case Study: C4L defends against DDoS attacks with A10 Networks Thunder TPSOverview

    C4L, a data center colocation and connectivity solutions provider, selected the A10 Networks Thunder TPS Threat Protection Systems to mitigate sophisticated distributed denial of service (DDoS) attacks and improve service availability. C4L will also use the A10 Thunder TPS platform to launch a new set of services, delivering additional DDoS protection for clients across its 300 network-connected locations.

  • Fastest Appliance for DDoS Mitigation Overview

    A10 Networks, Neil Wu Becker at GovWare 2016, Singapore, discusses the issue of DDoS attacks, which are increasingly being used in more sophisticated ways, tying up IT resources to enable other attacks. 

    Neil showcases A10’s latest arsenal of DDoS mitigation products—the offering includes: 

    • A10 Thunder 14045 TPS - the fastest appliance on the market, packing 300 Gbps of mitigation throughput capacity (or 2.4 terabits per second in a cluster).
    • A10 Thunder 840 TPS - a turnkey solution for medium enterprises, available in virtual (vThunder TPS) and hardware appliance form factors. 
    • A10 DDoS Security Incident Response Team (DSIRT) - A10’s newly enhanced support offering now includes a team of DDoS mitigation experts specializing in DDoS prevention—available 24x7x365.
  • Fidelis Cybersecurity Partnership Brings Visibility to the Largest Network Blind SpotOverview

    In this video, Gunter Reiss, A10 Vice President of Strategic Alliances, and Kurt Bertone, Fidelis Cybersecurity Chief Technology Officer, discuss how A10 and Fidelis collaborate to help customers gain visibility into encrypted network traffic to root out any threats that may have previously gone unnoticed.

  • Find out how A10 helps solve today's encryption challengesOverview

    Internet users have security and privacy concerns which is compelling more website owners to encrypt application traffic. While corporations encrypt more and more traffic, it is creating a blind spot in corporate networks. 

  • Get Smart and Smarter About Cyber Security with A10 at RSA 2017Overview

    When it comes to cyber security, the bad guys hope their victims are “Dumb and Dumber.” In this video, our special guest, A10 Director of Cyber Operations Dr. Chase Cunningham, discusses some ways you can get smart about security at RSA Conference 2017.

  • Investigating Mirai: Inside the Malware Responsible for Global IoT Botnets and Massive DDoS AttacksOverview

    When it comes to cyber security, the bad guys hope their victims are “Dumb and Dumber.” In this video, our special guest, A10 Director of Cyber Operations Dr. Chase Cunningham, discusses some ways you can get smart about security at RSA Conference 2017.

  • Looking for the Perfect Holiday Gift for Your CSO?Overview

    CSOs are often the unsung hero of your organization. It’s their duty to keep your organization secure from threats, and it’s a job that often goes without thanks. This year, show your CSO some appreciation. Need ideas? Don’t panic; we’ve got you covered. Here, A10 Networks Director of Cyber Operations Dr. Chase Cunningham highlights the three (one practical, and two unconventional) holiday gift ideas for CSOs.

  • Simple Steps to Protect Yourself from the IoT DDoS InvasionOverview

    A recent rash of distributed denial of service (DDoS) attacks have been carried out by threat actors creating botnets using Internet of Things (IoT) devices. Here, A10 Networks Director of Cyber Operations Chase Cunningham shares a few simple precautions you can take to prevent IoT devices from being used in an attack—and it doesn’t even require wearing a foil hat.

  • The Cyber Security Carousel Requires Protection Before, During and AfterOverview

    Cyber security is like a carousel: it has a lot of ups and downs and rounds and rounds. And when plotting defense against today’s modern cyber threats, it’s imperative to plan for the before, during and after.

  • The Importance of Performance for Mitigating DDoS AttacksOverview

    DDoS attacks are devastating because of their large-scale impact. The large botnets send tenacious service requests and a high number of large data packets, all with the goal to render a service unavailable. The scale of traffic volume or service requests requires a defense solution with a lot of horsepower to analyze the voluminous traffic and take appropriate action. That said, it is important to validate your solution's performance in your own environment to ensure predictable operations in the real world. in this video A10 Networks and Ixia discuss the importance of performance for mitigating DDoS attacks.

  • The Rise of Multi-Vector DDoS AttacksOverview

    DDoS attacks have evolved into bigger, more frequent, and more devastating multi-vector DDoS attacks. Most enterprises have existing DDoS security solutions that are unable to handle the volume and complexity of multi-vector DDoS attacks effectively and affordably.

Back to top

Cloud & Networking

  • Cloud Bursting with A10 Lightning ADSOverview

    This video demonstrates cloud bursting with A10 Lightning ADS. With cloud bursting in A10 Lightning ADS, you can leverage AWS to dynamically add capacity in the cloud for applications deployed in the data center.

  • Cutting Through the Cloud ConfusionOverview

    A10 Networks Cloud Vice President Kamal Anand examines the benefits of cloud computing: cloud delivers elastic scalability, automation and self-service capabilities in a consumption-based business model.

  • Ditch the Duct Tape -- Bridge Your Data Centers and CloudsOverview

    A10 Networks Vice President of Worldwide Marketing Neil Wu Becker discusses how to control and manage secure applications services between data centers and the cloud.

  • High Performance 100 Gigabit Data Centers with DDoS ProtectionOverview

    The importance of Data Center availability and use of dynamic, on-demand applications is defining the very competitive nature of every company. Network operations is responding to this surge in technological change and flexibility by virtualizing their compute, storage and networking layers, and upgrading their infrastructures through high-speed 100GbE connections. At these speeds the risks from a security misstep are larger than ever—join this webinar event to hear about mitigating steps available to avoid unnecessary trouble as you move from 10GbE to 40GbE and to 100GbE secure networking.

  • Last Year's Security Won't Hack It: Planning for Perfect Forward Secrecy, Web Attack Protection, and DDoS MitigationOverview

    The Edward Snowden revelations have turned Internet security on its head. Now, organizations of all sizes are clamoring to prove they protect end users by implementing the most stringent encryption available: elliptic curve cryptography (ECC). Besides bolstering encryption standards, organizations must contend with other growing threats, like Distributed Denial of Service (DDoS) and web application attacks.

    Attend this webinar to learn:

    • Why elliptic curve ciphers improve security
    • Best practices for implementing ECC with ECDHE cipher suites without killing performance
    • Next generation DDoS attacks and mitigation strategies
    • Why attackers have focused their attention on Content Management Systems (CMS) and how you can shield your website from attack

    Join Jim Metzler, author and authority on network technology, and Kasey Cross, security evangelist at A10 Networks, to learn the steps you need to take to protect your applications and your network.

  • Programmable L4-L7 Application Networking Services - must have for Cloud IaaSOverview

    Programmable L4-L7 Application Networking Services - must have for Cloud IaaS
    Cloud IaaS delivers vastly greater business agility, service provisioning times, and economics. Cloud IaaS requires that underlying infrastructure be automated and scalable to build an on-demand delivery model providing dynamic and consistent services in a shared, multi-tenant environment. In order to do so, it is critically important that a seamless integration of application networking services with other data center infrastructure is needed to deliver dynamic L4-7 services and automated policy enforcement for service- level agreements (SLAs) and compliance in a shared, multi-tenant environment. 

    In this session you will learn how Integration with centralized orchestration systems with flexible RESTful APIs ensure accurate and unified configuration of network application services reducing manual configuration tasks and speeding time to implementation.

  • The Divine Difference Between Cloud-Native and Cloud-ReadyOverview

    A10 Networks Regional Vice President Susan Ellis shares the disparity between cloud-native and cloud-ready.

  • Uncover Cyber Threats in SSL Traffic and Scale Network SecurityOverview

    Attackers can leverage encryption to conceal their exploits and evade detection. A10 Networks and FireEye have partnered to provide full visibility into SSL encrypted traffic.

    • Attend this webinar and learn how you can:
    • Eliminate the blind spot in your corporate defenses with SSL Intercept
    • Prevent data breaches by detecting advanced threats
    • Maximize uptime with load balancing
    • Scale performance to successfully counter cyber attacks
    • Optimize performance of FireEye deployments with traffic filtering

    Join Kasey Cross, Product Marketing at A10 Networks, and Ruby Sharma, World Wide Strategic Alliances at FireEye, to understand today's most dangerous threats and the risks imposed by SSL encryption. Then find out how A10 Thunder ADC can intercept SSL communications and how the FireEye Threat Prevention Platform can detect and stop advanced cyber attacks.

Back to top