• Advanced Core Operating SystemOverview

    Discover how A10 Networks' ACOS is increasingly the platform of choice for enterprises, service providers, Web giants and government organizations seeking to optimize the performance and security of their data center applications and networks.

Back to top

Application Acceleration and Server Load Balancing

  • A10 Helps Microsoft Disrupt Notorious ZeroAccess BotnetOverview

    On The Whiteboard editor Pamela Woon talks to the Digital Crimes Unit who fights organized crime on the Internet.

  • A10 Networks Acquires Appcito: Kamal Anand, Founder & CEO, Appcito Overview

    Appcito co-founder and CEO Kamal Anand discusses Appcito being acquired by A10 Networks and how it helps expedite the vision of secure application delivery in the cloud.

  • A10 Networks Acquires Appcito: Kishore Inampudi, Director of Product Management, A10 Networks Overview

    A10 Networks director of product management Kishore Inampudi discusses the company’s cloud strategy, industry challenges and how organizations can accelerate their business to not only be cloud-ready, but cloud-native. This is achieved by bridging traditional data centers with modern cloud environments.

  • A10 Networks Acquires Appcito: Lee Chen, Founder & CEO, A10 NetworksOverview

    A10 Networks founder and CEO Lee Chen discusses the acquisition of Appcito, a secure, cloud-based application delivery expert. The acquisition accelerates A10’s delivery of the A10 Harmony Cloud solution across data centers and public, private or hybrid clouds.

  • aXAPI: REST-based Application Programming Interface (API)Overview

    The aXAPI is a REST-based Application Programming Interface (API) enabling remote interaction from third-party applications to control an A10 Networks AX Series server load balancer.


  • Case Study: Tremor Video selects A10 next-gen ADC for present and future scalability requirementsOverview

    Tremor Videos' Senior Director of Systems Engineering, Presley Acuna, shares why A10 Networks was selected to meet their high-volume video advertising demands. Their need to consolidate disparate platforms that meet current and anticipated performance requirement was met. And A10's world class support team provided Tremor Video with the necessary tools from beginning to end for a quick and efficient deployment.

  • Global Server Load Balancing (GSLB)Overview

    A10 Networks Systems Engineer, Todd Harcourt, presents an overview to Global Server Load Balancing and how A10 Networks can help manage traffic to multiple geographic sites and also provide disaster recovery for a backup site.


  • Introducing The AX 3030 Application Delivery ControllerOverview

    A10 Networks introduces the AX 3030, a new 1U appliance in our AX Series Application Delivery Controller family that lowers the barrier to entry for 10 gigabit connectivity. 


  • Introduction to the AX Series aFleX Scripting ToolOverview

    The AX Series aFleX scripting tool enables advanced, highly-flexible and efficient Layer 7 traffic management. aFleX technology is based on the industry-standard TCL programming language. aFleXs do not introduce performance degradation, even when numerous features are turned on, due to AXs scalable Advanced Core Operating System (ACOS) architecture that is tuned for multi-core CPUs.


  • Micron 21 chose A10 Networks ADCs for their flexibility and performanceOverview

    Micron21’s data centre in Melbourne, Australia, is home to thousands of clients representing hundreds of thousands of Internet websites and cloud services, including local, national and international businesses and government agencies.

    When Micron21 began searching for a more effective load-balancing solution, the chosen technology needed to meet extremely high standards. Micron 21 chose A10 Networks ADCs for their flexibility and performance, with a capability of running 20 gigabits worth of load balance performance per device.

  • The AX 1030 Application Delivery ControllerOverview

    A10 Networks introduces the AX 1030, a high-performance entry level Application Delivery Controller in our AX Series family.

  • The AX 3200-12 Application Delivery ControllerOverview

    A10 Networks' AX 3200-12 delivers high performance and network attack protection in a mid-range Application Delivery Controller.

  • The AX 3400 Application Delivery ControllerOverview

    A10 Networks' AX 3400 delivers exceptional performance and network attack protection in a mid-range Application Delivery Controller, previously available only in the high end ADC market.


  • The AX 5200-11 Application Delivery ControllerOverview

    A10 Networks introduces the AX 5200-11, the world's fastest Application Delivery Controller, the new high-end model in our AX Series family.

  • Virtual Chassis Solution for Application DeliveryOverview

    The AX Virtual Chassis System (aVCS) allows our customer to have a single point of management for up to eight AX Series devices and increases the total aggregate throughput within a virtual chassis system.

  • Yahoo! JAPAN Selects A10 Thunder ADC for Fast, Reliable Streaming VideoOverview

    Leading technology company installs A10 Thunder Application Delivery Controllers for video delivery service GYAO Corporation! To meet the fast-growing demand for HD video streaming, GYAO! needed scalable network infrastructure that could handle traffic peaks exceeding 800 Gbps. By implementing A10’s next-generation Thunder ADC solution, GYAO! improved its video streaming performance while achieving major savings: 80 percent lower cost per port.

Back to top

Cyber Security / DDoS Protection

  • A Security Detail for 5G and Mobile ThreatsOverview

    Mobile security is serious business, especially as carriers prepare for the avalanche of connected devices expected as they transition from 4G to 5G.

  • A10 and Cisco SSL Traffic Inspection Solution Video Sponsored by Cisco SecurityOverview

    To detect and stop cyber attacks, Cisco customers must be able to inspect all traffic, including encrypted traffic. This video, sponsored by Cisco Security, shows how A10 Thunder SSLi intercepts SSL traffic and sends it unencrypted to Cisco FirePOWER or Cisco ASA platforms for inspection and attack prevention.

  • Case Study: C4L defends against DDoS attacks with A10 Networks Thunder TPSOverview

    C4L, a data center colocation and connectivity solutions provider, selected the A10 Networks Thunder TPS Threat Protection Systems to mitigate sophisticated distributed denial of service (DDoS) attacks and improve service availability. C4L will also use the A10 Thunder TPS platform to launch a new set of services, delivering additional DDoS protection for clients across its 300 network-connected locations.

  • Fidelis Cybersecurity Partnership Brings Visibility to the Largest Network Blind SpotOverview

    In this video, Gunter Reiss, A10 Vice President of Strategic Alliances, and Kurt Bertone, Fidelis Cybersecurity Chief Technology Officer, discuss how A10 and Fidelis collaborate to help customers gain visibility into encrypted network traffic to root out any threats that may have previously gone unnoticed.

  • Find out how A10 helps solve today's encryption challengesOverview

    Internet users have security and privacy concerns which is compelling more website owners to encrypt application traffic. While corporations encrypt more and more traffic, it is creating a blind spot in corporate networks. 

  • Get Smart and Smarter About Cyber Security with A10 at RSA 2017Overview

    When it comes to cyber security, the bad guys hope their victims are “Dumb and Dumber.” In this video, our special guest, A10 Director of Cyber Operations Dr. Chase Cunningham, discusses some ways you can get smart about security at RSA Conference 2017.

  • Investigating Mirai: Inside the Malware Responsible for Global IoT Botnets and Massive DDoS AttacksOverview

    When it comes to cyber security, the bad guys hope their victims are “Dumb and Dumber.” In this video, our special guest, A10 Director of Cyber Operations Dr. Chase Cunningham, discusses some ways you can get smart about security at RSA Conference 2017.

  • Looking for the Perfect Holiday Gift for Your CSO?Overview

    CSOs are often the unsung hero of your organization. It’s their duty to keep your organization secure from threats, and it’s a job that often goes without thanks. This year, show your CSO some appreciation. Need ideas? Don’t panic; we’ve got you covered. Here, A10 Networks Director of Cyber Operations Dr. Chase Cunningham highlights the three (one practical, and two unconventional) holiday gift ideas for CSOs.

  • Simple Steps to Protect Yourself from the IoT DDoS InvasionOverview

    A recent rash of distributed denial of service (DDoS) attacks have been carried out by threat actors creating botnets using Internet of Things (IoT) devices. Here, A10 Networks Director of Cyber Operations Chase Cunningham shares a few simple precautions you can take to prevent IoT devices from being used in an attack—and it doesn’t even require wearing a foil hat.

  • The Cyber Security Carousel Requires Protection Before, During and AfterOverview

    Cyber security is like a carousel: it has a lot of ups and downs and rounds and rounds. And when plotting defense against today’s modern cyber threats, it’s imperative to plan for the before, during and after.

  • The Importance of Performance for Mitigating DDoS AttacksOverview

    DDoS attacks are devastating because of their large-scale impact. The large botnets send tenacious service requests and a high number of large data packets, all with the goal to render a service unavailable. The scale of traffic volume or service requests requires a defense solution with a lot of horsepower to analyze the voluminous traffic and take appropriate action. That said, it is important to validate your solution's performance in your own environment to ensure predictable operations in the real world. in this video A10 Networks and Ixia discuss the importance of performance for mitigating DDoS attacks.

  • The Rise of Multi-Vector DDoS AttacksOverview

    DDoS attacks have evolved into bigger, more frequent, and more devastating multi-vector DDoS attacks. Most enterprises have existing DDoS security solutions that are unable to handle the volume and complexity of multi-vector DDoS attacks effectively and affordably.

Back to top