Wednesday, December 14, 2016

Top 5 Requirements for Cloud-Native Application Traffic Management & Security

Are your applications reaping the full benefits of your cloud deployments? Can any application delivery solution handle cloud-native workloads?

Join A10 Networks Vice President of Cloud Services, Kamal Anand, for an exclusive webinar that will unveil modern strategies for managing application performance and security across cloud environments.

Kamal Anand, VP & GM, Cloud Services and Neil Wu Becker, Vice President of Worldwide Marketing and Communications

8am PST / 11am EST / 4pm GMT
1pm PST / 4pm EST


5 Threats Hiding in Your SSL Traffic

Description: In this webinar we will discuss:

  • What are the drivers for the massive growth in encrypted traffic?
  • Learn about five attacks that hide in SSL traffic and are virtually impossible to detect without decryption
  • What are the solutions for uncovering hidden threats in encrypted traffic?

Please join us for a live presentation followed by Q&A.

A10 Networks and FlowTraq present: The Combat-ready Network: Building The Ultimate DDoS Defense Plan

IT security is a battlefield, and you’re in the trenches every day keeping the network – and the organization – running. But is your network truly combat-ready? Does your army have the most up-to-date weapons in its arsenal?

Join us for a webinar that discusses how the enemy has evolved and what defenses organizations need to put in place to ensure that they are prepared for virtually any attack.

We will take you through:

  • What’s at stake for your business
  • The types of attacks you can expect
  • The weapons you need to be prepared
  • The battle plan for a successful execution

Dynamic L4-L7 Services in BCF with A10 Thunder ADC

Presented by A10 Networks and Big Switch Networks

Vinay Mamidi (Sr. Product Manager) and Jeevan Sharma (Sr. Technical Marketing Engineer) at A10 Networks join Bala Ramachandran (Principal Product Manager) and Mostafa Mansour (Sr. Technical Marketing Engineer) from Big Switch Networks to discuss inserting dynamic L4-L7 services in Big Cloud Fabric. The webinar includes a demo show casing A10 Thunder ADC service for load balancing North-South and East-West traffic in the data center, as well as automated integration of A10 Thunder ADC and BCF using REST APIs.

High Performance 100 Gigabit Data Centers with DDoS Protection

The importance of Data Center availability and use of dynamic, on-demand applications is defining the very competitive nature of every company. Network operations is responding to this surge in technological change and flexibility by virtualizing their compute, storage and networking layers, and upgrading their infrastructures through high-speed 100GbE connections. At these speeds the risks from a security misstep are larger than ever—join this webinar event to hear about mitigating steps available to avoid unnecessary trouble as you move from 10GbE to 40GbE and to 100GbE secure networking.

IDG Presents: DDoS Myths and Realities

Join IDG Connect Principal Analyst, Bob Johnson, who will present 7 myths and how they don’t stand up to new findings from IDG industry survey. Get on top of this threat and avoid lost revenue and customers. Attendees will gain expert insight that can build a case for resetting priorities to address this important risk.

The session will cover common myths including:

  • DDoS is not a problem if the network is not down
  • DDoS attacks only happen at large scale with hundreds of gigabits
  • Firewalls protect against DDoS attacks
  • and more...

Last Year's Security Won't Hack It: Planning for Perfect Forward Secrecy, Web Attack Protection, and DDoS Mitigation

The Edward Snowden revelations have turned Internet security on its head. Now, organizations of all sizes are clamoring to prove they protect end users by implementing the most stringent encryption available: elliptic curve cryptography (ECC). Besides bolstering encryption standards, organizations must contend with other growing threats, like Distributed Denial of Service (DDoS) and web application attacks.

Attend this webinar to learn:

  • Why elliptic curve ciphers improve security
  • Best practices for implementing ECC with ECDHE cipher suites without killing performance
  • Next generation DDoS attacks and mitigation strategies
  • Why attackers have focused their attention on Content Management Systems (CMS) and how you can shield your website from attack

Join Jim Metzler, author and authority on network technology, and Kasey Cross, security evangelist at A10 Networks, to learn the steps you need to take to protect your applications and your network.

Next Generation DDoS Mitigation: Leveraging Hybrid On-Premise and Cloud Solutions

As distributed denial of service (DDoS) attacks become increasingly large and complex, most buyers looking to deploy DDoS mitigation begin their investigation by answering one simple question: Do I want to deploy DDoS mitigation products in my infrastructure or instead buy a hosted service? There are pros and cons to both approaches, and a new wave of offerings called hybrid DDoS mitigation solutions strive to combine the best aspects of on-premise and hosted mitigation to maximize security and uptime and minimize cost. This webinar discusses what hybrid DDoS mitigation solutions look like and how they work.

Who Should Attend: Individuals responsible for security solutions at large enterprises, SMBs, hosting service providers, data center operators and co-location providers, financial analysts and the media.

Key Topics for Discussion:

  • What types of DDoS attacks can be mitigated on premise, and when should you look to the cloud for protection?
  • How can you manage a hybrid on-premise/cloud solution?
  • What kinds of hybrid solutions are available today?
  • Answers to audience questions during live Q&A

Optimize SSL Certificate Management with Symantec and A10 Networks

Managing a secure SSL environment is getting complex. Recent industry standards and security vulnerabilities required IT to migrate from SHA-1 to SHA-2 hash algorithm, find alternatives for certificates with non-fully-qualified domain (FQDN) names and replace certificates impacted by the Heartbleed vulnerability. In addition, initiatives like Google’s "HTTPS everywhere" or always-on SSL on Google search may increase the deployment of SSL certificates in an organization. All these changes add to the challenges of managing SSL certificates. 

In the meantime, IT managers have to continue to provide optimal system performance to meet their users’ needs while staying within their budget. 

Attend this exclusive webinar to:

  • Discover recent changes and challenges with SSL certificate management
  • Learn how you can minimize time and resources in monitoring and managing SSL certificates with Symantec Certificate Intelligence Center (CIC)
  • Find out how you can optimize the performance of SSL encryption and decryption with the A10 Thunder Application Delivery Controller (ADC) from A10 Networks

Programmable L4-L7 Application Networking Services - must have for Cloud IaaS

Cloud IaaS delivers vastly greater business agility, service provisioning times, and economics. Cloud IaaS requires that underlying infrastructure be automated and scalable to build an on-demand delivery model providing dynamic and consistent services in a shared, multi-tenant environment. In order to do so, it is critically important that a seamless integration of application networking services with other data center infrastructure is needed to deliver dynamic L4-7 services and automated policy enforcement for service- level agreements (SLAs) and compliance in a shared, multi-tenant environment. 

In this session you will learn how Integration with centralized orchestration systems with flexible RESTful APIs ensure accurate and unified configuration of network application services reducing manual configuration tasks and speeding time to implementation.

Putting a Stop to Hidden Threats in SSL Traffic

Concerns about internet security and privacy in the wake of continued breaches and data thefts like the recent Sony attack, combined with the revelations of wide-scale spying by the NSA in the Snowden disclosures, has caused a massive spike in the volume of encrypted internet traffic. While encrypting traffic generally improves security posture, it also provides an opportunity for attackers to hide threats inside the SSL (Secure Sockets Layer) protocol, because most SSL traffic passes through security controls unchecked. This webinar looks at how attackers use SSL to disguise assaults and what enterprise security teams can do to thwart these threats.

Who Should Attend: Security professionals at small, medium and large enterprises, financial analysts, and the media.

Key Topics for Discussion:

  • What's causing the massive growth in encrypted traffic
  • Types of attacks hidden in SSL, and the damage they do
  • Solutions for inspecting SSL traffic and uncovering hidden threats
  • Real deployment cases
  • Answers to audience questions during live Q&A

Scalable DDoS Protection driven by SDN Monitoring Fabrics

Learn about a joint dynamic solution that leverages the power of A10 Threat Protection System (TPS) with Big Tap Monitoring Fabric, based on bare metal switching and SDN. The solution enables scalable traffic visibility, and rapid "mean time to mitigation" of network-wide DDoS attacks. The combined solution of Big Tap and Thunder TPS allows unmatched programmability and an unprecedented scale of your network defenses.

Securely Bridge Traditional & Cloud Application Environments

​You’re moving to the cloud. And microservices and container architecture are part of that. How do you effectively navigate the complexities of the cloud without abandoning your traditional data center?

​Watch our on-demand webinar to learn how to manage traditional data centers and cloud environments — together. This webinar will cover how to:

  • Reap the benefits of a cloud-native ADC
  • Bridge traditional data centers and cloud infrastructure
  • Deliver secure application services across multiple environments
  • Centrally manage any and all environments with a single multi-cloud controller

Neil Wu Becker, Vice President of Worldwide Marketing and Communications
Kamal Anand, Vice President, Cloud Business Unit

Service Chaining and SDN: Delivering Secure and Accelerated Infrastructure

Legacy data center network architectures are typically static, inflexible and manually provisioned, making them unsuitable for the scale and agility required of a cloud business model. Emerging cloud delivery models incorporate automated service provisioning in a virtualized, multi-tenant environment to achieve scale and agility. Dynamic service chaining is a critical component in building an on-demand model for consumption of L4-L7 application network services. In this session we will cover how dynamic service chaining is integrated into the SDN and cloud orchestration platforms to deliver a highly available, secure and accelerated infrastructure.

The Rise of Multi-vector DDoS Attacks

The DDoS attack spectrum has evolved into multi-vector attack campaigns, which are especially hard to mitigate. Cyber criminals leverage a vast arsenal of malicious tools with the intent to distract IT staff and maximize the impact of a DDoS attack. You will find out that legacy DDoS solutions fail to effectively address these rapidly changing attack strategies.

This Webinar will cover the following topics:

  • How DDoS attacks have evolved
  • Why multi-vector attacks are difficult to manage
  • Solutions for mitigating multi-vector DDoS attacks

Uncover Cyber Threats in SSL Traffic and Scale Network Security

Attackers can leverage encryption to conceal their exploits and evade detection. A10 Networks and FireEye have partnered to provide full visibility into SSL encrypted traffic.

Attend this webinar and learn how you can:

  • Eliminate the blind spot in your corporate defenses with SSL Intercept
  • Prevent data breaches by detecting advanced threats
  • Maximize uptime with load balancing
  • Scale performance to successfully counter cyber attacks
  • Optimize performance of FireEye deployments with traffic filtering

Join Kasey Cross, Product Marketing at A10 Networks, and Ruby Sharma, World Wide Strategic Alliances at FireEye, to understand today's most dangerous threats and the risks imposed by SSL encryption. Then find out how A10 Thunder ADC can intercept SSL communications and how the FireEye Threat Prevention Platform can detect and stop advanced cyber attacks.

Thursday, November 10, 2016

When Colossal DDoS Attacks Loom

​Join A10 Networks for an exclusive November 10th webinar that will recast the recent DDoS attacks that have soared past 600 Gbps. Plus, gain inside knowledge on how to identify and mitigate the colossal 1 Tbps attacks that will target organizations through 2017 and beyond.

  • Go inside the recent DDoS events, including the massive Brian Krebs attack
  • Explore evidence that supports growth and sophistication of DDoS attack vectors
  • Learn from the success and failure of other organizations
  • Get proven DDoS mitigation strategies from cybersecurity experts
  • Time: 8:00AM PDT / 11:00AM EDT / 4:00PM GMT/ 5:00PM CET
    Duration: 1 hour

Why Migrate Cisco Ace to A10 ADCs?

How to Replace Your Cisco ACE: Discover why A10 Thunder™ Unified Application Service Gateways (UASGs) and the AX Series Application Delivery Controllers (ADC) are the solution to upgrade your Cisco ACE.