|By Marketwired .||
|August 5, 2014 02:30 PM EDT||
SAN JOSE, CA -- (Marketwired) -- 08/05/14 -- A10 Networks (NYSE: ATEN) today announced that Symantec's Certificate Intelligence Center now supports A10 Thunder ADCs (application delivery controllers), providing customers with a consolidated and simplified method for managing critical security information such as location of certificates, key sizes, ciphers used and validity dates.
As more and more applications become web-based and require encryption, privacy for computing transactions, such as web sites, email and other applications, is now more top of mind than ever. Organizations are challenged to keep up with threats and evolving standards, and need real-time, aggregated data to continually assess and strengthen their security posture. A critical component of that is management and organization of digital certificates and their keys. Through its partnership with Symantec, A10 simplifies and consolidates key management, allowing customers to dramatically reduce the number of keys required by centralizing certificates for thousands of web servers, versus provisioning a certificate for each server directly. In addition, with the Symantec Certificate Intelligence Center integration, customers can gain real-time visibility of all certificates on all A10 devices in the network. Other benefits include expiration alerts to avoid disruption, optimizing certificate usage, eliminating gaps in security coverage, and reducing operational costs.
Symantec's Certificate Intelligence Center provides necessary visibility and reporting to ensure Thunder ADCs are using the latest standards supported, via the aXAPI integration and programmability. Emerging standards in SSL/TLS include:
- Key size migration status compliance from 1024- to 2048-bit keys
- Emerging use case of 4096-bit keys, one certificate authority reported this accounted for 20%
- New standards such as Perfect Forward Secrecy (PFS) and ECDHE are being demanded to ensure future compromise encrypted traffic cannot be achieved in the wake of the revelations of the Edward Snowden and NSA incident
"Together A10 and Symantec provide a complete view of an organizations' digital certificates and keys, enabling efficient operation, user confidence, and ultimately brand reputation," said Jason Matlof, A10 vice president of marketing. "We are very happy to be working with a leader like Symantec to make it easier for our customers to keep their infrastructures up to date and secured."
"Organizations rely on Symantec's SSL certificates to protect information and assure customers of their authenticity," said Tom Powledge, vice president, Information Security at Symantec. "Through the integration of our Certificate Intelligence Center and A10, we are pleased to now provide support to A10's rapidly growing customer base with Symantec's best-in-class SSL services to help increase operational efficiency, maintain business continuity, and mitigate security and non-compliance risks."
About A10 Thunder ADCs
A10 Thunder ADC product line of high-performance, next-generation application delivery controllers enables customers' applications to be highly available, accelerated and secure. Thunder ADC is our premier ADC product line, delivering performance scalability up to 150 Gbps, the broadest range of form factors (physical, virtual and hybrid), and expanded system resources designed to support future feature needs. The A10 Thunder ADC product line is built upon A10's Advanced Core Operating System (ACOS®) platform, with our Symmetric Scalable Multi-Core Processing (SSMP) software architecture that delivers high performance and a range of deployment options for dedicated, hosted or cloud data centers.
About A10 Networks
A10 Networks (NYSE: ATEN) is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: http://www.a10networks.com
A10 Networks, A10 Thunder, vThunder, ACOS, aCloud, aFleX, aXAPI, aVCS, Virtual Chassis, SoftAX, and aFlow are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Dec. 5, 2016 04:00 AM EST Reads: 5,389
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Dec. 5, 2016 04:00 AM EST Reads: 5,018
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera M...
Dec. 5, 2016 04:00 AM EST Reads: 5,159
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Dec. 5, 2016 04:00 AM EST Reads: 4,642
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 03:30 AM EST Reads: 922
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 03:30 AM EST Reads: 613
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 5, 2016 01:30 AM EST Reads: 734
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Dec. 5, 2016 01:00 AM EST Reads: 3,325
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 5, 2016 12:45 AM EST Reads: 1,566
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 5, 2016 12:45 AM EST Reads: 1,805
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Dec. 5, 2016 12:30 AM EST Reads: 6,079
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 5, 2016 12:15 AM EST Reads: 3,814
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 5, 2016 12:15 AM EST Reads: 1,158
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 11:45 PM EST Reads: 917
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Dec. 4, 2016 10:45 PM EST Reads: 1,670