Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SAN JOSE, CA -- (Marketwired) -- 10/14/14 -- A10 Networks (NYSE: ATEN), a technology leader in application networking, unveiled the A10 Security Alliance, an ecosystem of leading security and networking companies that are working together to help mitigate threats and automate security operations. By validating interoperability with products from leading security vendors, the A10 Security Alliance has developed specialized solutions for data centers that deliver critical best-of-breed security capabilities required to detect and eliminate advanced threats, lower data breach expenses, and reduce the cost of security operations.
The A10 Security Alliance empowers organizations to solve today's top security challenges with integrated and tested solutions. A10 Thunder Series products, in conjunction with A10 Security Alliance members' products, offer solutions covering SSL visibility to detect advanced threats, authentication for federated security and single-sign-on, automated SSL certificate management and protection, threat and URL intelligence for effective policy decisions, and more.
"To combat cyber threats, organizations must develop an integrated defense that incorporates attack protection, forensics, authentication, visibility, and more," said Raj Jalan, Chief Technology Officer at A10 Networks. "The A10 Security Alliance provides an ecosystem of validated and integrated solutions that helps our customers architect secure data centers and improve efficiency."
Highlights include:
Resources
For additional information, please visit www.a10networks.com/securityalliance.
Supporting Quotes from A10 Security Alliance Members
RSA
"RSA has collaborated with A10 Networks to deliver two-factor authentication and to provide SSL visibility to RSA customers," said Jim Ducharme, Vice President of Engineering and Product Management, RSA The Security Division of EMC. "By integrating with RSA® Authentication Manager, A10's application delivery controllers can offload CPU intensive authentication processing and help prevent unauthorized access to applications, while A10's SSL Intercept technology is engineered to enable RSA® Security Analytics' customers to inspect SSL traffic for complete network visibility."
Arista
"Arista's EOS (Extensible Operating System) and 10/40/100 GbE cloud networking solutions combined with A10's scalable application delivery and DDoS protection products, offer customers a software-driven, integrated network architecture," said Ed Chapman, Vice President of Business Development, for Arista Networks.
FireEye
"To eliminate zero-day exploits and advanced targeted attacks, FireEye customers must have complete visibility into all traffic, including encrypted traffic," said Ruby Sharma, Senior Manager of World Wide Strategic Alliances at FireEye, Inc. "FireEye has partnered with A10 Networks to eliminate the SSL blind spot in corporate defenses and scale network security. As a member of the A10 Security Alliance, FireEye can demonstrate interoperability between the FireEye Threat Prevention Platform and A10 Thunder ADC."
FlowTraq
"FlowTraq has selected A10 Networks to take our network traffic security capabilities one step further," said Dr. Vincent Berk, CEO of FlowTraq. "When FlowTraq detects that your critical services are under attack, FlowTraq informs the A10 Networks Thunder TPS device through its API of the attack type and the intended target. Thunder TPS then redirects the malicious traffic to itself, and forwards the cleaned traffic back in the network."
IBM Security
"Organizations rely on QRadar Incident Forensics to retrace security events and discover what happened when and how. To investigate incidents, our customers must have full visibility into all network traffic, including SSL traffic," said Kevin Skapinetz, Director of Strategy and Product Marketing, IBM Security. "IBM Security has collaborated with A10 Networks to provide a validated solution for SSL inspection and incident forensics. Working together, IBM and A10 are helping to deliver the solutions required to combat today's advanced threats."
Ping Identity
"Data breaches are putting businesses in real danger, and at the same time cloud services and mobility are redefining what identity security is and how it is achieved," said Patrick Harding, CTO, Ping Identity. "We are pleased to be a member of the A10 Security Alliance, which brings together important technologies to secure datacenter environments in the enterprise and infrastructure-as-a-service."
Pulse Secure (recently formed independent company from the acquisition of the Junos Pulse business from Juniper Networks)
"Our customers need to deliver persistent, uninterrupted access to resources to mobile users," said Jeff Green, Pulse Secure senior vice president of product development and customer service. "A10's load balancing and high-availability capabilities combined with our secure mobility solutions delivers a scalable SSL VPN solution, allowing customers to increase the overall capacity and reliability of their mobile infrastructure."
Symantec
"Organizations rely on Symantec's SSL certificates to protect information and assure customers of their authenticity," said Tom Powledge, vice president, Information Security at Symantec. "Through the integration of our Certificate Intelligence Center and A10, we are pleased to now provide support to A10's rapidly growing customer base with Symantec's best-in-class SSL services to help increase operational efficiency, maintain business continuity, and mitigate security and non-compliance risks."
Vectra
"We are pleased to join the A10 Security Alliance and further the joint development and integration from our relationship with A10 Networks," said Mike Banic, VP of Marketing at Vectra Networks. "Program membership validates our combined solution so customers can improve their ability to detect any phase of an attack on their networks, including attacks hidden in SSL traffic. Being part of this program also enables joint sharing of APIs and continued development on future offerings around detection and blocking of attacks for customers."
Venafi
"The new A10 Security Alliance offers enterprise customers an ecosystem of leading security systems that were tested for interoperability," said Kevin Bocek, VP of Security Strategy and Threat Intelligence of Venafi. "Venafi is pleased to join the Security Alliance as a member of the partnership. This aligns well with our mission of securing and protecting our customers' keys and certificates so that they can't be used in cyber attacks by criminals and nefarious actors."
Webroot
"We are excited to join the A10 Security Alliance and offer joint customers an integrated solution for SSL inspection and web classification," said Scott Merkle, vice president of enterprise and OEM sales at Webroot. "Webroot BrightCloud Security Services, combined with A10 Thunder ADC, enable organizations to intercept and inspect SSL traffic while satisfying compliance and privacy requirements."
About A10 Networks
A10 Networks (NYSE: ATEN) is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: http://www.a10networks.com
A10 Networks, A10 Thunder, vThunder, ACOS, aCloud, aFleX, aXAPI, aVCS, Virtual Chassis, SoftAX, and aFlow are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. RSA is either a registered trademark or trademark of EMC Corporation in the United States and/or other countries. All other trademarks are property of their respective owners.
Contact
Karen Richardson
A10 Networks
408-592-4663
karenr@a10networks.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs