Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SAN JOSE, CA -- (Marketwired) -- 06/09/15 -- A10 Networks (NYSE: ATEN), a technology leader in application networking, today announced it has partnered with cyber security software developer ThreatSTOP to deliver the A10 Threat Intelligence Service. The new A10 Threat Intelligence Service augments the application security portfolio of A10's Thunder ADC and TPS products to protect customer applications and users from cyber threats, including outside-in and inside-out attacks. A10 has gained a high-quality intelligence feed via ThreatSTOP's advanced threat monitoring and mitigation platform to provide customers with a dynamic, near real-time intelligence feed that prevents data theft, reduces network load and minimizes attack surface.
Cyber attacks are very difficult to identify as both attack methods and source locations vary greatly, and on-premise security solutions cannot take investigative action until organizations have been struck by malicious traffic. Identifying threats not only requires prolonged exposure to the threat, but also significant computing and extensive personnel resources to analyze correctly.
The A10 Threat Intelligence Service combines and enhances reputation data from over three dozen security intelligence sources, including DShield, abuse.ch, and Shadowserver, to enable A10's Thunder ADC and TPS to instantly recognize and block traffic from known attack sources.
A10's Threat Intelligence Service provides the following benefits:
With a Threat Intelligence network that continuously charts potential intruders on the Internet, customers can leverage global knowledge to block traffic from malicious Internet locations and offload existing security infrastructures from identifying known bots and attack sources. The A10 Threat Intelligence Service additionally catches security threats that customers' existing defenses may not be designed for, such as spam or phishing sources, or attacks a device simply is not configured for.
"Our goal is to enable our customers to deliver an amazing application experience that is not only fast, always on and personalized, but also safe and secure," said Sanjay Kapoor, VP of global marketing at A10 Networks. "When it comes to network security, more knowledge equals more power and proactively blocking connections from known attackers prevents our customers from becoming cyber victims. We selected ThreatSTOP because of its experience and track record in delivering effective feeds and, as a result, have significantly enhanced our threat smart solutions."
A10 Threat Intelligence Service features include:
"ThreatSTOP gathers data about active command and control systems, and the bots under their control, as well as improperly provisioned third-party hosts that are abused to amplify attacks, and makes it actionable in a timely way," said ThreatSTOP CEO and Founder Tom Byrnes. "This large and rapidly changing list of malicious network infrastructure is a perfect match to apply to A10 Networks Thunder ADC and TPS systems due to their capacity and scalability."
Availability
A10 Networks' Threat Intelligence Service is available for Thunder ADC and Thunder TPS product lines in Q3 2015.
About A10 Networks
A10 Networks (NYSE: ATEN) is a leader in application networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit a10networks.com and @A10Networks
The A10 logo, A10 Networks, and A10 Thunder, are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners.
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs