Mumbai: A10 Networks said it has enhanced its security solutions with Zero Trust approach to help customers drive their Zero Trust strategies.
Zero Trust eliminates implicit trust from IT systems, and is embodied by the maxim ‘never trust, always verify.’ It recognises that internal and external threats are pervasive, and the de-facto elimination of the traditional network perimeter requires a different security approach.
Every device, user, network, and application flow should be checked to remove excessive access privileges and other potential threat vectors.
Multi-layered protection should incorporate controls, from i) foundational visibility into encrypted traffic streams to stop infiltration from ransomware, malware, and other common attacks, ii) application workload protection through segmentation and advanced user authorisation and verification, and iii) sustainable user training in best practices to minimize risky behaviours.
Zero Trust has become a major initiative for many organisations. As per Gartner “the term “zero trust” has value as a shorthand way of describing a paradigm where implicit trust is removed from all computing infrastructures.
Implicit trust is replaced with explicitly calculated, real-time adaptive trust levels for just-in-time, just-enough access to enterprise resources.
Modernize Network Security for Zero Trust
A10 has made enhancements to its security and infrastructure solutions to strengthen Zero Trust architectures for digital resiliency.
- Infiltration visibility and protection – network and end-point infiltration visibility and prevention are foundational in protecting against encrypted ransomware, malware, and other malicious activities. Augmented TLS/SSL inspection management and deployment capabilities are available to aid in operationalizing visibility.
- Automated DDoS protection – application workload and infrastructure protection from escalating IoT, botnet and amplification threats with Zero-day Attack Pattern Recognition, using artificial intelligence/machine learning (AI/ML) technologies and new packet watermarking effectively mitigate malicious and unauthorized access.
- Granular operational micro-segmentation – network and infrastructure segmentation isolates flows and processes to reduce the attack surface and lateral movement. The A10 Thunder Multi-tenant Virtual Platform (MVP) on Dell Technologies provides strongly isolated instances, in addition to application delivery partitions (ADPs), efficient containerized instances, and other options to achieve operational isolation.
- Advanced user authorisation and verification – user workload access protection prevents unauthorised and bot access with stronger identity access management (IAM) via multi-factor authentication (MFA) and new CAPTCHA capabilities now common on consumer websites. Organizations can use application delivery capabilities as a bastion host, for external and internal users, to provide identity-based and context-based Zero Trust Network Access (ZTNA) policies with specific enforced access rather than full network or tunnel VPN access.
- Real-time observability and central management – oversight into operational status and the ability to apply policy across multiple environments, including public, private and hybrid cloud infrastructures, reduce incident response times, human error, and complexity. Centralized analytics and management enhancements in A10 Harmony Controller apps include new IP tracing, granular access controls (RBAC), and more application usage views.
A10 Networks solutions, as part of a strong Zero Trust architecture, help security teams eliminate unnecessary risk and become more efficient.
Threat actors exploit default configurations, encrypted traffic, excessive privileges, lack of micro-segmentation and emerging attack vectors. Customers in service provider and enterprise markets adopt A10 NetworkS solutions.
“Customers are facing unprecedented increases in both threats and vulnerabilities along with a critical shortage of cybersecurity professionals,” said Dhrupad Trivedi, President and CEO – A10 Networks.
“Now with threats crossing over into the physical domain, it is more critical than ever before to ensure safety, security and compliance,” added Trivedi.
“Service providers and enterprises are modernizing their security approaches as recommended by the Zero Trust security model to ensure digital resilience and successful business outcomes,” concluded Trivedi.