Story image

A10 Networks outlines 5G strategy

22 Nov 2018

Automated cybersecurity solutions provider A10 Networks, today outlined its strategy, solutions, and roadmap to help mobile carriers futureproof their networks for the coming wave of 5G and the demanding new applications, including enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communications (URLLC), and Massive Machine Type Communications (MMTC), it will enable.

A10 has production and pilot 5G deployments with tier-1 carriers worldwide, and is working with others to plan for their future 5G initiatives.

A10 addresses critical 5G requirements for security, reliability and performance through consolidated solutions, which result in lower latency, high reliability and lower TCO.

A10 Networks founder and CEO Lee Chen says, “We understand the challenges network operators are facing and have invested in solving these challenges.” “

We have partnered with key technology providers and developed a comprehensive roadmap to address 5G challenges.”

A10’s solutions address existing and emerging mobile network architecture requirements for consolidated services, greater scale, and lower latency communications across the Gi-LAN, virtualised EPC, and Multi-access Edge Computing (MEC) environments. A10 solutions also provide full-spectrum security and visibility for the control and user plane operations.

A10 provides a strategy for mobile service providers to deploy 5G Non-Standalone (NSA) or Standalone (SA) solution:

  • 4G to 5G standard compatibility and investment protection: A10 supports existing 4G and 3G network architectures and use cases for the Gi-LAN and EPC, while meeting the more demanding requirements for 5G emerging architectures. These solutions can be deployed in today’s infrastructure, but are future proofed for successful 5G deployments. This includes functional consolidation for application visibility and control, subscriber-aware intelligent traffic steering, Gi/SGi firewall with Carrier-Grade NAT (CGNAT), GTP/SCTP firewall, integrated DDoS, and more.  
  • Scale for increased subscriber demand: 5G demands are inherently different than 4G, with smaller packet sizes, more throughput, and higher concurrent session counts observed. A10 solutions can scale concurrent sessions to multi-billion levels and throughput to multi-terabit levels in a scale-out cluster.  5G deployments can benefit from compact and efficient options, for example, 220 Gbps in 1RU PNFs, or high performance 100 Gbps VNFs.   
  • Core infrastructure security: With new user plane and control plane security requirements coupled with the increased attack surface and scale brought by 5G and IoT device proliferation, more advanced, scalable and automated approaches are needed for 5G networks.  
  • To guarantee uptime, and ensure control and user plane security, components include GTP firewall, Gi/SGi firewall, control and user plane policy enforcement, DNS protection, security proxies (SEPP), and more.  
  • Additionally, A10’s advanced 5G DDoS Protection solution includes artificial intelligence (AI) and machine learning (ML) via Dynamic Attack Pattern Recognition (DAPR), continuous baselining, and One-DDoS for distributed intelligence, for full visibility into all packets, versus traditional sample-based only solutions.  
  • SDN/NFV for agile infrastructure: A10’s solutions can be delivered in a variety of form factors to meet the demands of the emerging SDN and NFV environments, for example. PNFs, VNFs, bare metal and containers.These solutions are integrated with leading SDN and NFV architectures and interoperate with multiple MANO environments for faster network rollout and optimised performance and agility. A10 also provides flexible software licensing and consumption via A10’s FlexPool subscription-based capacity pooling licensing.  
  • Orchestration and analytics for lower TCO and reduced downtime: A10’s Harmony Controller provides actionable intelligence to manage subscriber services, meet Law Enforcement Agency (LEA) mandates and compliance, and deliver per subscriber analytics. Harmony Controller provides visibility, management, orchestration and automation.  
  • Ecosystem partners for a broader solution: A10’s products integrate with multiple 3rd party solutions and vendors.  Ranging from DevOps tools, such as Ansible, to providers of 5G solutions such as Ericsson, NEC, Tech Mahindra, and Lenovo for a comprehensive eco-system. 
Forescout strengthens investment in OT security
Forescout’s latest features will provide enterprises with improved productivity, lower risk profiles and faster mitigation of threats.
Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.