sb-nz logo
Story image

A10 Networks extends cloud portfolio with new container-based solutions

11 Jun 2019

A10 Networks has announced a cloud-ready, lightweight set of container-based solutions to provide secure application services. They offer the industry’s highest performing container solutions with up to 200 Gbps of throughput for A10 Networks’ Thunder Application Delivery Controller (ADC), Carrier-Grade Networking (CGN), and Convergent Firewall (CFW) solutions.

The addition of Thunder Containers extends the company’s multi-cloud portfolio and increases the performance, security and availability of applications, enabling customers to confidently run their critical workloads in multi-cloud environments at hyperscale. Customers can meet the increased traffic demands while maintaining predictable service levels when deploying applications in multiple geographic locations and across public and private clouds.

Enterprises today are leveraging almost five clouds for their application infrastructure. Multiple disparate environments to manage, on top of inherent application complexity, make deploying applications more complex. Organisations need efficient, agile and high-performance solutions that also provide centralised management and analytics across the entire application infrastructure.

Agile, Cloud-Native Application Infrastructures

A10 Networks Thunder Containers-based solutions can help solve many issues faced by organisations today. The addition of a container-based solution to the A10 Networks’ portfolio helps support a mix of application architectures, from traditional monolithic to distributed microservices, with the same code, the same management all-inclusive API and the same feature-set to help organisations combine new and legacy services for more agile infrastructures.

In addition, it can eliminate the struggle between NetOps/SecOps and DevOps with unified and consistent application, feature-set and policy control across the traditional data centre and multi-cloud environments.

 “With the new Thunder Containers, we are delivering to the market the highest performance load balancing, firewall and carrier-grade NAT (CGNAT) solutions for a very complex multi-cloud world. We are extending our portfolio across traditional, virtual and microservices form factors, giving customers a unified solution to ensure agile and scalable infrastructures. And seamless integration with A10 Harmony Controller gives customers visibility and centralised management for consistent operations and security across multi-cloud environments,” said A10 Networks CTO Raj Jalan.

Thunder Containers is also supported with Kubernetes. The highly portable solution is supported on standard Intel x86 servers and can be deployed across the largest cloud providers, including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), as well as private data centres, allowing businesses to benefit from agility, flexibility and security. Combined with the unique FlexPool licensing model, customers can aggregate capacity for flexible allocation and redistribution of resources for applications running in the cloud.

Story image
Video: 10 Minute IT Jams - Who is Bitglass?
Today, Techday speaks to Bitglass senior director of marketing Jonathan Andresen, who discusses insider attacks and the best solutions and practices to employ to protect organisations and employees.More
Story image
Microsoft brings endpoint & Azure security under Microsoft Defender
Microsoft Defender brings Microsoft 365 Defender and Azure Defender under the same umbrella.More
Story image
Video: 10 Minute IT Jams - Who is CrowdStrike?
Today, Techday speaks to CrowdStrike ANZ channel director Luke Francis about the company's key products and offerings, its upcoming annual security conference, and the infrastructure it leverages in the A/NZ region.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Link image
Track, analyse, act: The e-commerce metrics you need
E-commerce technology leaders need to track, analyze, and act on large volumes of business and system performance data. Danny Miles, the CTO of Dollar Shave Club, shares a powerful framework for thinking about and prioritizing e-commerce metrics.More