• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Connected Devices most vulnerable to Cyber threats: A10 Networks


By VARINDIA - 2018-08-27
Connected Devices most vulnerable to Cyber threats: A10 Networks

In a chat with VARINDIA, Sanjai Gangadharan, Regional Director, SAARC, A10 Networks, speaks about the risks associated with connected devices, data analytics helping to understand the cyberattack, and how A10 Networks is securing its customers data

 

From April 2017 to January 2018, in India 22,207 Indian websites including 114 government websites were compromised, according to CERT-India. Cyberattacks are getting more and more sophisticated and it is becoming harder to identify for the existing defence mechanism. Identifying cyberthreats is a task that requires considerable exposure to the threat, and notable computing and extensive personnel resources to analyze correctly. Moreover, the trend of connected devices is even more complicating the security landscape, making the entire network vulnerable.  
 

Connected Networks and Threats


As the trend of connected devices is increasing every day, the risk of cyberthreats for these devices is also increasing. Internet of Things (IoT) attacks can be launched in both within and outside the network of the connected devices.   


“Internet of Things has changed the technology landscape drastically. Not just people, machines are also connected now. But there are grave security concerns connected with these connected devices, because IoT attacks can now be launched by infected devices both within and outside of the network. One should also consider the unique performance requirements and profile compositions that these devices have. IoT devices are widely being enslaved to mount increasingly devastating attacks. There is a flood of connected devices making their way into our homes and businesses. Every new device announcement adds more weapons to an already stocked arsenal of connected gadgets which hackers have at their disposal that they can weaponize and leverage to launch DDoS attacks. Hence, connected networks have a wider chance of being attacked through the multiple entry points for a malware. IoT attacks range much broader and can impact millions of connected devices in one go, including security controllers, resulting in scaling up of DDoS attacks,” explains Sanjai Gangadharan, Regional Director, SAARC, A10 Networks.     


One infected device can put the rest of the devices on hold, resulting in the network being crushed down. The outcome of an attack targeted at the connected device is huge and can spread rapidly.   


“With IoT-powered connected networks, the attack on one of the devices will trigger malfunction of the rest and will lead to the whole network being knocked down. When connected networks are attacked, the consequences are massive. The repercussions would spread across everything that’s required for our daily lives,” adds Sanjai.
 

Analytics in Cybersecurity


For a proactive defence strategy, analysis of the data generated during an attempted attack can give deeper insight. Granular analytics and visibility provides transparency to develop enhanced cybersecurity solution.  


“A massive amount of data is being generated during attempted attacks every day. This raw data can be utilized to draw insights and develop a proactively improved DDoS defences. Granular analytics and visibility also strengthen transparency and security measures to make the cybersecurity solution more robust,” says Sanjai.  


“A10 has created the DDoS Threat Intelligence Map which helps visualize the DDoS threat landscape and prepare for the potential DDoS attacks against the organization’s infrastructure. The existing threat maps are only indicative of the attacks that have already happened. A10’s DDoS map provides insights into where the next DDoS attacks will come from. Our Threat Intelligence Map gathers information from the attack attempts and previous attacks on the network and utilizes analytics tools to predict the potential attacks that may happen in the future.


However, like I said before, “Threat Intelligence Map is not a sole panacea to prevent DDoS attacks. If we have intelligence but cannot act on it, it is as good as useless. The effort from organizations should be to combine threat intelligence with modern DDoS mitigation solutions, like the A10 Thunder TPS, for a proactive DDoS defence strategy. DDoS mitigation solutions like these must be precise, automation-friendly and have scalability properties,” adds Sanjai.  

 

A10 Networks Securing Customers


Talking about how A10 Networks is helping organizations protect themselves from cyberthreats, Sanjai elaborates, “The A10 Networks Advanced Core Operating System (ACOS) is the cornerstone for all our solutions. It is one of our most superior switching software helping us deliver futuristic security solution that provides the agility and efficiency to protect and deliver applications. With our open Application Program Interfaces (APIs), our products become compatible to be deployed with any standards-based infrastructure. ACOS also features shared-memory architecture to accelerate and secure today’s universal applications. 


With increased cyberthreats of immense power, from WannaCry to Mirai to the latest Memcached, organizations are under constant threat from hackers. We have solutions that can defend networks against modern cyberthreats with DDoS protection, SSL decryption and firewalls. We also offer solutions that can optimize application security and performance with automation and actionable per-app analytics.


At A10, we provide automation across our portfolio of secure application solutions services. We strive to enable intelligent automation with deep machine learning to ensure business- critical applications are protected, reliable and always available.” 

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.