reliable security always 5g · 2018-11-16 · 2 2. confidential | do not distribute "this...
Post on 22-May-2020
3 Views
Preview:
TRANSCRIPT
CONFIDENTIAL | DO NOT DISTRIBUTE 1.1
5GThe Need to Auto Scale
Auto Protect and Automate the Network
November 2018
Reliable Security Always
An A10 Technology Speaker Series
CONFIDENTIAL | DO NOT DISTRIBUTE 2.2
"This presentation and the accompanying oral presentation contain “forward-looking” statements that are based on our management’s beliefs and assumptions, including statements regarding our projections for our future operating results, our expectations for future revenue growth and market opportunities, the performance of our products, our future strategies, our ability to penetrate certain markets, expected product launches and the general growth of our business.
Forward-looking statements are subject to known and unknown risks, uncertainties, assumptions and other factors that could cause our actual results to differ materially from those anticipated or implied by our forward-looking statements. These factors include, but are not limited to, successfully executing our strategies, market adoption of our products, successfully anticipating market needs and opportunities, timely development of new products and features, achieving or maintaining profitability, loss or delay of expected purchases, attracting and retaining new end-customers, maintaining and enhancing our brand and reputation, growth in markets relating to network security, the success of any future acquisitions or investments, our ability to shorten our close cycle, the ability of our channel partners to sell our products, our presence in international markets, and other factors described in our quarterly reports on Form 10-Q, annual reports on Form 10-K and other filings made with the Securities and Exchange Commission, to which your attention is directed. We assume no responsibility for the accuracy and completeness of the forward-looking statements and disclaim any obligation to update information contained in these forward-looking statements.”
Cautionary Statements and Disclosure
CONFIDENTIAL | DO NOT DISTRIBUTE 3.3
Gunter Reiss
VP, Worldwide Marketing
Our A10 Speakers Today
Yasir Liaqatullah
VP, Product Management
CONFIDENTIAL | DO NOT DISTRIBUTE 4.4
<1msLatency in 5G
is critical for new use cases
20GbpsDownlink cell site video
100XMore devices connected
per km2
1. Network World ; 2. Ericsson ; 3. GSMA
A MAJOR TRANSFORMATION
CONFIDENTIAL | DO NOT DISTRIBUTE 5.5
TRANSPORTATION
Traffic ControlAutonomous CarPublic Transportation Systems
SUSTAINABILITY
Renewable EnergySmart Grid InfrastructureConnected Lightning
MOBILITY
Ultra-high speed ConnectivityEvent ExperienceAugmented/Virtual Reality
SERVICES
HealthcareSurveillance MonitoringPublic SafetyEmergency
INDUSTRIES
Smart AgricultureSmart HomesSmart Factories
5GENABLING
NEW APPLICATIONS
5
CONFIDENTIAL | DO NOT DISTRIBUTE 6.6
Mexico
5G Operator TransformationProjects Around the World
CONFIDENTIAL | DO NOT DISTRIBUTE 7.7
ENHANCED MOBILEBROADBAND
Source: GSMA 2018
ULTRA RELIABLE LOW LATENCY COMMUNICATION
MASSIVE MACHINE TYPECOMMUNICATION
T-MOBILE – 5G APPS AT&T – 5G CARS VERIZON – 5G HOMES
Initial Approach by Operators
CONFIDENTIAL | DO NOT DISTRIBUTE 8.8
Coping With the Shear Volume of Devices
Source: Ericsson
CONFIDENTIAL | DO NOT DISTRIBUTE 9.9
Exponential Complexity in 5G
RAN
EPC
SGW PGW
MME
Gi LAN
FIREWALLCGNDPIADC
Edge Cloud(MEC / MAEC)
L4-L7Firewall
ADC SDN / NFVReady
GTPFirewall
GTP – LBDiameter LB
CGN SDN / NFVReady
ScalablePNFs and VNF’s
Core functions
Applications
Core functions
Applications
Limited Visibility & Data Analytics
Visibility(GTP, IP)
ADC CGN DPI Firewall
CONFIDENTIAL | DO NOT DISTRIBUTE 10.10
RAN Gi-LAN
INTERNET
GRX/IPXPEER NETWORK
The Bad Guys Are Already Inside
VOLUMETRIC DDoS ATTACKS
NEW ATTACK VECTORS
FIREWALLCGNDPIADC
EPC
SGW PGW
MME
ATTACKS FROM WEAPONIZED SMARTPHONES & EMERGENCE
OF 5G/ IOT DEVICES
CONFIDENTIAL | DO NOT DISTRIBUTE 11.11
Point Products Create Inefficiency and Latency
EPC
InternetSGW PGW
MME
RAN Gi LAN
GiFWCGNDPIADC
5G: more than speed, latency is the big issueTactile Internet needs immediate responseTraditional methods make it too difficult to scaleManual processes & too many conflicting tools
CONFIDENTIAL | DO NOT DISTRIBUTE 12.12
PREVENTIVEMEASURES
CONTINUOUS LEARNING
BASELINEDISCOVERY STATE RESTORATION
AUTO REPORT GENERATION
THREAT INTELLIGENCE
ANOMALYDETECTION
The Secure 5G Experience Requires a New Approach
12
CONFIDENTIAL | DO NOT DISTRIBUTE 13.13
CGNAT DPIADCFIREWALL
Gi/SGi FIREWALL
THUNDER CFW WITH INTEGRATED FIREWALL, CGNAT, DDoS PROTECTION & APPLICATION VISIBILITY
A10’s Synergistic 5G-GiLAN
SUBSCRIBER AWARENESS
INTELLIGENT TRAFFIC STEERING
THUNDER CFWGi/SGi LAN PROTECTIONEPC
InternetSGW PGW
MME
RAN
CONFIDENTIAL | DO NOT DISTRIBUTE 14.14
A10’s Built-in Robust Security
Protect Packet Core
Block unwanted traffic fromInternet
Protect Roaming Interfaces
Inspect GTP/SCTP
Protect MME
Rate limit Signaling Traffic
Gi Firewall GTP Firewall Integrated DDoS
*Roadmap
User plane security Control plane security
CONFIDENTIAL | DO NOT DISTRIBUTE 15.15
Better Control And VisibilityActionable Insights Through Machine Learning
CONFIDENTIAL | DO NOT DISTRIBUTE 16.1616
Flexible Solutions for Service Providers
ANY PLATFORM
BARE METAL
VIRTUAL
CONTAINER
APPLIANCE
ANYWHERE
M E C
E P CG i - L A N
D a t a C e n t e r
PERPETUALLICENSING
FLEXPOOLLICENSING
SUBSCRIPTIONLICENSING
ANYWAY
CONFIDENTIAL | DO NOT DISTRIBUTE 17.17
Real Deal: Major Mobile Operator in Asia
Challenges
5G-GiLANTM Gi-Firewall Customer
Why did A10 win?
3rd Largest Quad-Play Services Provider in Korea(Voice + Broadband + IPTV + Mobile)
Millions of Smart Phone Subscribers (4G LTE + 3G)
Scale and secure Next-Gen 5G-Ready network rollout
Consolidate security and networking solution to integrate vEPC platform
Required consistent 200 Gbps+ throughput with 2M CPS and 135M CCS
Highest scalable CGNAT and GiFW solution available in the market
Industry leading connection rates and lower TCO
Outperformed two major competitors
NAT64 GiFW
5G & IoT Devices
RAN
5G Mobile Packet CoreResource Pool
vEP
C
VNFVNF
VNFVNF
NAT64 GiFW
Active Standby
CONFIDENTIAL | DO NOT DISTRIBUTE 18.18
Ericsson Core Network Solution
CG-NAT
Partner Element Management Systems
Ericsson,3P Storage
Ericsson BSP,3P HW
Ericsson SSR,3P Networking
Virtualization layer
Infrastructure
vStoragevComputing vNetworking
EricssonCross-Domain
OSS
EricssonBSS
Ericsson
Cloud Execution
Environment
Orchestration
VNF Lifecycle Mgmt
VNF Catalog
OVF Repository (VNF Profile)
vIMS
vEPC
Element Management System
Ericsson
Partner
FW
Open Source
Infrastructure
PhysicalNetwork Function
Ericsson HW
OSS/BSSManagement & Orchestration
Infrastructure Management
CONFIDENTIAL | DO NOT DISTRIBUTE 19.19
Strong 5G Partner Ecosystem
CONFIDENTIAL | DO NOT DISTRIBUTE 20.20
5G Is Transformative: A Large and Growing Market
$-
$500.00
$1,000.00
$1,500.00
$2,000.00
$2,500.00
2018 2019 2020 2021 2022 2023
Do
llars
(M
)
Year
Aggregate TAM Aggregate SAM
CAGR for TAM:~13%
CAGR for SAM:~50%
Source: IHS 2018 and A10 Networks
CONFIDENTIAL | DO NOT DISTRIBUTE 21.21
5G: A Greater Opportunity for A10
AUTOMATION
DPI
FWCGNAT
ADC
DDoS
5G
5G: A full suite of products integrated with
Harmony Controller
3G/4G: Strong foundational footprint, over, 250 customers
3G/4G
CGNATFW
ADC
CONFIDENTIAL | DO NOT DISTRIBUTE 22.22
Q & A
CONFIDENTIAL | DO NOT DISTRIBUTE 23.23
THANK YOU
top related