Do your research and figure out needs versus offerings. Don't pay for what you don't need with any vendor solution. Also, ensure you're picking a box that will allow you to scale out, versus having short-term solutions. Don't be shortsighted. In terms of our biggest security concerns they include malicious code, hacking/cyber defacement, DDoS attacks, insider attacks, and brand damage/loss of confidence. Specific to DDoS, I would want to make certain that, outside-in, we aren't getting attacked, but we have a solution that we utilize to mitigate DDoS attacks, so it's not specific to the A10 product. But it would ensure that we aren't getting DDoS-ed on the A10 product. We have a third-party solution that helps to prevent that. The malicious code concern would be more along the lines of something attacking the code on the A10 box. Again, we have preventative measures in place against an external intruder trying to get to that box and execute anything maliciously. In terms of hacking or cyber defacement, there is a general trend in the industry to ensure that it doesn't occur. Since it's new to us, I don't see many areas for improvement. It's serving the purpose that it should and hopefully it will continue to do so.
It handles everything that I ask it to do. I would totally recommend this as a method to alleviate IP address exhaustion. I would give it a nine (out of 10). The solution's security features are good. We don't use a lot of security for this solution, as it's not required. We don't give students access to the solution. The biggest lesson learnt: Some vendors don't lie.
Do your research and figure out needs versus offerings. Don't pay for what you don't need with any vendor solution. Also, ensure you're picking a box that will allow you to scale out, versus having short-term solutions. Don't be shortsighted. In terms of our biggest security concerns they include malicious code, hacking/cyber defacement, DDoS attacks, insider attacks, and brand damage/loss of confidence. Specific to DDoS, I would want to make certain that, outside-in, we aren't getting attacked, but we have a solution that we utilize to mitigate DDoS attacks, so it's not specific to the A10 product. But it would ensure that we aren't getting DDoS-ed on the A10 product. We have a third-party solution that helps to prevent that. The malicious code concern would be more along the lines of something attacking the code on the A10 box. Again, we have preventative measures in place against an external intruder trying to get to that box and execute anything maliciously. In terms of hacking or cyber defacement, there is a general trend in the industry to ensure that it doesn't occur. Since it's new to us, I don't see many areas for improvement. It's serving the purpose that it should and hopefully it will continue to do so.
It handles everything that I ask it to do. I would totally recommend this as a method to alleviate IP address exhaustion. I would give it a nine (out of 10). The solution's security features are good. We don't use a lot of security for this solution, as it's not required. We don't give students access to the solution. The biggest lesson learnt: Some vendors don't lie.