A10 Networks company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.


Founded Year




Total Raised


Date of IPO


Market Cap


Stock Price




About A10 Networks

A10 Networks specializes in application networking and security, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure.

A10 Networks Headquarter Location

3 West Plumeria Drive

San Jose, California, 95134,

United States


Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

A10 Networks Patents

A10 Networks has filed 200 patents.

The 3 most popular patent topics include:

  • Network protocols
  • Computer network security
  • Computer networking
patents chart

Application Date

Grant Date


Related Topics




Network protocols, Computer network security, Cryptography, Wireless networking, Transmission Control Protocol


Application Date


Grant Date



Related Topics

Network protocols, Computer network security, Cryptography, Wireless networking, Transmission Control Protocol



Latest A10 Networks News

A10 publishes its 2022 A10 Networks DDoS Threat Report

May 5, 2022

It is well-reported that the pandemic caused a spike in cyberattacks, including malware, ransomware and DDoS attacks. Threat actors have sought to disrupt not only services people rely on everyday like healthcare, education and financial but also critical infrastructure, like food supply chains, utilities and government agencies. Correspondingly, there has been a dramatic increase in the weapons that can be used to launch these attacks. In the 2H 2021 reporting period, A10 Networks security research team tracked over 15.4 million DDoS weapons in 2021. Recently, A10 Networks’ threat intelligence detailed the use of DDoS attacks to disrupt infrastructure and communications in Ukraine in February 2022 just as Russia launched its ground attack. A10’s threat intelligence research team monitored significant advances in scope and intensity of cybercrimes. • DDoS weapons are on the rise: 15.4 million are now tracked by A10’s security research team • There was an increase of over 100 percent, year-over-year, of more obscure potential amplification weapons, including Apple Remote Desktop (ARD), which was used in the Russia-Ukraine conflict • Attackers have leveraged the now well-known Log4j vulnerability; more than 75 percent of Log4j scanners originated in Russia These, and other trends, are included in the 2022 A10 Networks DDoS Threat Report, which provides detailed insights, including the origins of DDoS activity; the growth of DDoS weapons – the computers, servers and IoT devices that can potentially be used in DDoS attacks – and botnets; the role of malware in the propagation of DDoS weapons and attacks; and the steps organizations can take to protect against such activities. Organizations Must Act Now – Employ Zero Trust Principles On March 21, 2022, the Biden-Harris Administration issued guidance urging U.S. organizations to act quickly to protect against cyber attacks and state-sponsored cyber warfare given the ongoing Russia-Ukraine conflict. The guidance, while aimed at U.S.-based organizations, details a sense of urgency for organizations globally to reevaluate their security posture. Employing Zero Trust principles can not only protect networks but also ensure that they are not being used to launch attacks. A10’s security-led solutions for DDoS protection, TLS/SSL inspection of encrypted traffic and application delivery security capabilities can provide identity-based and context-based Zero Trust policies for specific enforced access. “Recent events underscore the often devastating impact that cyber attacks have on governments and businesses around the world. A10 Networks tracks the origins of DDoS weapons activity, in addition to other attack vectors, in order to arm customers with useful threat intelligence. This is a critical component of a Zero Trust framework to help organizations better anticipate and mitigate cyber attacks, and also ensure networks are not inadvertently being weaponized,” said Dhrupad Trivedi, president and CEO of A10 Networks. As a testament to A10’s technology innovation, Frost & Sullivan recently evaluated A10’s DDoS protection solutions, along with several other vendors, and awarded A10 the “2021 Frost & Sullivan Customer Value Leadership award for global DDoS mitigation, for excellence in best practices.” In addition, to further support our customers’ cybersecurity needs and contribute to global solutions to cyber threats, A10 recently joined the Microsoft Intelligent Security Association (MISA), which is an ecosystem of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats.

A10 Networks Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

A10 Networks Rank

  • When was A10 Networks founded?

    A10 Networks was founded in 2004.

  • Where is A10 Networks's headquarters?

    A10 Networks's headquarters is located at 3 West Plumeria Drive, San Jose.

  • What is A10 Networks's latest funding round?

    A10 Networks's latest funding round is IPO.

  • How much did A10 Networks raise?

    A10 Networks raised a total of $153M.

  • Who are A10 Networks's competitors?

    Competitors of A10 Networks include Citrix Systems and 4 more.

You May Also Like

DataDome Logo

DataDome is a cybersecurity solution dedicated to the detection of bots and the management of nonhuman traffic.

ConnectWise Logo

ConnectWise is a software company that connects teams with the platform and solutions that deliver technology as a service to the world. Its business management platform automates the full lifecycle of technology service delivery, from sales and service to project tracking and back-office functions.

Imperva Logo

Imperva seeks to improve endpoint and network security by directly protecting high-value applications and data assets in physical and virtual data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside the organization, mitigate risk, and streamline compliance.

Pulseway Logo

Pulseway is a remote monitoring and management RMM software that helps MSP's control their IT infrastructure on the go.

Ericom Software Logo
Ericom Software

Ericom Software provides businesses with secure access to the web and corporate applications, in the cloud and on-premises, from any device or location. Ericom's solutions ensure that devices and applications are protected from cybersecurity threats, and users can connect to only the specific resources they are authorized to access.

Autotask Logo

Autotask provides front and back office business management software to automate the core workflows of IT service providers. The company's solutions help customers manage service ticketing, accurately capture and track billable hours, meet service level agreements, track expenses and employee utilization, and aggregate customer and employee data to empower business decisions. Autotask's solution is comprised of a platform with built-in workflow functionalities that include service desk, CRM, dispatch, billing, project management and contracts management, as well as a client portal that allows customers to engage directly with their clients and remediate IT support tickets. The company also offers an API that allows partners to integrate Autotask with industry tools, mobile functionality and business intelligence dashboards.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.