Building on the existing DDoS feature set in the company's popular application delivery controllers (ADCs), A10 today expands its offerings with the introduction of a standalone line of DDoS products for network-wide protection. The Thunder TPS product line is built upon A10's Advanced Core Operating System (ACOS) platform, which delivers up to 155Gbps of throughput, thereby helping enterprise and service provider customers address the increasing scale of DDoS attacks. Broad multi-vector attack detection capabilities are designed to secure customers' networks against a variety of attack types, while support for multiple deployment modes provides the flexibility needed to integrate with various customer network designs.
As businesses around the world grow increasingly reliant upon the uptime of Internet-connected services, there is corresponding growth in the nature, volume and sophistication of DDoS attacks by criminal syndicates and hackers looking to disrupt that service availability. Organizations face the threat of significant revenue loss and brand reputation damage from these DDoS attacks that have few good solutions today.
Legacy security solutions, such as firewalls and Intrusion Detection Systems (IDS) have insufficient capacity to mitigate today's multi-vector DDoS attacks at scale. With DDoS mitigation capacity ranging from 38 Gbps to 155 Gbps (and up to 1.2 Tbps in a cluster) throughput, Thunder TPS is designed to provide protection against large attacks. Each Thunder TPS model is equipped with high-performance FPGA-based Flexible Traffic Acceleration (FTA) technology to detect and mitigate over 30 common attack vectors rapidly in hardware, without degrading the performance of the core system general purpose CPUs. More complex application layer (L7) attacks (HTTP, SSL, DNS etc.) are processed and detected by the latest Intel Xeon CPUs, so performance scaling is maintained by distributing multi-vector detection and mitigation functions across optimal system resources.
Thunder TPS is architected with an open design, which allows it to be readily deployed into a variety of existing network architectures and integrated with third-party attack detection systems. Thunder TPS supports flexible deployment models for in- and out-of-band operations, and routed or transparent operation modes. In addition, aXAPI, an open RESTful API, enables integration to custom or third-party detection solutions, allowing the Thunder TPS to take advantage of the growing ecosystem of multi-level threat protections solutions.
"DDoS attacks like SYN Flood and Fragmentation attacks are rapidly evolving to becoming a big numbers game, with malicious bots or zombie machines directing massive amounts of traffic in unison toward target victims. Effective DDoS solutions must be able to mitigate at equally massive scale and performance to prevent service interruption," said
"As an early user of the Thunder TPS, we believe A10 is delivering a high-value product, with rich features and really great performance," said Gerold Arheilger, CTO
"The Microsoft Digital Crimes Unit and
"GenieATM is a natural complement to A10's Thunder TPS for delivering network-wide DDoS protection," said
"InMon is excited to be partnering with A10 to deliver real-time visibility and control solutions using our sFlow-RT analytics software. A10's support for the sFlow standard allows us to integrate detailed threat metrics from Thunder TPS with data from a wide range of physical and virtual switches, routers, hosts and applications to provide comprehensive visibility to operations teams. Integration with A10's RESTful API closes the loop and allows our controller software to automatically push actions when attacks are detected," said Peter Phaal, president,
"Lancope has long history in network security monitoring and detection. Combined with Thunder TPS from
"Ixia partnered with
** Ixia and A10 will be demonstrating the performance and DDoS mitigation capabilities of A10's Thunder TPS, verified by Ixia's PerfectStorm at
"ThreatSTOP's Internet Defense Cloud gathers data about the currently active Criminal and Nation State command and control systems, and the Bots under their control, as well as improperly provisioned third party hosts that are abused to amplify attacks," said ThreatSTOP CEO and Founder
Models, Price and Availability
Prices begin at
Thunder 4435 TPS
•38 Gbps •Single Xeon (10 cores) •16x10/1G ports •4435S model w/ SSL HW •Available:
Thunder 5435 TPS
•77 Gbps •Single Xeon (10 cores) •16x10/1G + 4x40G (32x10G w/ breakout) •5435S model w/ SSL HW •Available:
Thunder 6435 TPS
•155 Gbps •Dual Xeon (20 cores) •16x10/1G + 4x40G (32x10G w/ breakout) •6435S model w/ SSL HW •Available:
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2494763
Ellen Roeckl A10 Networks408-857-9718 Email Contact