Click here to close now.




















Welcome!

News Feed Item

A10 Networks Targets Large-Scale, Network-Wide DDoS Attacks With A10 Thunder TPS Threat Protection System

Next-Generation High-Performance Threat Protection Appliances Deliver Scale and Performance to Meet the Growing Size and Sophistication of DDoS Attacks

SAN JOSE, CA -- (Marketwired) -- 01/14/14 -- A10 Networks, a technology leader in application networking, today announced the A10 Thunder TPS™ Series, designed to provide high-performance, network-wide protection against a variety of volumetric, protocol, resource and more sophisticated Distributed Denial of Service (DDoS) attacks and improve service availability for critical Internet infrastructures and public-facing websites.

Building on the existing DDoS feature set in the company's popular application delivery controllers (ADCs), A10 today expands its offerings with the introduction of a standalone line of DDoS products for network-wide protection. The Thunder TPS product line is built upon A10's Advanced Core Operating System (ACOS) platform, which delivers up to 155Gbps of throughput, thereby helping enterprise and service provider customers address the increasing scale of DDoS attacks. Broad multi-vector attack detection capabilities are designed to secure customers' networks against a variety of attack types, while support for multiple deployment modes provides the flexibility needed to integrate with various customer network designs.

As businesses around the world grow increasingly reliant upon the uptime of Internet-connected services, there is corresponding growth in the nature, volume and sophistication of DDoS attacks by criminal syndicates and hackers looking to disrupt that service availability. Organizations face the threat of significant revenue loss and brand reputation damage from these DDoS attacks that have few good solutions today.

Legacy security solutions, such as firewalls and Intrusion Detection Systems (IDS) have insufficient capacity to mitigate today's multi-vector DDoS attacks at scale. With DDoS mitigation capacity ranging from 38 Gbps to 155 Gbps (and up to 1.2 Tbps in a cluster) throughput, Thunder TPS is designed to provide protection against large attacks. Each Thunder TPS model is equipped with high-performance FPGA-based Flexible Traffic Acceleration (FTA) technology to detect and mitigate over 30 common attack vectors rapidly in hardware, without degrading the performance of the core system general purpose CPUs. More complex application layer (L7) attacks (HTTP, SSL, DNS etc.) are processed and detected by the latest Intel Xeon CPUs, so performance scaling is maintained by distributing multi-vector detection and mitigation functions across optimal system resources.

Thunder TPS is architected with an open design, which allows it to be readily deployed into a variety of existing network architectures and integrated with third-party attack detection systems. Thunder TPS supports flexible deployment models for in- and out-of-band operations, and routed or transparent operation modes. In addition, aXAPI, an open RESTful API, enables integration to custom or third-party detection solutions, allowing the Thunder TPS to take advantage of the growing ecosystem of multi-level threat protections solutions.

Supporting Quotes
A10 Networks
"DDoS attacks like SYN Flood and Fragmentation attacks are rapidly evolving to becoming a big numbers game, with malicious bots or zombie machines directing massive amounts of traffic in unison toward target victims. Effective DDoS solutions must be able to mitigate at equally massive scale and performance to prevent service interruption," said Lee Chen, A10 CEO and founder. "Service availability for Internet-connected applications is critical to our enterprise and service provider customers, so we are proud to help them improve the uptime and security of those applications."

A10 Customers/Users
"As an early user of the Thunder TPS, we believe A10 is delivering a high-value product, with rich features and really great performance," said Gerold Arheilger, CTO Xantaro Group. "In order to sufficiently protect against large-scale, multi-vector DDoS attacks, mitigation solutions must provide very high packet-per-second processing power. Thunder TPS is built for these extreme environments."

"The Microsoft Digital Crimes Unit and A10 Networks have a shared vision to protect the Internet from large-scale threats," said Richard Boscovich, assistant general counsel, Microsoft Digital Crimes Unit. "We will continue to partner to mitigate future threats leveraging DCU's expertise and A10's advanced threat protection technologies." See Microsoft Digital Crime Unit's blog about how MS, the FBI, EC3 and A10 Networks stopped the recent "ZeroAccess" botnet

A10 Partners
"GenieATM is a natural complement to A10's Thunder TPS for delivering network-wide DDoS protection," said Popo Tseng, vice president of product marketing at Genie Networks. "Customers will benefit from the interaction between the GenieATM Network Behavior Analysis solution and Thunder TPS' high-capacity DDoS mitigation, enhancing both the quality of threat intelligence and the availability of network services."

"InMon is excited to be partnering with A10 to deliver real-time visibility and control solutions using our sFlow-RT analytics software. A10's support for the sFlow standard allows us to integrate detailed threat metrics from Thunder TPS with data from a wide range of physical and virtual switches, routers, hosts and applications to provide comprehensive visibility to operations teams. Integration with A10's RESTful API closes the loop and allows our controller software to automatically push actions when attacks are detected," said Peter Phaal, president, InMon Corp.

"Lancope has long history in network security monitoring and detection. Combined with Thunder TPS from A10 Networks, customers would benefit from a comprehensive solution to detect and mitigate DDoS attacks to customer networks, ensuring network uptime and availability," said Kerry Armistead, Lancope vice president of product marketing.

"Ixia partnered with A10 Networks to help validate Thunder TPS performance and its many DDoS mitigation options, verifying that it can operate at very high scale using our PerfectStorm security test solution," said Fred Kost, vice president of security solutions marketing at Ixia. "Since DDoS is a scale-based threat, it is critical that DDoS solutions have the ability to handle both high volume and sophisticated application attacks, protecting network infrastructure and application services from being overwhelmed."

** Ixia and A10 will be demonstrating the performance and DDoS mitigation capabilities of A10's Thunder TPS, verified by Ixia's PerfectStorm at Mobile World Congress in Barcelona and RSA in San Francisco.

"ThreatSTOP's Internet Defense Cloud gathers data about the currently active Criminal and Nation State command and control systems, and the Bots under their control, as well as improperly provisioned third party hosts that are abused to amplify attacks," said ThreatSTOP CEO and Founder Tom Byrnes. "This large and rapidly changing list of current malicious IP addresses and networks can be fully consumed and applied to traffic by A10 Networks TPS due to its capacity and throughput. This represents a game-changer in the ability to apply global network intelligence at all points, with near real-time updates."

Models, Price and Availability
Prices begin at $195,995

Thunder 4435 TPS

  • 38 Gbps
  • Single Xeon (10 cores)
  • 16x10/1G ports
  • 4435S model w/ SSL HW
  • Available: January 2014

Thunder 5435 TPS

  • 77 Gbps
  • Single Xeon (10 cores)
  • 16x10/1G + 4x40G (32x10G w/ breakout)
  • 5435S model w/ SSL HW
  • Available: February 2014

Thunder 6435 TPS

  • 155 Gbps
  • Dual Xeon (20 cores)
  • 16x10/1G + 4x40G (32x10G w/ breakout)
  • 6435S model w/ SSL HW
  • Available: February 2014

About A10 Networks
A10 Networks is a leader in application delivery networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: http://www.a10networks.com

A10 Networks, A10 Thunder, vThunder, ACOS, aCloud, aFleX, aXAPI, aVCS, Virtual Chassis, SoftAX, and aFlow are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2494763

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Ellen Roeckl
A10 Networks
408-857-9718
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
The 3rd International WebRTC Summit, to be held Nov. 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 15th International Cloud Expo, 6th International Big Data Expo, 3rd International DevOps Summit and 2nd Internet of @ThingsExpo. WebRTC (Web-based Real-Time Com...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
ElasticBox, the agile application delivery manager, announced freely available public boxes for the DevOps community. ElasticBox works with enterprises to help them deploy any application to any cloud. Public boxes are curated reference boxes that represent some of the most popular applications and tools for orchestrating deployments at scale. Boxes are an adaptive way to represent reusable infrastructure as components of code. Boxes contain scripts, variables, and metadata to automate proces...
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
Containers are not new, but renewed commitments to performance, flexibility, and agility have propelled them to the top of the agenda today. By working without the need for virtualization and its overhead, containers are seen as the perfect way to deploy apps and services across multiple clouds. Containers can handle anything from file types to operating systems and services, including microservices. What are microservices? Unlike what the name implies, microservices are not necessarily small,...
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding bu...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the ...
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
In his session at @ThingsExpo, Lee Williams, a producer of the first smartphones and tablets, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. He will explain how M2M controllers work through wirelessly connected remote controls; and specifically delve into a retrofit option that reverse-engineers control codes of existing conventional controller systems so the...
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development...
Akana has announced the availability of the new Akana Healthcare Solution. The API-driven solution helps healthcare organizations accelerate their transition to being secure, digitally interoperable businesses. It leverages the Health Level Seven International Fast Healthcare Interoperability Resources (HL7 FHIR) standard to enable broader business use of medical data. Akana developed the Healthcare Solution in response to healthcare businesses that want to increase electronic, multi-device acce...
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...