Welcome!

News Feed Item

A10 Networks Targets Large-Scale, Network-Wide DDoS Attacks With A10 Thunder TPS Threat Protection System

Next-Generation High-Performance Threat Protection Appliances Deliver Scale and Performance to Meet the Growing Size and Sophistication of DDoS Attacks

SAN JOSE, CA -- (Marketwired) -- 01/14/14 -- A10 Networks, a technology leader in application networking, today announced the A10 Thunder TPS™ Series, designed to provide high-performance, network-wide protection against a variety of volumetric, protocol, resource and more sophisticated Distributed Denial of Service (DDoS) attacks and improve service availability for critical Internet infrastructures and public-facing websites.

Building on the existing DDoS feature set in the company's popular application delivery controllers (ADCs), A10 today expands its offerings with the introduction of a standalone line of DDoS products for network-wide protection. The Thunder TPS product line is built upon A10's Advanced Core Operating System (ACOS) platform, which delivers up to 155Gbps of throughput, thereby helping enterprise and service provider customers address the increasing scale of DDoS attacks. Broad multi-vector attack detection capabilities are designed to secure customers' networks against a variety of attack types, while support for multiple deployment modes provides the flexibility needed to integrate with various customer network designs.

As businesses around the world grow increasingly reliant upon the uptime of Internet-connected services, there is corresponding growth in the nature, volume and sophistication of DDoS attacks by criminal syndicates and hackers looking to disrupt that service availability. Organizations face the threat of significant revenue loss and brand reputation damage from these DDoS attacks that have few good solutions today.

Legacy security solutions, such as firewalls and Intrusion Detection Systems (IDS) have insufficient capacity to mitigate today's multi-vector DDoS attacks at scale. With DDoS mitigation capacity ranging from 38 Gbps to 155 Gbps (and up to 1.2 Tbps in a cluster) throughput, Thunder TPS is designed to provide protection against large attacks. Each Thunder TPS model is equipped with high-performance FPGA-based Flexible Traffic Acceleration (FTA) technology to detect and mitigate over 30 common attack vectors rapidly in hardware, without degrading the performance of the core system general purpose CPUs. More complex application layer (L7) attacks (HTTP, SSL, DNS etc.) are processed and detected by the latest Intel Xeon CPUs, so performance scaling is maintained by distributing multi-vector detection and mitigation functions across optimal system resources.

Thunder TPS is architected with an open design, which allows it to be readily deployed into a variety of existing network architectures and integrated with third-party attack detection systems. Thunder TPS supports flexible deployment models for in- and out-of-band operations, and routed or transparent operation modes. In addition, aXAPI, an open RESTful API, enables integration to custom or third-party detection solutions, allowing the Thunder TPS to take advantage of the growing ecosystem of multi-level threat protections solutions.

Supporting Quotes
A10 Networks
"DDoS attacks like SYN Flood and Fragmentation attacks are rapidly evolving to becoming a big numbers game, with malicious bots or zombie machines directing massive amounts of traffic in unison toward target victims. Effective DDoS solutions must be able to mitigate at equally massive scale and performance to prevent service interruption," said Lee Chen, A10 CEO and founder. "Service availability for Internet-connected applications is critical to our enterprise and service provider customers, so we are proud to help them improve the uptime and security of those applications."

A10 Customers/Users
"As an early user of the Thunder TPS, we believe A10 is delivering a high-value product, with rich features and really great performance," said Gerold Arheilger, CTO Xantaro Group. "In order to sufficiently protect against large-scale, multi-vector DDoS attacks, mitigation solutions must provide very high packet-per-second processing power. Thunder TPS is built for these extreme environments."

"The Microsoft Digital Crimes Unit and A10 Networks have a shared vision to protect the Internet from large-scale threats," said Richard Boscovich, assistant general counsel, Microsoft Digital Crimes Unit. "We will continue to partner to mitigate future threats leveraging DCU's expertise and A10's advanced threat protection technologies." See Microsoft Digital Crime Unit's blog about how MS, the FBI, EC3 and A10 Networks stopped the recent "ZeroAccess" botnet

A10 Partners
"GenieATM is a natural complement to A10's Thunder TPS for delivering network-wide DDoS protection," said Popo Tseng, vice president of product marketing at Genie Networks. "Customers will benefit from the interaction between the GenieATM Network Behavior Analysis solution and Thunder TPS' high-capacity DDoS mitigation, enhancing both the quality of threat intelligence and the availability of network services."

"InMon is excited to be partnering with A10 to deliver real-time visibility and control solutions using our sFlow-RT analytics software. A10's support for the sFlow standard allows us to integrate detailed threat metrics from Thunder TPS with data from a wide range of physical and virtual switches, routers, hosts and applications to provide comprehensive visibility to operations teams. Integration with A10's RESTful API closes the loop and allows our controller software to automatically push actions when attacks are detected," said Peter Phaal, president, InMon Corp.

"Lancope has long history in network security monitoring and detection. Combined with Thunder TPS from A10 Networks, customers would benefit from a comprehensive solution to detect and mitigate DDoS attacks to customer networks, ensuring network uptime and availability," said Kerry Armistead, Lancope vice president of product marketing.

"Ixia partnered with A10 Networks to help validate Thunder TPS performance and its many DDoS mitigation options, verifying that it can operate at very high scale using our PerfectStorm security test solution," said Fred Kost, vice president of security solutions marketing at Ixia. "Since DDoS is a scale-based threat, it is critical that DDoS solutions have the ability to handle both high volume and sophisticated application attacks, protecting network infrastructure and application services from being overwhelmed."

** Ixia and A10 will be demonstrating the performance and DDoS mitigation capabilities of A10's Thunder TPS, verified by Ixia's PerfectStorm at Mobile World Congress in Barcelona and RSA in San Francisco.

"ThreatSTOP's Internet Defense Cloud gathers data about the currently active Criminal and Nation State command and control systems, and the Bots under their control, as well as improperly provisioned third party hosts that are abused to amplify attacks," said ThreatSTOP CEO and Founder Tom Byrnes. "This large and rapidly changing list of current malicious IP addresses and networks can be fully consumed and applied to traffic by A10 Networks TPS due to its capacity and throughput. This represents a game-changer in the ability to apply global network intelligence at all points, with near real-time updates."

Models, Price and Availability
Prices begin at $195,995

Thunder 4435 TPS

  • 38 Gbps
  • Single Xeon (10 cores)
  • 16x10/1G ports
  • 4435S model w/ SSL HW
  • Available: January 2014

Thunder 5435 TPS

  • 77 Gbps
  • Single Xeon (10 cores)
  • 16x10/1G + 4x40G (32x10G w/ breakout)
  • 5435S model w/ SSL HW
  • Available: February 2014

Thunder 6435 TPS

  • 155 Gbps
  • Dual Xeon (20 cores)
  • 16x10/1G + 4x40G (32x10G w/ breakout)
  • 6435S model w/ SSL HW
  • Available: February 2014

About A10 Networks
A10 Networks is a leader in application delivery networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: http://www.a10networks.com

A10 Networks, A10 Thunder, vThunder, ACOS, aCloud, aFleX, aXAPI, aVCS, Virtual Chassis, SoftAX, and aFlow are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2494763

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Ellen Roeckl
A10 Networks
408-857-9718
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Leading cloud-centric IT organizations are establishing core capabilities to improve productivity, control costs and provide a highly responsive end-user experience. Key steps along this journey include creating an end-user cloud services catalog, automating workflows and provisioning, and implementing IT showback and chargeback. In his session at 19th Cloud Expo, Mark Jamensky, executive vice president of Products at Embotics, will walk attendees through an in-depth case study of enterprise I...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...