SYS-CON MEDIA Authors: Sean Houghton, Glenn Rossman, Ignacio M. Llorente, Xenia von Wedel, Peter Silva

News Feed Item

A10 Networks Targets Large-Scale, Network-Wide DDoS Attacks With A10 Thunder TPS Threat Protection System

Next-Generation High-Performance Threat Protection Appliances Deliver Scale and Performance to Meet the Growing Size and Sophistication of DDoS Attacks

SAN JOSE, CA -- (Marketwired) -- 01/14/14 -- A10 Networks, a technology leader in application networking, today announced the A10 Thunder TPS™ Series, designed to provide high-performance, network-wide protection against a variety of volumetric, protocol, resource and more sophisticated Distributed Denial of Service (DDoS) attacks and improve service availability for critical Internet infrastructures and public-facing websites.

Building on the existing DDoS feature set in the company's popular application delivery controllers (ADCs), A10 today expands its offerings with the introduction of a standalone line of DDoS products for network-wide protection. The Thunder TPS product line is built upon A10's Advanced Core Operating System (ACOS) platform, which delivers up to 155Gbps of throughput, thereby helping enterprise and service provider customers address the increasing scale of DDoS attacks. Broad multi-vector attack detection capabilities are designed to secure customers' networks against a variety of attack types, while support for multiple deployment modes provides the flexibility needed to integrate with various customer network designs.

As businesses around the world grow increasingly reliant upon the uptime of Internet-connected services, there is corresponding growth in the nature, volume and sophistication of DDoS attacks by criminal syndicates and hackers looking to disrupt that service availability. Organizations face the threat of significant revenue loss and brand reputation damage from these DDoS attacks that have few good solutions today.

Legacy security solutions, such as firewalls and Intrusion Detection Systems (IDS) have insufficient capacity to mitigate today's multi-vector DDoS attacks at scale. With DDoS mitigation capacity ranging from 38 Gbps to 155 Gbps (and up to 1.2 Tbps in a cluster) throughput, Thunder TPS is designed to provide protection against large attacks. Each Thunder TPS model is equipped with high-performance FPGA-based Flexible Traffic Acceleration (FTA) technology to detect and mitigate over 30 common attack vectors rapidly in hardware, without degrading the performance of the core system general purpose CPUs. More complex application layer (L7) attacks (HTTP, SSL, DNS etc.) are processed and detected by the latest Intel Xeon CPUs, so performance scaling is maintained by distributing multi-vector detection and mitigation functions across optimal system resources.

Thunder TPS is architected with an open design, which allows it to be readily deployed into a variety of existing network architectures and integrated with third-party attack detection systems. Thunder TPS supports flexible deployment models for in- and out-of-band operations, and routed or transparent operation modes. In addition, aXAPI, an open RESTful API, enables integration to custom or third-party detection solutions, allowing the Thunder TPS to take advantage of the growing ecosystem of multi-level threat protections solutions.

Supporting Quotes
A10 Networks
"DDoS attacks like SYN Flood and Fragmentation attacks are rapidly evolving to becoming a big numbers game, with malicious bots or zombie machines directing massive amounts of traffic in unison toward target victims. Effective DDoS solutions must be able to mitigate at equally massive scale and performance to prevent service interruption," said Lee Chen, A10 CEO and founder. "Service availability for Internet-connected applications is critical to our enterprise and service provider customers, so we are proud to help them improve the uptime and security of those applications."

A10 Customers/Users
"As an early user of the Thunder TPS, we believe A10 is delivering a high-value product, with rich features and really great performance," said Gerold Arheilger, CTO Xantaro Group. "In order to sufficiently protect against large-scale, multi-vector DDoS attacks, mitigation solutions must provide very high packet-per-second processing power. Thunder TPS is built for these extreme environments."

"The Microsoft Digital Crimes Unit and A10 Networks have a shared vision to protect the Internet from large-scale threats," said Richard Boscovich, assistant general counsel, Microsoft Digital Crimes Unit. "We will continue to partner to mitigate future threats leveraging DCU's expertise and A10's advanced threat protection technologies." See Microsoft Digital Crime Unit's blog about how MS, the FBI, EC3 and A10 Networks stopped the recent "ZeroAccess" botnet

A10 Partners
"GenieATM is a natural complement to A10's Thunder TPS for delivering network-wide DDoS protection," said Popo Tseng, vice president of product marketing at Genie Networks. "Customers will benefit from the interaction between the GenieATM Network Behavior Analysis solution and Thunder TPS' high-capacity DDoS mitigation, enhancing both the quality of threat intelligence and the availability of network services."

"InMon is excited to be partnering with A10 to deliver real-time visibility and control solutions using our sFlow-RT analytics software. A10's support for the sFlow standard allows us to integrate detailed threat metrics from Thunder TPS with data from a wide range of physical and virtual switches, routers, hosts and applications to provide comprehensive visibility to operations teams. Integration with A10's RESTful API closes the loop and allows our controller software to automatically push actions when attacks are detected," said Peter Phaal, president, InMon Corp.

"Lancope has long history in network security monitoring and detection. Combined with Thunder TPS from A10 Networks, customers would benefit from a comprehensive solution to detect and mitigate DDoS attacks to customer networks, ensuring network uptime and availability," said Kerry Armistead, Lancope vice president of product marketing.

"Ixia partnered with A10 Networks to help validate Thunder TPS performance and its many DDoS mitigation options, verifying that it can operate at very high scale using our PerfectStorm security test solution," said Fred Kost, vice president of security solutions marketing at Ixia. "Since DDoS is a scale-based threat, it is critical that DDoS solutions have the ability to handle both high volume and sophisticated application attacks, protecting network infrastructure and application services from being overwhelmed."

** Ixia and A10 will be demonstrating the performance and DDoS mitigation capabilities of A10's Thunder TPS, verified by Ixia's PerfectStorm at Mobile World Congress in Barcelona and RSA in San Francisco.

"ThreatSTOP's Internet Defense Cloud gathers data about the currently active Criminal and Nation State command and control systems, and the Bots under their control, as well as improperly provisioned third party hosts that are abused to amplify attacks," said ThreatSTOP CEO and Founder Tom Byrnes. "This large and rapidly changing list of current malicious IP addresses and networks can be fully consumed and applied to traffic by A10 Networks TPS due to its capacity and throughput. This represents a game-changer in the ability to apply global network intelligence at all points, with near real-time updates."

Models, Price and Availability
Prices begin at $195,995

Thunder 4435 TPS

  • 38 Gbps
  • Single Xeon (10 cores)
  • 16x10/1G ports
  • 4435S model w/ SSL HW
  • Available: January 2014

Thunder 5435 TPS

  • 77 Gbps
  • Single Xeon (10 cores)
  • 16x10/1G + 4x40G (32x10G w/ breakout)
  • 5435S model w/ SSL HW
  • Available: February 2014

Thunder 6435 TPS

  • 155 Gbps
  • Dual Xeon (20 cores)
  • 16x10/1G + 4x40G (32x10G w/ breakout)
  • 6435S model w/ SSL HW
  • Available: February 2014

About A10 Networks
A10 Networks is a leader in application delivery networking, providing a range of high-performance application networking solutions that help organizations ensure that their data center applications and networks remain highly available, accelerated and secure. Founded in 2004, A10 Networks is based in San Jose, Calif., and serves customers globally with offices worldwide. For more information, visit: http://www.a10networks.com

A10 Networks, A10 Thunder, vThunder, ACOS, aCloud, aFleX, aXAPI, aVCS, Virtual Chassis, SoftAX, and aFlow are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2494763

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Ellen Roeckl
A10 Networks
408-857-9718
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, focused on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19+ years in high tech. At Verizon Enterprise, she focuses on driving growth for the Verizon Cloud platfo...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...