A10 Networks, a company that makes application networking products, has launched a new line of standalone, high performance Distributed Denial of Service (DDoS) protection appliances targeted to service providers and large enterprises.
The company, which in Oct. 2013 secured $115 million in capital through an equity financing and a revolving credit facility, this month announced the A10 Thunder TPS Series, appliances designed to provide high-performance, network-wide protection against a variety of volumetric, protocol, resource and other sophisticated DDoS attacks.
A10, which has been a player in the Application Delivery Controller (ADC) market, has been selling DDoS, web application and DNS firewall, SSL intercept and authentication features as part of its ADC product line. Now, the company is offering a line of standalone security appliances dedicated solely to defending large-scale DDoS attacks.
Launch of a standalone DDoS protection appliance line puts A10 in direct competition with other vendors such as Arbor Networks, Radware, Corero Network Security and NSFOCUS, among others.
Starting at $195,995, A10’s Thunder TPS appliances are designed to provide protection against large-scale attacks, and support DDoS mitigation capacity ranging from 38 Gbps to 155 Gbps (and up to 1.2 Tbps in a cluster) throughput, according to the company.
Inside each Thunder TPS appliance sits a high-performance FPGA-based Flexible Traffic Acceleration (FTA) technology that is used to detect and mitigate over 30 common attack vectors in hardware, without degrading the performance of the core system general purpose CPUs.
The platform leverages Intel Xeon CPUs to process and detect application layer attacks (layer 7), allowing the system to distribute detection and mitigation functions across optimal system resources, the company explained.
An open design architecture allows the appliances to be deployed into a variety of existing network architectures and integrated with third-party attack detection systems. Thunder TPS supports flexible deployment models for in- and out-of-band operations, and routed or transparent operation modes, A10 said. Additionally, aXAPI, an open RESTful API, enables integration to custom or third-party detection solutions.
“Ixia partnered with A10 Networks to help validate Thunder TPS performance and its many DDoS mitigation options, verifying that it can operate at very high scale using our PerfectStorm security test solution,” said Fred Kost, vice president of security solutions marketing at Ixia. “Since DDoS is a scale-based threat, it is critical that DDoS solutions have the ability to handle both high volume and sophisticated application attacks, protecting network infrastructure and application services from being overwhelmed.”
For the curious, Ixia’s testing solution was gained from it’s 2012 acquisition of BreakingPoint Systems, a maker of technology that helps test IT infrastructure to massive scales and simulate cyberwar conditions.
The three models scheduled to be available in Q1 2014 include:
Thunder 4435 TPS | Thunder 5435 TPSS | Thunder 6435 TPS |
• 38 Gbps • Single Xeon (10 cores) • 16×10/1G ports • 4435S model w/ SSL HW |
• 77 Gbps • Single Xeon (10 cores) • 16×10/1G + 4x40G (32x10G w/breakout) • 5435S model w/ SSL HW |
• 155 Gbps • Dual Xeon (20 cores) • 16×10/1G + 4x40G (32x10G w/breakout) • 5435S model w/ SSL HW |
“DDoS attacks like SYN Flood and Fragmentation attacks are rapidly evolving to becoming a big numbers game, with malicious bots or zombie machines directing massive amounts of traffic in unison toward target victims. Effective DDoS solutions must be able to mitigate at equally massive scale and performance to prevent service interruption,” said Lee Chen, A10 CEO and founder.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Google Patches Third Chrome Zero-Day of 2023
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
