Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

A10 Networks Launches High Performance DDoS Attack Protection Appliances

A10 Networks, a company that makes application networking products, has launched a new line of standalone, high performance Distributed Denial of Service (DDoS) protection appliances targeted to service providers and large enterprises.

A10 Networks, a company that makes application networking products, has launched a new line of standalone, high performance Distributed Denial of Service (DDoS) protection appliances targeted to service providers and large enterprises.

The company, which in Oct. 2013 secured $115 million in capital through an equity financing and a revolving credit facility, this month announced the A10 Thunder TPS Series, appliances designed to provide high-performance, network-wide protection against a variety of volumetric, protocol, resource and other sophisticated DDoS attacks.

A10, which has been a player in the Application Delivery Controller (ADC) market, has been selling DDoS, web application and DNS firewall, SSL intercept and authentication features as part of its ADC product line. Now, the company is offering a line of standalone security appliances dedicated solely to defending large-scale DDoS attacks.

A10 Thunder TPS DDoS Protection ApplianceLaunch of a standalone DDoS protection appliance line puts A10 in direct competition with other vendors such as Arbor Networks, Radware, Corero Network Security and NSFOCUS, among others.

Starting at $195,995, A10’s Thunder TPS appliances are designed to provide protection against large-scale attacks, and support DDoS mitigation capacity ranging from 38 Gbps to 155 Gbps (and up to 1.2 Tbps in a cluster) throughput, according to the company.

Inside each Thunder TPS appliance sits a high-performance FPGA-based Flexible Traffic Acceleration (FTA) technology that is used to detect and mitigate over 30 common attack vectors in hardware, without degrading the performance of the core system general purpose CPUs.

The platform leverages Intel Xeon CPUs to process and detect application layer attacks (layer 7), allowing the system to distribute detection and mitigation functions across optimal system resources, the company explained.

An open design architecture allows the appliances to be deployed into a variety of existing network architectures and integrated with third-party attack detection systems. Thunder TPS supports flexible deployment models for in- and out-of-band operations, and routed or transparent operation modes, A10 said. Additionally, aXAPI, an open RESTful API, enables integration to custom or third-party detection solutions.

“Ixia partnered with A10 Networks to help validate Thunder TPS performance and its many DDoS mitigation options, verifying that it can operate at very high scale using our PerfectStorm security test solution,” said Fred Kost, vice president of security solutions marketing at Ixia. “Since DDoS is a scale-based threat, it is critical that DDoS solutions have the ability to handle both high volume and sophisticated application attacks, protecting network infrastructure and application services from being overwhelmed.”

Advertisement. Scroll to continue reading.

For the curious, Ixia’s testing solution was gained from it’s 2012 acquisition of BreakingPoint Systems, a maker of technology that helps test IT infrastructure to massive scales and simulate cyberwar conditions. 

The three models scheduled to be available in Q1 2014 include:

Thunder 4435 TPS  Thunder 5435 TPSS Thunder 6435 TPS

•  38 Gbps

•  Single Xeon (10 cores)

•  16×10/1G ports

•  4435S model w/ SSL HW

•  77 Gbps

•  Single Xeon (10 cores)

•  16×10/1G + 4x40G (32x10G w/breakout)

•  5435S model w/ SSL HW

•  155 Gbps

•  Dual Xeon (20 cores)

•  16×10/1G + 4x40G (32x10G w/breakout)

•  5435S model w/ SSL HW

“DDoS attacks like SYN Flood and Fragmentation attacks are rapidly evolving to becoming a big numbers game, with malicious bots or zombie machines directing massive amounts of traffic in unison toward target victims. Effective DDoS solutions must be able to mitigate at equally massive scale and performance to prevent service interruption,” said Lee Chen, A10 CEO and founder.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.