How it benefits your business
Unify device management and policy enforcement
Consolidate all management tasks in one location and easily apply consistent security policies and application settings to hundreds of appliances at once.
Gain application network visibility
Make smart decisions with real-time statistics and log analytics. Identify, diagnose and resolve problems — including application performance and DDoS-based challenges — before they impact user experiences.
Detect and mitigate DDoS attacks in real time
Gain a complete picture of network attacks and apply mitigation templates or custom countermeasures to granularly regulate traffic and block suspicious activity.
Simplified device management
Centrally manage devices, SSL keys and certificates, deployment configurations, aFleX scripts and operations for backups, upgrading, restoration and rebooting.
Reporting and log analytics
Gain a global view and detailed statistics of your network from the perspective of your application delivery and DDoS protection platforms.
Consolidated event administration
Leverage detailed managed device information, as well as searchable event and audit logs, for network availability, usage, performance, inventory, uptime history and login data via a real-time dashboard.
Real-time DDoS mitigation console
Ensure data center resource availability while dramatically reducing server needs.
One-stop policy settings
Configure consistent security policies and application settings across dozens or hundreds of Thunder ADC or Thunder TPS appliances at once.
Advanced access control
Deploy role-based access control management and external authentication policies that supports RADIUS and TACACS+.
Consistent user experience
Enjoy consistent and inherited graphical user interfaces (GUI) across all aGalaxy and Thunder products.
aGAPI REST-based programmability
Leverage a comprehensive JSON-based REST API for programmatic control of ADC and TPS functionality from other SDN controllers and cloud management platforms.
The Rise of Multi-Vector DDoS Attacks
DDoS attacks have evolved into bigger, more frequent, and more devastating multi-vector DDoS attacks. Most enterprises have existing DDoS security solutions that are unable to handle the volume and complexity of multi-vector DDoS attacks effectively and affordably.