Thunder® Threat Protection System (TPS®)

DDoS Detection & Mitigation

Used by the top service providers and online gaming companies, Thunder TPS provides scalable and automated DDoS protection powered by advanced machine learning to detect and mitigate attacks

Schedule Demo

Key Benefits of Thunder TPS

Ever-evolving, modern cyber threats

Fast and Effective
  • Multi-modal source-based defense pinpoints attackers without damaging users
  • 100 ms mitigation interval
  • 3-second detection response

Ever-evolving, modern cyber threats

Zero-touch Intelligent Automation

Ever-evolving, modern cyber threats

Maximize ROI with DDoS Scrubbing Services
  • 256K individual detection policies per appliance scales to thousands of paying tenants
  • 3,000 simultaneous mitigation zones per appliance for differentiated services that match the tenant’s risk profile and budget
  • Zero-touch Intelligent Automation maximizes effectiveness of limited staff and reduces Opex
  • 30 times more profitable over legacy cyber attack defense platforms
WHITE PAPER

Game On: Five Methods for Stopping DDoS Attackers

Online gaming platforms face a surprisingly intense blizzard of distributed denial-of-service attacks. Defending a gaming platform requires a multi-layered defense centered on a zero-trust approach.

Download this paper to learn about the five key methods to help ensure your players will experience a robust and resilient platform that remains up and running.

Download White Paper

Key Features of Thunder TPS

Zero-day Automated Protection

Zero-day Automated Protection

  • Expert system calculates blocking filters in real-time
  • Fast, automated response
  • No pre-configuration or manual intervention
  • Automatic heuristics-based anomalous behavior blocking
Precision

Precision

  • Industry’s only 5-level adaptive policy escalation that minimizes damage to users
  • Machine learning powered zero-day attack protection
  • Actionable distributed denial-of-service weapons intelligence at Internet scale
  • Fast 100 ms mitigation intervals
Industry Leading Performance

Industry Leading Performance

  • Highest performance density per RU – 220 Gbps in a single RU form factor
  • Highest packet processing in a single appliance – 440 Mpps, 300 Gbps
  • 6M fps flow-based detector (22x the competition)
  • 3,000 active Zones for building scalable DDoS scrubbing services
Management & Analytics

Management & Analytics

  • Single real-time dashboard for multiple Thunder TPS devices
  • Intelligent service discovery with automatic mitigation policy assignment
  • Instantly create and adjust countermeasures
  • Live visualization and geolocation tracking
One-DDoS Protection

One-DDoS Protection

  • Unique approach to full-spectrum multi-vector distributed denial-of-service defense
  • Integration with distributed detection capabilities in Thunder ADC, Thunder CGN and Thunder CFW
  • Application DDoS protection that requires no special training for app and server team
DDoS Threat Intelligence

Threat Intelligence

  • Over three dozen security threat intelligence sources to instantly recognize and block malicious traffic
  • Up to 96M-entry class list for proactive blocking of toxic IP addresses
  • Threat intelligence feed updates as often as every 15 mins

Additional Options

Flexible and robust Distributed Denial of Service (DDoS) protection, with a wide range of hardware and software deployment models to meet your exact needs.

Legacy Security is Inadequate

Thunder TPS

High precision, automated DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1 Gbps to 500 Gbps.

Download Data Sheet

Legacy Security is Inadequate

Thunder TPS Detector

High-performance Netflow, Sflow, IPFIX-based DDoS detector for a complete reactive cyber attack defense solution. Available as a standalone appliance or integrated with aGalaxy 5000.

Legacy Security is Inadequate

aGalaxy TPS

Enables organizations to gain a global view of their environments to rapidly identify and remediate cyber attacks and ensure that policies are consistently enforced from a central point.

Download Datasheet

Legacy Security is Inadequate

DDoS Threat Intelligence

Leverages a weaponry inventory based on active intelligence and dynamically applies it to create blacklists with millions of toxic IP addresses.

Learn More

Legacy Security is Inadequate

One-DDoS Protection

Full-spectrum cyber attack protection with distributed detection capabilities integrated across key network elements including A10 Networks Thunder ADC, CGN and CFW. These capabilities provide the context, packet-level granularity and visibility needed to thwart today’s sophisticated targeted attacks.

Download Solution Brief

Legacy Security is Inadequate

DDoS Protection Cloud

Full-spectrum cyber attack protection with distributed detection capabilities integrated across key network elements including A10 Networks Thunder ADC, CGN and CFW. These capabilities provide the context, packet-level granularity and visibility needed to thwart today’s sophisticated targeted attacks.

Download Datasheet

Network Integrations

Simple, seamless integration into your existing network infrastructure for on-demand reactive, always-on proactive, hybrid DDoS, and distributed detection with One-DDoS Protection deployment options.

Legacy Security is Inadequate

Infrastructure Integration

BGP, ISIS, OSFP, GRE, VXLAN protocols for seamless integration into your environment

Legacy Security is Inadequate

Role-based Access

Role-based access and authentication with LDAP, RADIUS and TACACS+

Legacy Security is Inadequate

SecDevOps Integration

100% REST API coverage of all functionality

Legacy Security is Inadequate

High-speed Logging

Thunder TPS flow-based detector and 3rd party detector integration: Flowmon, Kentik, Flowtraq, Deepfield

CASE STUDY

Layer 3 Creates innovative On-Demand DDoS Protection Service

Challenge
Layer 3 was seeking a cost-effective way to offer DDoS protection as a service. Layer 3’s clients required on-demand cyber attack prevention they could spin up during crucial timeframes without the restrictions of annual licenses or the burden of continual charges.

Solution
Layer 3 chose Thunder TPS 4435 for its cost effectiveness and high performance. Its integration features allowed Layer 3 to build distributed denial-of-service defense on demand. Layer 3 was able to create a competitive new revenue stream and boost client satisfaction.

Download Case Study
Let Us Help

Learn why thousands of businesses trust A10 Networks to protect and deliver their mission-critical applications

Contact Sales