Thunder® Threat Protection System (TPS®)

DDoS Detection & Mitigation

Used by the top service providers and online gaming companies, Thunder TPS provides scalable and automated DDoS protection powered by advanced machine learning to detect and mitigate attacks

Key Benefits of Thunder TPS

Fast and Effective
  • Multi-modal source-based defense pinpoints attackers without damaging users
  • 100 ms mitigation interval
  • 3-second detection response

Zero-touch Intelligent Automation

Maximize ROI with DDoS Scrubbing Services
  • 256K individual detection policies per appliance scales to thousands of paying tenants
  • 3,000 simultaneous mitigation zones per appliance for differentiated services that match the tenant’s risk profile and budget
  • Zero-touch Intelligent Automation maximizes effectiveness of limited staff and reduces Opex
  • 30 times more revenue over legacy cyber attack defense platforms
REPORT

15+ Million DDoS Weapons Tracked

Learn about latest developments in the world of DDoS that can help you improve your security posture and protect your resources against devastating DDoS attacks.

Download the Free Report

Key Features of Thunder TPS

Zero-day Automated Protection

  • Expert system calculates blocking filters in real-time
  • Fast, automated response
  • No pre-configuration or manual intervention
  • Automatic heuristics-based anomalous behavior blocking

Precision

  • Industry’s only 5-level adaptive policy escalation that minimizes damage to users
  • Machine learning powered zero-day attack protection
  • Actionable distributed denial-of-service weapons intelligence at Internet scale
  • Fast 100 ms mitigation intervals

Industry Leading Performance

  • Highest performance density per RU – 220 Gbps in a single RU form factor
  • Highest packet processing in a single appliance – 440 Mpps, 300 Gbps
  • 6M fps flow-based detector (22x the competition)
  • 3,000 active Zones for building scalable DDoS scrubbing services

Management & Analytics

  • Single real-time dashboard for multiple Thunder TPS devices
  • Intelligent service discovery with automatic mitigation policy assignment
  • Instantly create and adjust countermeasures
  • Live visualization and geolocation tracking

Threat Intelligence

  • Over three dozen security threat intelligence sources to instantly recognize and block malicious traffic
  • Up to 96M-entry class list for proactive blocking of toxic IP addresses
  • Threat intelligence feed updates as often as every 15 mins

Additional Options

Flexible and robust Distributed Denial of Service (DDoS) protection, with a wide range of hardware and software deployment models to meet your exact needs.

How to Buy

Thunder TPS

High precision, automated DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1 Gbps to 500 Gbps.

Download Data Sheet

Thunder TPS Detector

High-performance Netflow, Sflow, IPFIX-based DDoS detector for a complete reactive cyber attack defense solution. Available as a standalone appliance or integrated with aGalaxy 5000.

aGalaxy TPS

Enables organizations to gain a global view of their environments to rapidly identify and remediate cyber attacks and ensure that policies are consistently enforced from a central point.

Download Data Sheet

DDoS Threat Intelligence

Leverages a weaponry inventory based on active intelligence and dynamically applies it to create blacklists with millions of toxic IP addresses.

Learn More

One-DDoS Protection

Full-spectrum cyber attack protection with distributed detection capabilities integrated across key network elements including A10 Networks Thunder ADC, CGN and CFW. These capabilities provide the context, packet-level granularity and visibility needed to thwart today’s sophisticated targeted attacks.

Download Solution Brief

DDoS Protection Cloud

Full-spectrum cyber attack protection with distributed detection capabilities integrated across key network elements including A10 Networks Thunder ADC, CGN and CFW. These capabilities provide the context, packet-level granularity and visibility needed to thwart today’s sophisticated targeted attacks.

Network Integrations

Simple, seamless integration into your existing network infrastructure for on-demand reactive, always-on proactive, hybrid DDoS, and distributed detection with One-DDoS Protection deployment options.

Infrastructure Integration

BGP, IS-IS, OSPF, GRE, VXLAN protocols for seamless integration into your environment

Legacy Security is Inadequate

Role-based Access

Role-based access and authentication with LDAP, RADIUS and TACACS+

SecDevOps Integration

100% REST API coverage of all functionality

High-speed Logging

Thunder TPS flow-based detector and 3rd party detector integration: Flowmon, Kentik, Flowtraq, Deepfield

Preview of the Layer 3 customer case study document
Case Study

Layer 3 Creates New Revenue Stream Innovative On-demand DDoS Prevention Service

Challenge
Layer 3 was seeking a cost-effective way to offer DDoS protection as a service. Layer 3’s clients required on-demand cyber attack prevention they could spin up during crucial timeframes without the restrictions of annual licenses or the burden of continual charges.

Solution
Layer 3 chose Thunder TPS 4435 for its cost effectiveness and high performance. Its integration features allowed Layer 3 to build distributed denial-of-service defense on demand. Layer 3 was able to create a competitive new revenue stream and boost client satisfaction.

Download Case Study