A10 Defend DDoS Protection
A holistic DDoS protection solution that is scalable, economical, precise, and intelligent to help customers ensure optimal user and subscriber experiences
A10 Defend DDoS Protection
Used by the top service providers and online gaming companies, A10 Defend DDoS Protection consists of several components.
A10 Defend DDoS Detector efficiently identifies abnormal traffic, A10 Defend DDoS Mitigator (previously Thunder TPS) automatically and intelligently mitigates the identified inbound DDoS attack, A10 Defend Threat Control proactively provides standalone layered defense and actionable insights, and A10 Defend DDoS Orchestrator via A10 Control (previously aGalaxy) provides a centralized point of control for seamless DDoS defense execution.
A10 Defend DDoS Mitigator
High precision, automated, scalable, and intelligent DDoS mitigation solution is delivered as hardware or virtual appliances ranging from 1Gbps to over 1Tbps.
A10 Defend DDoS Detector
High-performance Netflow, sFlow, IPFIX-based DDoS detector to easily manage the scale and heterogenous nature of SP networks, resulting in a unified DDoS protection solution.
A10 Defend DDoS Orchestrator
Via A10 Control, enables organizations to gain a global view of their environments to rapidly identify and remediate DDoS attacks and ensure that policies are consistently enforced from a central point.
A10 Defend Threat Control
Standalone SaaS platform proactively establishes a robust first layer of defense by offering actionable analytics and blocklists.
Key Benefits
Thwart Advanced DDoS Attacks to Maintain Uptime
Intelligently detect and automatically mitigate multi-vector DDoS attacks. To thwart zero-day attacks, A10 Defend Mitigator leverages AI-based technologies to perform behavioral analysis, baselining, and real-time traffic filtering for immediate DDoS mitigation.
Reduce TCO with Hybrid Deployment
Scale hardware or virtual appliance form factors up to 8x the mitigation capacity with FPGA-based hardware acceleration, clustering, and synchronization. In cases of the most intense DDoS attacks, traffic can be swung to cloud-based mitigation.
Reduce False Positives
Powered by an AI-driven system, the solution integrates actionable insights from DDoS-specific intelligence and creates AI-enhanced policies to interpret the intent behind traffic patterns, reducing false positives and enhancing the efficiency of the IT team.
Key Features
Zero-day Automated Protection
- Expert system calculates blocking filters in real-time
- Fast, automated response
- No pre-configuration or manual intervention
- Automatic heuristics-based anomalous behavior blocking
Precision
- Industry’s only 5-level adaptive policy escalation that minimizes damage to users
- Machine learning powered zero-day attack protection
- Actionable distributed denial-of-service weapons intelligence at Internet scale
- Fast 100 ms mitigation intervals
- Deploy accurate, proactive, and automated DDoS-specific blocklists generated by A10 proprietary data gathering and validation method
Industry-leading Performance
- Highest performance density per RU – 220 Gbps in a single RU form factor
- Highest packet processing in a single appliance – 440 Mpps, 300 Gbps
- 6M fps flow-based detector (22x the competition)
- 3,000 active Zones for building scalable DDoS scrubbing services
Advanced DDoS Detection
- Fast time-to-detect at scale with minimal manual configuration needed
- Intelligent granularity (victim net/IP)
- Automatic network slicing and continuous profiling
Management & Analytics
- Single real-time Dashboard for Defend suite devices
- Intelligent service discovery with automatic mitigation policy assignment
- Instantly create and adjust countermeasures
- Live visualization and geolocation tracking
DDoS-specific Intelligence
- Customized blocklists can be automatically downloaded
- Victim/attacker insights, trends, top attack vectors help inform security teams on how best to secure their organizations
- Up to 96M-entry class list for proactive blocking of toxic IP addresses
- Threat intelligence feed (powered by ThreatSTOP) updates as often as every 15 min.
Threat Intelligence
Over three dozen security threat intelligence sources to instantly recognize and block malicious traffic
Network Integrations
Simple, seamless integration into your existing network infrastructure for on-demand reactive, always-on proactive, hybrid DDoS, and distributed detection with One-DDoS Protection deployment options.
Infrastructure Integration
BGP, IS-IS, OSPF, GRE, VXLAN protocols for seamless integration into your environment
SecDevOps Integration
100% REST API coverage of all functionality
High-speed Logging
Flow-based detector and third-party detector integration: Flowmon, Kentik, Flowtraq, Deepfield
Role-based Access
Role-based access and authentication with LDAP, RADIUS and TACACS+
DDoS Attackers Uncovered
This report summarizes data collected by the A10 security research team and provides a snapshot of a constantly changing global weapons landscape with insight into the sources, types and other characteristics of DDoS weapons.