Secure & Scale 5G Networks

We help mobile operators future-proof their networks with agile and consolidated solutions, which result in improved security, hyperscale delivery, higher reliability, and lower TCO.

5G Requires High-performance, Software-based Security

Mobile operators are virtualizing their networks and deploying security solutions that leverage NFV and cloud-native technology. 5G security is critical for new use cases such as connected cars or tele-mentored surgery, which will drive stringent new security and latency requirements, as disruptions could be catastrophic.

Mobile Core Security​

To protect mobile infrastructure, the Thunder CFW Gi/SGi firewall provides granular control over network resources, allowing mobile carriers to block network attacks and unauthorized access. It incorporates a stateful firewall with a rich set of features to protect subscribers, and shields the mobile network data- and control-plane services from a wide array of threats

Protect Your Mobile Infrastructure

Traffic Steering

Mobile service providers are constantly exploring ways to enhance network utilization by steering traffic flows to the value-added services in a way that is transparent to the end user. Intelligently steering traffic can enable operators to offer personalized services to drive new revenue streams and improve operational efficiency for significant cost savings.​

Intelligently Steer Traffic

Mobile Roaming Security

Protect your mobile core and subscribers from GTP attacks and malicious or careless peers. Ensure secure, seamless interconnection with GTP firewall.​ Operators must now include a GTP firewall as part of their current network security posture and as they evolve the network to 5G.​

Protect Your Subscribers

How We Can Help

Our 5G solution portfolio provides highly flexible, advanced security at strategic locations in the mobile network, delivering unprecedented performance and scalability in software – VNFs, container, bare metal – or physical form factors, as needed.

Secure Network and Sustain Availability

  • Guarantee uptime and ensure control- and user-plane security with GTP firewall, Gi/SGi firewall, control- and user-plane policy enforcement, DNS protection and more.
  • Automate DDoS protection using artificial intelligence (AI) and machine learning (ML), Dynamic Attack Pattern Recognition (DAPR), continuous baselining, and distributed intelligence.

5G Hyperscale

  • Scale concurrent sessions to multi-billion levels and throughput to multi-terabit levels in a scale-out cluster.
  • 5G deployments can benefit from compact and efficient options in physical, virtual and container form factors.

Service Agility and Faster Network Rollout

  • Deliver services in a form factor that meets the needs of multi-generational mobile networks.
  • Integrate with leading SDN and NFV architectures and interoperate with multiple MANO environments.
  • Use flexible software licensing and consumption via A10’s FlexPool subscription-based capacity pooling
  • Access 100% API-driven capabilities for all functionality on A10 solutions for SecOps and DevOps requirements

Simplified Management & Intelligent Analytics

  • A10 Harmony Controller simplifies management tasks, while delivering comprehensive control across the Thunder portfolio.
  • Reduce the need for IT administrators to set up and configure per-application infrastructure.
Screenshot of the case study document, SK Telecom Launches World’s First 5G Service, Secured With A10 Thunder CFW
Case Study

SK Telecom Launches World’s First 5G Service, Secured With A10 Thunder CFW

SK Telecom (SKT), the largest mobile operator in South Korea, launched the world’s first commercial 5G service and needed to scale and secure its next-generation 5G ready network. SKT deployed Thunder CFW with Harmony Controller.

Download Case Study