A10 Thunder TPS Overview

A10 Thunder TPS is the #7 ranked solution in our list of top DDoS tools. It is most often compared to Arbor DDoS: A10 Thunder TPS vs Arbor DDoS

What is A10 Thunder TPS?

The Thunder TPS is a family of high-performance DDoS defense solutions that detect and mitigate multi-vector DDoS attacks. Unlike traditional DDoS defenses that leave a wake of collateral damage against users, Thunder TPS applies a source-based defense-in-depth mitigation pipeline. This multimodal defense that includes actionable DDoS weapons intelligence, operator definable adaptive policies, and machine learning-powered Zero-Day Automated Protection (ZAP) blocks attackers while protecting real users.

The Thunder TPS is uniquely suited for communication service providers, online gaming, and enterprise network operators who protect large networks and need compact solutions with faster response from a fully automated, zero-touch defense during an attack.

A10 Thunder TPS Buyer's Guide

Download the A10 Thunder TPS Buyer's Guide including reviews and more. Updated: May 2021

A10 Thunder TPS Customers

DDoS defense solution trusted for more than 200 service providers, online gaming, and enterprises including; Bungie, Comcast, KDDI Corporation, Leaseweb, Microsoft Azure, NTT Docomo, Softbank, Turkcell Superonline, Verizon and more.

A10 Thunder TPS Video

Pricing Advice

What users are saying about A10 Thunder TPS pricing:
  • "Pricing was much higher with Arbor (APS) for the same type of solution."
  • "The financials are always a challenge with this type of technology. That's not really a product-functionality thing but it's the area where we push A10 the most."
  • "Pricing is very reasonable."
  • "We had a customer who was down for six hours and the loss of revenue for him was three times the price he was paying for us per year. The customer just said, "I don't care about paying you because on only one attack I saved money. It's three times better than losing money.""

Filter Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
DA
SOC Manager at a media company with 1,001-5,000 employees
Real User
Enabled us to ramp off our upstream cloud-scrubbing provider and handle all attacks on our own

What is our primary use case?

We use it for DDoS mitigation. Availability is extremely critical to our business. We provide online services for two, large video game titles, so there's a requirement to keep our game online and for our players to be able to play the game. We use it on-prem.

Pros and Cons

  • "Based on previous equipment that we had, it's amazing that this device can do what it can do in a 1U form factor. The devices that we have right now have never gone over capacity and we've actually mitigated some pretty large attacks."
  • "We currently do not use the solution's machine-learning-powered Zero-day Automated Protection because of an issue with it... We also use the aGalaxy platform, which is a management platform for the TPS devices. The issue is that some TPS features were added at the TPS level but weren't carried over to aGalaxy, and we manage all of our devices through aGalaxy. So we can't actually use some of the new features that are available on the TPS because that functionality doesn't exist in aGalaxy. That is one of my biggest complaints."

What other advice do I have?

The type of configuration and the type of network you're planning on running really matters. A10 does a good job of letting you know what's available and what works for the company, depending on those needs. For our use, we needed to be full, 100 percent on. Some companies don't require that and they can afford some type of downtime for BGP cut-over and such. My advice would be to really work with the A10 engineering team on what your needs are and what you're looking for in a product, to make sure that is a viable option. We spoke a lot with other gaming companies that were using the solution…
Managing Director Leaseweb Network at Leaseweb
Real User
Enables us to mitigate almost all attacks we detect, and with reduced manual intervention

What is our primary use case?

As a cloud infrastructure and hosting company, we provide public and private cloud services. We use the A10 technology to protect our customers against DDoS attacks against their hosting instances. The latter could be dedicated servers or virtual servers or data storage platforms. We have technology in place to detect attacks at the border routers of our networks in all 20 data centers worldwide where we operate. If we detect an attack, we reroute the traffic of the IP addresses that are being attacked to the A10 Thunder systems. They drop the malicious attack traffic and they pass through the… more »

Pros and Cons

  • "The primary benefit that we see from their systems is that their filtering technology has the ability to detect and drop the malicious traffic from the legitimate traffic with a high success rate. That, in combination with the very small effort needed to manage their systems, are the two most important benefits to us."

    What other advice do I have?

    From our perspective, the technology works well, and it has a low cost to maintain and manage. One of the biggest lessons for me, in using this solution, was that there are so many smaller attacks going on that we were not aware of and which must have had an impact on the satisfaction of our customers, as well as the satisfaction of their customers. Everybody always talks about the huge attacks, the one- or two-terabit attacks that get into the news. But the fact there is such a huge volume of smaller attacks going, script kiddies, etc., to make other people's lives miserable was, to me, a bit…
    Learn what your peers think about A10 Thunder TPS. Get advice and tips from experienced pros sharing their opinions. Updated: May 2021.
    479,816 professionals have used our research since 2012.
    TD
    Director of IT Networks at a comms service provider with 201-500 employees
    Real User
    Eliminates the need for our engineers to spend time mitigating attacks

    What is our primary use case?

    We use it for DDoS mitigation. First of all, we decided that outsourcing it or putting it out into the cloud was just too expensive, so we decided to build our own scrubbing center rather than outsource it to somebody else. We use it to protect against DDoS attacks. It's on-prem.

    Pros and Cons

    • "The response time to an attack is instant. We've used some outsourced solutions in the past, out in the cloud, that weren't so quick. But it's all within our control now. We control how fast it mitigates."
    • "The last issue we had to contact them about was just a question of a false-positive. The A10 system wasn't supposed to decide what is a false-positive. So if we send it good traffic, it's supposed to just pass that good traffic through. But we opened this last ticket because the A10 did block some of the good traffic. Their support had to tweak it a little bit, but it wasn't anything that took a long time."

    What other advice do I have?

    Don't even think twice about doing it. It's a given in this day and age; you just need to do it. You need to have some form of DDoS mitigation in place. And if you don't, God be with you. It's not a matter of if you will be attacked. A lot of ISPs think, "Oh, I'm too small," and even some enterprise customers think that way: "I'm too small. Nobody's going to attack me." These botnets don't care. They don't even know who you are. They just start sweeping IPs and, if they find some vulnerability or somebody decides that they'd like to attack even a customer of ours, it's going to happen. It's…
    Co-Founder at Acorus Networks
    Reseller
    Protects our customers against attacks. The upgrade process is inefficient and needs improvement.

    What is our primary use case?

    We work like an MSSP. We provide massive capacity and other network capacity to customers. We have customers connect anywhere on back burn. It can be in Europe. It can be in the US or in Asia. We plug the attack anywhere on the back burn, trying plug the attack closest to the source of the attack. So, we don't work like all the other guys who do scrubbing centers. We try to build a scrubbing network. That is why we need to buy more TPS in order to be distributive. When we start to work with the customer, we don't know what they have. The goal for them is to be able to block any type of massive… more »

    Pros and Cons

    • "We selected the solution because of its programmable automated defense using RESTful API. We didn't want to connect to the box. We wanted to be able to do some automation. We wanted to have our own portal because we wanted to connect our customers to our own UI using the A10 API. It has been good and exactly what we need."
    • "The upgrade process for the boxes is not efficient. We have to go through the A10 aGalaxy where we have issues, like timeouts. They told me it was fixed in the latest version, but I tried to do it on the Portal and it is not working all the time."

    What other advice do I have?

    The solution is not for newbies. You need to know some security stuff. The box is very flexible and capable with a lot of possibilities. We are using A10, not just as a mitigation box. We provide the TPS box and all its mitigation backbone to our customer as a tool. At some point, we are obliged to do some training and do some testing in our lab for them. DDoS attacks are evolving every day. Attackers are getting smarter. You have to continue to learn and experiment.
    TP
    Ethernet IP Engineer at a comms service provider with 11-50 employees
    Real User
    Our customers that are directly connected have almost instantaneous mitigation

    What is our primary use case?

    Availability is very critical for us. We use it to mitigate DDoS attacks for rural North Dakota. We really don't use it to identify attacks, we use third-party software, a Kentik solution, to identify anomalies within the IP stack. Then, we turn around and send mitigation profiles to the A10 based on an API call, and the A10 initializes a BGP session to our core routers to offload that traffic and mitigate it. We provide hosted solutions so our deployment of A10 is private cloud.

    Pros and Cons

    • "The solution has reduced the amount of manual intervention required during an attack. We have the inline solution and when it comes to the customers that we have on it, it has saved us some troubleshooting time."
    • "If there's one aspect of A10 that needs improvement it would be the training. All of their training is done online, at least in what we've been exposed to. I would like to have a classroom environment for training... It would give [people] a chance to provision it."

    What other advice do I have?

    Do your research to understand your solution options. Then, have a PoC bake-off and task the system. Identify ad-hoc anomalies in your test-bed and look at the time to mitigation. Look at different types of situations to see, if an anomaly comes along, how long it would take you to deploy an ad-hoc solution or redirect the traffic. Research and proof of concept is our biggest thing. We never do anything without doing them thoroughly. The biggest thing I have learned is how many attacks there are and how many different ways the attacks happen, throughout an attack. You can have a DNS attack…
    Technical Consultant at Westcon
    MSP
    Top 20
    A10 Thunder TPS (Threat Protection System) is the world’s highest-performance DDoS protection solution, leading the industry in precision, intelligent automation, scalability, and performance.

    What is our primary use case?

    One of the largest persistent threats to service uptime is Distributed Denial of Service Attacks (DDoS). The networking industry and business analysts are seeing a trend in increasing DDoS attacks. These attacks are occurring more frequently and with greater intensity and increased sophistication. Legacy DDoS protection solutions suffer from the following fatal limitations that have made them ineffective at protecting against these attacks: • Lack of flexibility • Inability to scale

    Pros and Cons

    • "The GUI is very use-friendly. You can configure it through CLI or GUI, they give you an option to choose. It's a good solution in terms of the appliance itself. It's very light compared to other brands that offer DDoS solutions."
    • "They have a cloud scrubbing feature that redirects the traffic if the on-prem appliance can't accommodate a large amount of traffic but it's not available where we are."

    What other advice do I have?

    Select Thunder TPS hardware models to benefit from our Security and Policy Engine (SPE) hardware acceleration, leveraging FPGA-based FTA technology and other hardware-optimized packet-processing for highly scalable flow distribution and hardware DDoS protection capabilities.