A10 DDOS PROTECTION CLOUD

Similar documents
EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE

TALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT

TALK THUNDER TPS SURGICAL MULTI-VECTOR DDOS PROTECTION WITH A10 DATA SHEET DDOS DETECTION & MITIGATION

TALK THUNDER TPS SURGICAL MULTI-VECTOR DDOS PROTECTION WITH A10 DATA SHEET DDOS DETECTION, MITIGATION & CLOUD PROTECTION

TALK THUNDER TPS SURGICAL MULTI-VECTOR DDOS PROTECTION WITH A10 DATASHEET DDOS PROTECTION & MITIGATION

TESTING DDOS DEFENSE EFFECTIVENESS AT 300 GBPS SCALE AND BEYOND

WHITE PAPER. DDoS of Things SURVIVAL GUIDE. Proven DDoS Defense in the New Era of 1 Tbps Attacks

THUNDER TPS Next-generation DDoS Protection

A10 HARMONY CONTROLLER

Thunder TPS. Overview. A10 Networks, Inc.

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

DDoS Detection&Mitigation: Radware Solution

WHITE PAPER Hybrid Approach to DDoS Mitigation

SUPERCHARGE YOUR DDoS PROTECTION STRATEGY

THUNDER TPS Next-generation DDoS Protection

Comprehensive datacenter protection

THUNDER TPS Next-generation DDoS Protection

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE

THUNDER TPS Next-generation DDoS Protection

and public cloud infrastructure, including Amazon Web Services (AWS) and AWS GovCloud, Microsoft Azure and Azure Government Cloud.

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

WHITE PAPER A10 SSL INSIGHT & FIREWALL LOAD BALANCING WITH SONICWALL NEXT-GEN FIREWALLS

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

FortiDDoS Deployment Guide for Cloud Signaling with Verisign OpenHybrid

A GUIDE TO DDoS PROTECTION

A10 SSL INSIGHT & SONICWALL NEXT-GEN FIREWALLS

THUNDER WEB APPLICATION FIREWALL

DDoS Managed Security Services Playbook

Inline DDoS Protection versus Scrubbing Center Solutions. Solution Brief

DEPLOYMENT GUIDE HOW TO DEPLOY MICROSOFT SHAREPOINT 2016 WITH A10 THUNDER ADC

Silverline DDoS Protection. Filip Verlaeckt

DNS SECURITY BENEFITS OF OUTSOURCING YOUR DNS TO AN IP ANYCAST+ PROVIDER

Imperva Incapsula Product Overview

Imma Chargin Mah Lazer

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

Thunder Series for MobileIron Sentry

Corrigendum 3. Tender Number: 10/ dated

DEUTSCHE TELEKOM TERASTREAM: A NETWORK FUNCTIONS VIRTUALIZATION (NFV) USING OPENSTACK

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

Fregata. DDoS Mitigation Solution. Technical Specifications & Datasheet 1G-5G

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Herding Cats. Carl Brothers, F5 Field Systems Engineer

Large FSI DDoS Protection Reference Architecture

DDOS DETECTION AND RESPONSE TRENDS IN THE ENTERPRISE: AN IANS CUSTOM REPORT

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Check Point DDoS Protector Introduction

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Pulse Secure Application Delivery

War Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

F5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe

SSL INSIGHT SSL ENCRYPTION CHALLENGES SSL USE EXPOSES A BLIND SPOT IN CORPORATE DEFENSES SOLUTION BRIEF UNCOVER HIDDEN THREATS IN ENCRYPTED TRAFFIC

Solution Overview Gigamon Visibility Platform for AWS

F5 Synthesis Information Session. April, 2014

Brocade Flow Optimizer

MICRON21 BUILDS WORLD-CLASS DATA CENTRE WITH A10 LOAD-BALANCING, SECURITY AND CLOUD SOLUTIONS

Your First Line of Defense AGAINST DDOS ATTACKS. change the rules for inspection performance, security intelligence and

Flow-based Traffic Visibility

haltdos - Web Application Firewall

Protect Against Evolving DDoS Threats: The Case for Hybrid

Arbor White Paper Keeping the Lights On

Security Overview and Cisco ACE Replacement

Arbor Solution Brief Arbor Cloud for Enterprises

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

Secure your Web Applications with AWS WAF & AWS Shield. James Chiang ( 蔣宗恩 ) AWS Solution Architect

Multi-vector DDOS Attacks

Radware s Attack Mitigation Solution Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Cloudflare Advanced DDoS Protection

Practical Guide to Choosing a DDoS Mitigation Service WHITEPAPER

INTRODUCTION: DDOS ATTACKS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

DDoS Mitigation & Case Study Ministry of Finance

Downtime by DDoS: Taking an Integrated Multi-Layered Approach. Arbor Solution Brief

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT

Compare Security Analytics Solutions

Advanced Attack Response and Mitigation

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions

Symantec Network Security 7100 Series

F5 DDoS Hybrid Defender : Setup. Version

WEB DDOS PROTECTION APPLICATION PROTECTION VIA DNS FORWARDING

A10 Thunder Series Application Delivery Controller (ADC)

NETWORK DDOS PROTECTION STANDBY OR PERMANENT INFRASTRUCTURE PROTECTION VIA BGP ROUTING

SERVICE DESCRIPTION MANAGED FIREWALL/VPN

Corero SmartWall TDS Real-time, Automatic and Highly-Scalable DDoS Defense Solutions

Corero SmartWall TDS Real-time, Automatic and Highly-Scalable DDoS Defense Solutions

SmartWall Threat Defense System - NTD1100

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Insight Guide into Securing your Connectivity

Fighting the Shadows: How to Stop Real-world Cybersecurity Application Threats That You Can t See

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

68% 63% 50% 25% 24% 20% 17% Credit Theft. DDoS. Web Fraud. Cross-site Scripting. SQL Injection. Clickjack. Cross-site Request Forgery.

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Transcription:

DATA SHEET A10 DDOS PROTECTION CLOUD A10 Networks provides full spectrum DDoS defenses. This includes multi-vector protection from attacks of any type to ensure the availability of enterprise business services. The combination of a surgically precise, on-premise appliance along with orchestrated cloud scrubbing is delivered in cost-efficient form-factors and subscription models. PRODUCTS AND SERVICES DSIRT DDOS PROTECTION CLOUD FULL SPECTRUM ENTERPRISE DDOS PROTECTION With the increase in sophistication, intensity and frequency of DDoS attacks, enterprises are realizing that cloud DDoS scrubbing is a good option, but not a panacea by itself. A hybrid approach delivers the best protection. Cloud scrubbing is most effective when attack volume grows beyond the capacity of an enterprise s internet pipe. Yet enterprises need to complement their cloud solutions with the surgical precision and context-aware controls offered by A10 s on-premise DDoS defenses. These defenses protect users and applications from more frequent, smaller, and sophisticated attacks with alwayson and instant protection. These attacks can overwhelm resources on applications, services and security equipment, and distract IT staff from real attacks that are happening. These attacks result in application downtime, wasted IT resources and security overspend, and should not be permitted to enter and disrupt the enterprise network. DDoS Protection Cloud protects your organization when volumetric attacks grow past your internet bandwidth capacity. It works in concert with A10 Thunder TPS and is delivered as a service orchestrated by A10 DDoS Security Incident Response Team (DSIRT). DDoS Protection Cloud is a cost-effective DDoS defense solution. Other DDoS scrubbing services charge based on DDoS attack traffic volumes. With DDoS Protection Cloud, you pay only for legitimate traffic, the number of routers protected and the number of times cloud-scale scrubbing is needed. There are no hidden fees based on the number of network segments or geographic locations. And because A10 Thunder TPS (Threat Protection System) deflects all attacks that fall under your on-premise internet bandwidth, A10 s twopronged hybrid defense is the most effective and economical full spectrum DDoS defense solution. ON-PREMISE APPLIANCES THUNDER TPS Physical Appliance vthunder TPS Virtual Appliance TALK WITH A10 WEB V agalaxy Management a10networks.com/tps CONTACT US a10networks.com/ contact 1

BENEFITS MAINTAIN SERVICE AVAILABILITY Downtime results in immediate productivity and revenue loss for any business. A10 s hybrid DDoS protection solution ensures service availability by spotting anomalies automatically across the traffic spectrum and mitigating multi-vector DDoS attacks of any type. DEFEAT GROWING ATTACKS Our hybrid DDoS solution protects the most demanding network environments. Thunder TPS offloads common attack vectors to specialized hardware, allowing its powerful, multicore CPUs to distinguish legitimate users from attacking botnets and complex application-layer attacks that require resource-intensive deep packet inspection (DPI). When attacks grow past an organization s internet bandwidth capacity, DSIRT orchestrates traffic redirection to DDoS Protection Cloud for traffic scrubbing. DEPLOY WARTIME SUPPORT No organization has unlimited trained personnel or resources during real-time DDoS attacks. Thunder TPS supports five levels of programmatic mitigation escalation and de-escalation per protected zone. This eliminates the need for frontline personnel to make time-consuming manual changes to escalating mitigation strategies and improves response times during attacks. Administrators have the option to manually intervene as well as to coordinate with A10 s DSIRT, a team of trained security personnel, to redirect network traffic to DDoS Protection Cloud for volumetric attack scrubbing. $ REDUCE SECURITY OPEX A10 DDoS Protection Cloud service is built to protect your legitimate traffic, not for the amount of traffic that attacks apply against you. You are only charged for the protected traffic and the number of times cloud-scale scrubbing is required. There are no hidden charges for the number of network segments or geographic locations to be protected. 2

REFERENCE ARCHITECTURES Clean Traffic Telemetry Edge Router Thunder TPS Firewall Services PROACTIVE MODE DSIRT DDoS Protection Cloud DSIRT (Hybrid) REST API, sflow, Syslogs agalaxy UI GUI, REST API Proactive on-premise mode provides continuous, comprehensive detection and faster mitigation. This mode is most useful for environments where user experience and application performance is critical. TPS supports L2 or L3 inline deployments. L3 deployment eliminates the need for network interruption during installation or required maintenance windows. A10 DSIRT orchestrates traffic redirection on an on-demand basis. API Communication agalaxy DSIRT DDoS Protection Cloud DSIRT (Hybrid) Flow-based Detection Flow Information Suspected Traffic BGP Thunder TPS Clean Traffic API, sflow, Syslogs UI GUI, REST API REACTIVE MODE Edge Router Access Router Firewall Services Larger networks benefit from reactive on-premise mitigation, triggered by Thunder TPS Detector from edge router flow records. TPS fits in any network configuration with integrated BGP and other routing protocols. DSIRT orchestrates traffic redirection on an on-demand basis. 3

FEATURES COMPLETE HYBRID DDOS SOLUTION A single-vendor solution for DDoS protection through surgical precision on-premise, cloud scrubbing, redirection orchestration, support and professional services. $ COST EFFECTIVE HYBRID DDOS SOLUTION You re charged only for the protected traffic not the amount of attack traffic. No additional cost for number of IP blocks protected. FULL SPECTRUM PROTECTION Application, network and sophisticated attack protection on-premise with volumetric DDoS attack cloud scrubbing. MAINTAIN CONTROL OVER APPLICATION PROTECTION Flexible controls over on-premise defenses tuned to your legitimate users application access. SCALE FOR VOLUMETIC ATTACKS The service is backed by purposebuilt, globally distributed scrubbing centers scaled to handle the largest known DDoS volumetric attacks, all orchestrated by A10 DSIRT. ORCHESTRATED CLOUD REDIRECTION Respond faster and minimize outages with (DSIRT) orchestrated cloud redirection. EASY NETWORK INTEGRATION Support for BGP and DNS cloud redirection. 24-7 PROTECTION SUPPORT Spin up 24-7 DDoS attack support from the A10 DSIRT, included with A10 support. 4

Features (Cont.) SMALL, EFFECTIVE ON-PREMISES FOOTPRINT Thunder TPS s surgical detection and mitigation is available as a virtual appliance or as hardware appliances ranging from 2 Gbps to 152 Gbps mitigation bandwidth in just 1 RU form factor. A10 leverages the market proven Verisign DDoS protection platform to deliver a full spectrum DDoS protection solution. SERVICE DELIVERY OPTIONS 95% AGGREGATE CLEAN TRAFFIC VOLUME LIMITED CLOUD REDIRECTION OPTION (per year) UNLIMITED CLOUD REDIRECTION OPTION AVAILABLE 20 4 50 8 100 8 Clean Traffic Volume Categories (Mbps) 500 12 1,000 12 2,000 12 4,000 12 Yes 6,000 12 8,000 12 Number of Routers Protected Contact A10 for greater than 8,000 Mbps Pricing based on number of routers protected (for BGP redirection mode) Mitigation Interval Each mitigation includes up to 48 hours of usage. Usage beyond 48 hours, will be automatically counted as more than one mitigation. 5

DETAILED FEATURE LIST Features may vary by appliance. Traffic Redirection Modes BGP with redundant GRE tunnel return path Unlimited protection for all IP blocks at no additional charge DNS 5 protected VIPs for 500 Mbps clean traffic or less categories 10 protected VIPs for 1000 Mbps clean traffic or more categories Additional protected VIPs available Thunder TPS On-Premises In-line packet-based DDoS detection Out-of-band flow-based DDoS detection Peacetime behavioral learning Manual and learned thresholds A10 DDoS Threat Intelligence, included with support Application attack protection Application-aware filter Regular expression filter (TCP/ UDP/HTTP) HTTP request rate limit (per URI) DNS request rate limit (per type) DNS query check DNS domain-list HTTP protocol compliance Application (DNS/HTTP) flood protection Amplification attack protection Resource attack protection SYN Flood Fragmentation attack Slowloris Slow GET/POST Long form submission SSL renegotiation Protocol attack protection Invalid packets Anomalous TCP flag combinations (no flag, SYN/FIN, SYN frag, LAND attack) IP options Packet size validation (ping of death) POODLE attack TCP/UDP/ICMP flood protection Per-connection traffic control LEARN MORE ABOUT A10 NETWORKS CONTACT US a10networks.com/contact 2018 A10 Networks, Inc. All rights reserved. A10 Networks, the A10 Networks logo, ACOS, A10 Thunder, Thunder TPS, A10 Lightning, A10 Harmony, and SSL Insight are trademarks or registered trademarks of A10 Networks, Inc. in the United States and other countries. All other trademarks are property of their respective owners. A10 Networks assumes no responsibility for any inaccuracies in this document. A10 Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. For the full list of trademarks, visit: www.a10networks. com/a10-trademarks. Part Number: A10-DS-15127-EN-01 JAN 2018 6