Light Reading
A10 claims faster performance, smaller form factor, and simplified licensing compared with competition from Cisco and Juniper.

A10 Brings the Thunder for DDoS Protection

Mitch Wagner
7/15/2014
50%
50%

A10 introduced a security appliance to protect networks against DDoS attacks, claiming faster performance, a smaller form factor, and more simplified licensing than competition from Cisco and Juniper.

The Thunder SPE appliance is designed to provide up to 40% performance improvement over A10 Networks Inc. 's high-end 6430 system. The appliance runs A10's Security and Policy Engine, along with security and processing hardware to allow the appliance to continue providing full functionality even when the network is under high-volume DDoS attacks, without diminishing system performance, A10 says. The SPE appliance can handle 155 Gpb/s throughput.

The SPE appliance can perform any policy-based networking actions in hardware and can work in cloud environments where policies change frequently, A10 says.

The appliance is available immediately, priced at $164,000, and works with all A10 product lines.

A10 is also integrating DDoS protection into its Thunder CGN (Carrier Grade Networking) products, providing IPv4 address extension and IPv6 migration capabilities.

Kishore Inampudi, director product marketing for A10, says the SPE appliance offers superior performance in a much smaller form factor than Cisco Systems Inc. (Nasdaq: CSCO)'s competitive offerings, which require 7-8 RU to achieve the same performance as A10's 1 RU box, with associated increased power consumption and cooling costs for the Cisco unit. Juniper Networks Inc. (NYSE: JNPR)'s equivalent product also has a bigger form factor.

"Both Juniper and Cisco have bigger form factors, primarily because of their business model," he says. "They are selling a router or switch to solve this problem." Cisco and Juniper use blades to add additional capabilities.

Both Cisco's and Juniper's licensing are more complex than A10's, Inampudi says. Cisco offers a multi-protocol pricing plan, while Juniper prices are based on performance levels.

A10 introduced Thunder Series Layer 4-7 network appliances designed to help operators make the transition to 100G and IPv6 in April, and it entered the DDoS protection market in January. The company's IPO sputtered in March, but it said its revenues "leaped" in May. (See A10 Helps With 100G, IPv6 Transitions, A10 Enters DDOS Protection Market, A10 IPO Sputters Off the Ground, and A10 Networks Reports Revenues Leap in Q1 .)

The SPE appliance illustrates a potential problem for network functions virtualization -- performance. NFV calls for moving network capabilities, like DDoS protection, off appliances like the SPE and on to commodity servers. A potential problem with that proposition is that specialized appliances offer performance lacking in commodity servers. Appliances may simply be more suitable for carrier networks. Broadcom is touting a hybrid approach for that reason. (See Broadcom Touts Hybrid Hardware Approach to NFV.)

— Mitch Wagner, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profileFollow me on Facebook, West Coast Bureau Chief, Light Reading. Got a tip about SDN or NFV? Send it to wagner@lightreading.com.

(3)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
jabailo
50%
50%
jabailo,
User Rank: Light Sabre
7/15/2014 | 2:18:05 PM
Re: How...?
I guess a dumb DDOS attack would be -- single computer calling their server repeatedly.

Semi-smart would be multiple computers.

Super smart would be multiple computers with bots using staggered time schedules to simulate real users.

Of course, it would have to be a site that a person would call multiple times per day, or else you could just count the number of requests per IP address and shut down access at the firewall.

 
FakeMitchWagner
50%
50%
FakeMitchWagner,
User Rank: Lightning
7/15/2014 | 1:09:12 PM
Re: How...?
jabailo - Good question. I presume there is some kind of pattern to the attacks which smart protection systems can discern. 

One brute-force method of protecting against attacks is to just pile on more network capacity. That does not seem to be what's happening here.
jabailo
50%
50%
jabailo,
User Rank: Light Sabre
7/15/2014 | 10:35:17 AM
How...?
How exactly can you protect against DDOS attacks?   Don't they come as standard requests but from bots installed on client systems all over the Internet?  How would you distinguish say, a DDOS call to your home page from a user just browsing it?

 
Flash Poll
Wagner’s Ring
Data Centers Drive Telcos Into the Future

8|28|14   |   2:20   |   (2) comments


Data centers are at the heart of key trends driving telecom -- network virtualization, the drive for increased agility, and the need to compete with OTT providers.
LRTV Custom TV
Why SPs Should Consider Cisco's EPN

8|27|14   |   5:40   |   (0) comments


Sultan Dawood from Cisco discusses Cisco's EPN, which enables SPs to build agile and programmable networks delivering new network virtualized services using Cisco's Evolved Services Platform (ESP).
LRTV Huawei Video Resource Center
Huawei’s Showcase @ Big Telecom Event 2014

8|26|14   |   2.56   |   (0) comments


SoftCOM is Huawei's framework for telecom business and network transformation. Haofei Liu, Solution Marketing Manager, Carrier Business Group, Huawei, showcases Huawei's SoftCOM architecture in this video.
LRTV Huawei Video Resource Center
Huawei @ BTE 2014: Director of Integrated Solutions on SoftCOM & NFV Monetization

8|26|14   |   4.43   |   (0) comments


Libin Dai, Director of Integrated Solutions, Carrier Business Group, discusses Huawei's SoftCOM and NFV monetization. Huawei believes that NFV monetization should be service-driven rather than network-driven, and that operators should have network transformation, service transformation and a compatible and collaborative ecosystem in place in order to deploy NFV.
LRTV Huawei Video Resource Center
Huawei @ BTE 2014: Director of US NFV Lab on CloudEdge & the Future of NFV

8|26|14   |   4.06   |   (0) comments


Sean Chen, Director of US NFV Lab at Huawei, discusses Huawei's new approach to NFV in open collaboration. Huawei believes that through Proof of Concept tests, it could help operators learn and communicate with the industry more effectively. Sean believes that successful implementation of NFV should have its values reaching to end users and discusses how Huawei's ...
LRTV Huawei Video Resource Center
Huawei's Highlights @ Big Telecom Event 2014

8|26|14   |   3.34   |   (0) comments


At the Big Telecom Event in Chicago Huawei showcases its high-level strategy, the SoftCOM architecture, which helps operators reduce the cost of ownership of their network infrastructure and generate additional revenue in the ICT service environment. Huawei showcases over 30 pilot programs from across the globe, focusing on the industry-leading commercial ...
LRTV Custom TV
VeEX – Live from the Show

8|21|14   |   5:58   |   (0) comments


An overview of VeEX Test and Measurement solutions including TX300S multi-service test set with VeExpress cloud-based management system, UX400 universal modular platform supporting 100G testing, and the redesigned RXT modular platform.
LRTV Custom TV
Transitioning CE 2.0 Networks Into the SDN & NFV Era With Telco Systems

8|19|14   |   5:19   |   (0) comments


Telco Systems' Ariel Efrati (CEO) and Moshe Shimon (VP of Product Management) discuss virtualization and how the company's new Open Metro Edge solution utilizes the SDN and NFV concepts to accelerate and orchestrate service delivery through its innovative product portfolio and software applications.
LRTV Custom TV
NFV Myths: Is NFV Still Several Years Away?

8|11|14   |   1:13   |   (0) comments


Some say that NFV (network functions virtualization) is still several years away from being implemented on mobile operator networks. This isn't the case. Operators can get started on their paths to NFV now, as this short video from Skyfire shows.
LRTV Custom TV
A New Security Paradigm in SDN/NFV

7|28|14   |   02:54   |   (0) comments


Paul Shaneck, Global Director Network Solutions for Symantec, discusses the evolving virtualized network, explaining how Symantec is leading the security discussion as it relates to SDN and NFV, and helping to ensure the network is protected and compliant.
LRTV Documentaries
Sprint's Network Evolution

7|24|14   |   14:59   |   (0) comments


Sprint's Jay Bluhm gives a keynote speech at the Big Telecom Event (BTE) about Sprint's network and services evolution strategy, including Spark.
LRTV Documentaries
BTE Keynote: The Software-Defined Operator

7|24|14   |   18:43   |   (1) comment


Deutsche Telekom's Axel Clauberg explains the concept of the software-defined operator to the Big Telecom Event (BTE) crowd.
Upcoming Live Events!!
September 16, 2014, Santa Clara, CA
September 16, 2014, Santa Clara, CA
September 23, 2014, Denver, CO
October 29, 2014, New York City
November 6, 2014, Santa Clara
November 11, 2014, Atlanta, GA
December 9-10, 2014, Reykjavik, Iceland
June 9-10, 2015, Chicago, IL
Infographics
A survey conducted by Vasona Networks suggests that 72% of mobile users expect good performance all the time, and they'll blame the network operator when it's not up to par.
Hot Topics
Rogers, Shaw Take Aim at Netflix
Mari Silbey, Independent Technology Editor, 8/26/2014
Utilities to Pump $11.2B Into Smart Grid – Study
Jason Meyers, Senior Editor, Utility Communications/IoT, 8/26/2014
Verizon Launches QR Code Security Solution
Carol Wilson, Editor-at-large, 8/26/2014
Fiber Revival at Deutsche Telekom
Iain Morris, 8/25/2014
M2M's In Fashion: Wearables Play the US Open
Sarah Reedy, Senior Editor, 8/25/2014
Like Us on Facebook
Twitter Feed