2019-02-25T08:45:00Z

What is your primary use case for A10 Thunder TPS?

Miriam Tover - PeerSpot reviewer
  • 0
  • 32
PeerSpot user
12

12 Answers

David Mello - PeerSpot reviewer
Real User
Top 10
2023-08-31T14:32:06Z
Aug 31, 2023

We have our own data center, and we perform load balancing for a lot of internal and external services using A10 Thunder TPS. For some users, we use A10 Thunder TPS for HTTP protocol. We perform load balancing for HTTPS on A10 Thunder TPS and others with too much workload we have to do on the servers. We cannot do the load balancing using HTTPS. There is a limitation for SSL communication, but we had a problem with our application that started to hang. So, we had to change the SSL certificate to this server.

Search for a product comparison
Osman Nayan - PeerSpot reviewer
Real User
Top 5
2023-05-31T10:32:00Z
May 31, 2023

I use the solution to check the tickets and reports of the configuration site.

OL
Real User
Top 20
2023-05-10T14:52:00Z
May 10, 2023

We use A10 Thunder TPS for load balancing, especially server load balancing.

SA
Real User
Top 20
2023-01-18T18:51:13Z
Jan 18, 2023

Thunder TPS protects your network from DDoS attacks.

Ahmed Madibbo - PeerSpot reviewer
Reseller
2022-03-15T17:02:37Z
Mar 15, 2022

We are the main distributor for A10 Networks. It is used as an appliance. It is mainly used to identify problems in the network. It helps us to stop any type of DDoS attack. We are using its latest version.

JJ
Real User
2020-04-22T08:26:00Z
Apr 22, 2020

One of the largest persistent threats to service uptime is Distributed Denial of Service Attacks (DDoS). The networking industry and business analysts are seeing a trend in increasing DDoS attacks. These attacks are occurring more frequently and with greater intensity and increased sophistication. Legacy DDoS protection solutions suffer from the following fatal limitations that have made them ineffective at protecting against these attacks: • Lack of flexibility • Inability to scale

Find out what your peers are saying about A10 Networks, NETSCOUT, Radware and others in Distributed Denial of Service (DDOS) Protection. Updated: March 2024.
765,386 professionals have used our research since 2012.
TD
Real User
2019-09-15T16:44:00Z
Sep 15, 2019

We use it for DDoS mitigation. First of all, we decided that outsourcing it or putting it out into the cloud was just too expensive, so we decided to build our own scrubbing center rather than outsource it to somebody else. We use it to protect against DDoS attacks. It's on-prem.

TP
Real User
2019-09-10T09:04:00Z
Sep 10, 2019

Availability is very critical for us. We use it to mitigate DDoS attacks for rural North Dakota. We really don't use it to identify attacks, we use third-party software, a Kentik solution, to identify anomalies within the IP stack. Then, we turn around and send mitigation profiles to the A10 based on an API call, and the A10 initializes a BGP session to our core routers to offload that traffic and mitigate it. We provide hosted solutions so our deployment of A10 is private cloud.

DA
Real User
2019-09-05T16:30:00Z
Sep 5, 2019

We use it for DDoS mitigation. Availability is extremely critical to our business. We provide online services for two, large video game titles, so there's a requirement to keep our game online and for our players to be able to play the game. We use it on-prem.

RM
Reseller
2019-08-30T04:51:00Z
Aug 30, 2019

We work like an MSSP. We provide massive capacity and other network capacity to customers. We have customers connect anywhere on back burn. It can be in Europe. It can be in the US or in Asia. We plug the attack anywhere on the back burn, trying plug the attack closest to the source of the attack. So, we don't work like all the other guys who do scrubbing centers. We try to build a scrubbing network. That is why we need to buy more TPS in order to be distributive. When we start to work with the customer, we don't know what they have. The goal for them is to be able to block any type of massive volume metric attack. The reason is why we have about a two terabytes capacity and are building to afford three to four terabytes of capacity. Therefore, anytime the customer needs to block something, we can configure for them any type of custom role. We are using them for a mitigation offer that we have globally. We have a bunch of A10s and will deploy more in a few weeks. We use both the hardware and software.

BV
Real User
2019-08-18T07:52:00Z
Aug 18, 2019

As a cloud infrastructure and hosting company, we provide public and private cloud services. We use the A10 technology to protect our customers against DDoS attacks against their hosting instances. The latter could be dedicated servers or virtual servers or data storage platforms. We have technology in place to detect attacks at the border routers of our networks in all 20 data centers worldwide where we operate. If we detect an attack, we reroute the traffic of the IP addresses that are being attacked to the A10 Thunder systems. They drop the malicious attack traffic and they pass through the legitimate traffic to the servers or the virtual servers that our customers use. We deploy different types, different sizes of equipment. We use these solutions on-premises.

Jaffar Ali - PeerSpot reviewer
Reseller
Top 10
2019-02-25T08:45:00Z
Feb 25, 2019

Our primary use case is for our support ticketing and invoice generation. We're resellers and we provide it to our customers. Our other use cases are for keeping a record of all the invoices and we use it for our sales to track the accrued sales.

Distributed Denial of Service (DDOS) Protection
Distributed Denial of Service (DDOS) Protection Software is a category of software solutions designed to defend against and mitigate the impact of DDOS attacks.
Download Distributed Denial of Service (DDOS) Protection ReportRead more