Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 36

What is your primary use case for A10 Thunder TPS?

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

PeerSpot user
8 Answers
Ahmed Madibbo - PeerSpot reviewer
Professional Services Consultant at Ingram Micro
Top 20
Mar 15, 2022

We are the main distributor for A10 Networks. It is used as an appliance. It is mainly used to identify problems in the network. It helps us to stop any type of DDoS attack. We are using its latest version.

Search for a product comparison
Technical Consultant at Westcon
Real User
Apr 22, 2020

One of the largest persistent threats to service uptime is Distributed Denial of Service Attacks (DDoS). The networking industry and business analysts are seeing a trend in increasing DDoS attacks. These attacks are occurring more frequently and with greater intensity and increased sophistication. Legacy DDoS protection solutions suffer from the following fatal limitations that have made them ineffective at protecting against these attacks: • Lack of flexibility • Inability to scale

Director of IT Networks at a comms service provider with 201-500 employees
Real User
Sep 15, 2019

We use it for DDoS mitigation. First of all, we decided that outsourcing it or putting it out into the cloud was just too expensive, so we decided to build our own scrubbing center rather than outsource it to somebody else. We use it to protect against DDoS attacks. It's on-prem.

Ethernet IP Engineer at a comms service provider with 11-50 employees
Real User
Sep 10, 2019

Availability is very critical for us. We use it to mitigate DDoS attacks for rural North Dakota. We really don't use it to identify attacks, we use third-party software, a Kentik solution, to identify anomalies within the IP stack. Then, we turn around and send mitigation profiles to the A10 based on an API call, and the A10 initializes a BGP session to our core routers to offload that traffic and mitigate it. We provide hosted solutions so our deployment of A10 is private cloud.

SOC Manager at a media company with 1,001-5,000 employees
Real User
Sep 5, 2019

We use it for DDoS mitigation. Availability is extremely critical to our business. We provide online services for two, large video game titles, so there's a requirement to keep our game online and for our players to be able to play the game. We use it on-prem.

Raphael Maunier - PeerSpot reviewer
Co-Founder at Acorus Networks
Aug 30, 2019

We work like an MSSP. We provide massive capacity and other network capacity to customers. We have customers connect anywhere on back burn. It can be in Europe. It can be in the US or in Asia. We plug the attack anywhere on the back burn, trying plug the attack closest to the source of the attack. So, we don't work like all the other guys who do scrubbing centers. We try to build a scrubbing network. That is why we need to buy more TPS in order to be distributive. When we start to work with the customer, we don't know what they have. The goal for them is to be able to block any type of massive volume metric attack. The reason is why we have about a two terabytes capacity and are building to afford three to four terabytes of capacity. Therefore, anytime the customer needs to block something, we can configure for them any type of custom role. We are using them for a mitigation offer that we have globally. We have a bunch of A10s and will deploy more in a few weeks. We use both the hardware and software.

Find out what your peers are saying about A10 Networks, NETSCOUT, Radware and others in Distributed Denial of Service (DDOS) Protection. Updated: November 2022.
654,218 professionals have used our research since 2012.
Bart van der Sloot - PeerSpot reviewer
Managing Director Leaseweb Network at Leaseweb
Real User
Aug 18, 2019

As a cloud infrastructure and hosting company, we provide public and private cloud services. We use the A10 technology to protect our customers against DDoS attacks against their hosting instances. The latter could be dedicated servers or virtual servers or data storage platforms. We have technology in place to detect attacks at the border routers of our networks in all 20 data centers worldwide where we operate. If we detect an attack, we reroute the traffic of the IP addresses that are being attacked to the A10 Thunder systems. They drop the malicious attack traffic and they pass through the legitimate traffic to the servers or the virtual servers that our customers use. We deploy different types, different sizes of equipment. We use these solutions on-premises.

Jaffar Ali - PeerSpot reviewer
MEP Manager at TechnoBIZ
Feb 25, 2019

Our primary use case is for our support ticketing and invoice generation. We're resellers and we provide it to our customers. Our other use cases are for keeping a record of all the invoices and we use it for our sales to track the accrued sales.

Related Questions
Satya Prakash Jha - PeerSpot reviewer
Regional Sales Manager at a tech company with 501-1,000 employees
Sep 23, 2022
Hi community,  I am a Regional Sales Manager at a large tech company. Can you please provide a comparison between the following products: A10 Thunder TPS, Cloudflare, and Corero? What are the pros and cons of each product? Thank you.
User at self
Mar 22, 2021
How do these two products compare?
See 1 answer
Darryl Theron - PeerSpot reviewer
Director at Trace Network Operations
Mar 22, 2021
Hi Sean, What is your user case? i.e. Enterprise, Service Provider, MSP etc. I am partial to A10 Thunder TPS. Regards, Darryl Theron 
Related Solutions
Download Free Report
Download our free Distributed Denial of Service (DDOS) Protection Report and find out what your peers are saying about A10 Networks, NETSCOUT, Radware, and more! Updated: November 2022.
654,218 professionals have used our research since 2012.