The GUI is very use-friendly. You can configure it through CLI or GUI, they give you an option to choose. It's a good solution in terms of the appliance itself. It's very light compared to other brands that offer DDoS solutions.
Director of IT Networks at a comms service provider with 201-500 employees
Real User
2019-09-15T16:44:00Z
Sep 15, 2019
The response time to an attack is instant. We've used some outsourced solutions in the past, out in the cloud, that weren't so quick. But it's all within our control now. We control how fast it mitigates.
Ethernet IP Engineer at a comms service provider with 11-50 employees
Real User
2019-09-10T09:04:00Z
Sep 10, 2019
The solution has reduced the amount of manual intervention required during an attack. We have the inline solution and when it comes to the customers that we have on it, it has saved us some troubleshooting time.
SOC Manager at a media company with 1,001-5,000 employees
Real User
2019-09-05T16:30:00Z
Sep 5, 2019
Based on previous equipment that we had, it's amazing that this device can do what it can do in a 1U form factor. The devices that we have right now have never gone over capacity and we've actually mitigated some pretty large attacks.
We selected the solution because of its programmable automated defense using RESTful API. We didn't want to connect to the box. We wanted to be able to do some automation. We wanted to have our own portal because we wanted to connect our customers to our own UI using the A10 API. It has been good and exactly what we need.
The primary benefit that we see from their systems is that their filtering technology has the ability to detect and drop the malicious traffic from the legitimate traffic with a high success rate. That, in combination with the very small effort needed to manage their systems, are the two most important benefits to us.
The Thunder TPS is a family of high-performance DDoS defense solutions that detect and mitigate multi-vector DDoS attacks. Unlike traditional DDoS defenses that leave a wake of collateral damage against users, Thunder TPS applies a source-based defense-in-depth mitigation pipeline. This multimodal defense that includes actionable DDoS weapons intelligence, operator definable adaptive policies, and machine learning-powered Zero-Day Automated Protection (ZAP) blocks attackers while protecting...
The most valuable feature of A10 Thunder TPS is load balancing.
It is a scalable solution.
The solution's support is one of the coolest things about the product. I
Thunder TPS has automated mitigation and fully managed support in case the device cannot handle the attack. They have engineers available to respond.
They give us the ability to configure many features for DDoS. There are many items that we can use.
The GUI is very use-friendly. You can configure it through CLI or GUI, they give you an option to choose. It's a good solution in terms of the appliance itself. It's very light compared to other brands that offer DDoS solutions.
The response time to an attack is instant. We've used some outsourced solutions in the past, out in the cloud, that weren't so quick. But it's all within our control now. We control how fast it mitigates.
The solution has reduced the amount of manual intervention required during an attack. We have the inline solution and when it comes to the customers that we have on it, it has saved us some troubleshooting time.
Based on previous equipment that we had, it's amazing that this device can do what it can do in a 1U form factor. The devices that we have right now have never gone over capacity and we've actually mitigated some pretty large attacks.
We selected the solution because of its programmable automated defense using RESTful API. We didn't want to connect to the box. We wanted to be able to do some automation. We wanted to have our own portal because we wanted to connect our customers to our own UI using the A10 API. It has been good and exactly what we need.
The primary benefit that we see from their systems is that their filtering technology has the ability to detect and drop the malicious traffic from the legitimate traffic with a high success rate. That, in combination with the very small effort needed to manage their systems, are the two most important benefits to us.
We can keep track of all the customer's requirements. We can forecast our trails and we can forecast our overall financial things.