Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!

Nessar

Logo
Vi

Sản phẩm

SSL Insight SSL Insight is a comprehensive SSL/TLS decryption solution that enables your security devices to efficiently analyze all enterprise traffic while: Eliminating the blind spot Ensuring compliance and privacy Boosting performance for increased ROI of your security stack Key Benefits of Thunder SSLi Eliminate the Blind Spot Enable your security devices to detect and […]

A10 Thunder SSLi (SSL Insight)

SSL Insight

SSL Insight is a comprehensive SSL/TLS decryption solution that enables your security devices to efficiently analyze all enterprise traffic while:

  • Eliminating the blind spot 
  • Ensuring compliance and privacy
  • Boosting performance for increased ROI of your security stack

Key Benefits of Thunder SSLi

Eliminate the Blind Spot

  • Enable your security devices to detect and stop hidden threats
  • Augment your entire security infrastructure, including inline, out-of-band and ICAP enabled devices
  • Gain full control over cipher selection to ensure continued security

Ensure Compliance and Privacy

  • Ensure compliance with security and privacy standards like HIPAA, PCI and GDPR
  • Maintain granular, policy-based control over your network traffic
  • Ensure user privacy with traffic categorization and bypassing

.

Increase ROI

  • Secure your investments by eliminating the blind spot that affects your existing security devices
  • Boost the performance of your security infrastructure by off-loading decryption
  • Avoid unnecessarily replacing or upgrading your existing devices

  • Decrypt traffic across all TCP ports and advanced protocols like SSH, STARTTLS, XMPP, SMTP and POP3
  • Deliver high- performance decryption with multiple cipher suites including elliptical curve cryptography (ECC) for perfect forward secrecy (PFS) support
  • Provide visibility to all security devices, including inline, out-of-band and ICAP- enabled devices

  • Stop encrypted data exfiltration by providing visibility to your existing Data Loss Prevention (DLP) systems
  • Connect to any DLP system using the in built-in ICAP support

  • Control which ciphers are used for encryption between the client and SSLi, and between the SSLi and server
  • Renegotiate to ciphers of similar strength to prepare for future ciphers or TLS versions
  • Be ready for TLS 1.3, avoiding deployment complications

  • Selectively bypass traffic decryption to enforce privacy policies using a list of over 460 million domains
  • Ensure compliance with GDPR by decrypting traffic selectively and stopping encrypted data exfiltration
  • Use URL filtering to block access to specific web categories, including known malicious destinations, to maximize employee productivity and security
  • Leverage multiple onboard HSMs to enable secure and tamper-proof storage of encryption keys

  • Selectively steer traffic based on fine-grained policies including application type and/or user ID
  • Increase security capacity by load-balancing multiple security devices
  • Augment SaaS growth with traffic categorization and local breakout

  • Gain real-time, actionable insights into traffic statistics, categorization, suspicious activities, and more
  • Manage multi-site deployments from a central location
  • Simplify management and configuration with on-box AppCentric Templates (ACTs)

Network Integration

Built to seamlessly integrate with your existing security infrastructure

Next- Generation Firewalls

  • Cisco FirePOWER and WSA
  • Palo Alto Networks NGFW
  • Check Point NGFW
  • SonicWALL SuperMassive NGFW

Intrusion Prevention Systems

  • McAfee Network Security Platform
  • Secureworks iSensor
  • Fidelis Cybersecurity Network

Advanced Threat Protection

  • FireEye Network Security
  • OPSWAT ICAP Server

Other Integrations

  • Digital Guardian DLP
  • RSA NetWitness
  • Symantec ProxySG and DLP
  • Forcepoint Trusted Gateway System
  • IBM QRadar Incident Forensics
  • Trend Micro Deep Security
  • Bivio Networks Cybersecurity

Additional Options

Additional services, products, solutions in which you may be interested.

 

Harmony Controller

Gain comprehensive, real-time and actionable insights with application-level visibility.

Simplify operations and increase agility. Centrally- manage deployment and security policy implementation.

Thunder CFW

Upgrade to a Thunder CFW and gain access to additional security capabilities, including stateful and application-level firewall capabilities.

.

SSL Visibility Scale-Out with Thunder ADC

For solutions where hyperscale performance is required, Thunder ADC can be used to distribute traffic across multiple Thunder SSLi devices.

DATASHEET