Intelligent CISO Issue 19 | Page 35

 PREDI C TI VE I NTEL L I GE NC E Deploying our SSLi solution and forwarding the traffic to many inline and non-inline security devices eliminates the decryption overhead of each security device. for specific categories like finance or health, for instance. Last but not least is application visibility, where we can identify and classify the applications even without decryption based on the protocol ID and apply policies, such as blocking WhatsApp, or we may allow Facebook but block chatting on Facebook, for example. We can go further than that and deploy a full secure web gateway with transparent or explicit proxy setup and use the aforementioned features. www.intelligentciso.com | Issue 19 What would you say to CISOs who might consider Thunder SSLi a complex solution to deploy? A10 Networks has introduced a built-in application template to deploy more than 15 applications in all new ACOS releases. SSLi provides a wizard to enable any feature the security team wants to employ. Later on, editing or modifying the configurations using the same built-in template is possible. Furthermore, Thunder SSLi provides a detailed dashboard where the security team can monitor the performance and report any issue instantly. A10 Networks supports all deployment modes such as Layer 2 or Layer 3 or even fully transparent and security devices can also be transparent or Layer 2 or Layer 3. It is worth mentioning that A10 Networks also supports multi-tenancy to divide the same Thunder instance into isolated partitions to cover multiple segments on the network. u 35