PREDI C TI VE I NTEL L I GE NC E
Deploying our SSLi solution and forwarding
the traffic to many inline and non-inline
security devices eliminates the decryption
overhead of each security device.
for specific categories like finance or
health, for instance. Last but not least
is application visibility, where we can
identify and classify the applications
even without decryption based on the
protocol ID and apply policies, such
as blocking WhatsApp, or we may
allow Facebook but block chatting
on Facebook, for example. We can
go further than that and deploy a full
secure web gateway with transparent
or explicit proxy setup and use the
aforementioned features.
www.intelligentciso.com
|
Issue 19
What would you say to CISOs
who might consider Thunder SSLi
a complex solution to deploy?
A10 Networks has introduced a built-in
application template to deploy more
than 15 applications in all new ACOS
releases. SSLi provides a wizard to
enable any feature the security team
wants to employ. Later on, editing or
modifying the configurations using
the same built-in template is possible.
Furthermore, Thunder SSLi provides a
detailed dashboard where the security
team can monitor the performance
and report any issue instantly. A10
Networks supports all deployment
modes such as Layer 2 or Layer 3 or
even fully transparent and security
devices can also be transparent
or Layer 2 or Layer 3. It is worth
mentioning that A10 Networks also
supports multi-tenancy to divide the
same Thunder instance into isolated
partitions to cover multiple segments
on the network. u
35