Intelligent CIO Europe Issue 23 | Page 79

//////////////////////////////////////////////////////////////////// t TECH cht TALK lk The A10 Thunder SSLi solution not only provides visibility of the traffic to security devices, but it also sends logs and can mirror the traffic for the SIEM and logging solution and forensic analysis tools that allow CISOs to keep historical logs and events in a readable format. Moreover, A10 Networks can support the ICAP protocol to feed and activate the DPI and AV solutions. What are the other features CISOs can leverage from Thunder SSLi? Many built-in features come with Thunder SSLi. Application Access Management (AAM), URL filtering and application visibility come on top of the list. AAM enables us to integrate with AAA servers to apply policies and track activities per user. URL filtering helps to ensure compliance with privacy standards so we can bypass SSLi for specific categories like finance or health, for instance. Last but not least is application visibility, where we can identify and classify the applications even without decryption based www.intelligentcio.com “ A10 NETWORKS HAS INTRODUCED A BUILT-IN APPLICATION TEMPLATE TO DEPLOY MORE THAN 15 APPLICATIONS IN ALL NEW ACOS RELEASES. on the protocol ID and apply policies, such as blocking WhatsApp, or we may allow Facebook but block chatting on Facebook, for example. We can go further than that and deploy a full secure web gateway with transparent or explicit proxy setup and use the aforementioned features. What would you say to CISOs who might consider Thunder SSLi a complex solution to deploy? A10 Networks has introduced a built-in application template to deploy more than 15 applications in all new ACOS releases. SSLi provides a wizard to enable any feature the security team wants to employ. Later on, editing or modifying the configurations using the same built-in template is possible. Furthermore, Thunder SSLi provides a detailed dashboard where the security team can monitor the performance and report any issue instantly. A10 Networks supports all deployment modes such as Layer 2 or Layer 3 or even fully transparent and security devices can also be transparent or Layer 2 or Layer 3. It is worth mentioning that A10 Networks also supports multi-tenancy to divide the same Thunder instance into isolated partitions to cover multiple segments on the network. n INTELLIGENTCIO 79