//////////////////////////////////////////////////////////////////// t TECH
cht TALK
lk
The A10 Thunder SSLi solution not only
provides visibility of the traffic to security
devices, but it also sends logs and can mirror
the traffic for the SIEM and logging solution
and forensic analysis tools that allow CISOs
to keep historical logs and events in a
readable format. Moreover, A10 Networks
can support the ICAP protocol to feed and
activate the DPI and AV solutions.
What are the other features CISOs
can leverage from Thunder SSLi?
Many built-in features come with Thunder
SSLi. Application Access Management
(AAM), URL filtering and application visibility
come on top of the list. AAM enables us to
integrate with AAA servers to apply policies
and track activities per user.
URL filtering helps to ensure compliance with
privacy standards so we can bypass SSLi for
specific categories like finance or health, for
instance. Last but not least is application
visibility, where we can identify and classify the
applications even without decryption based
www.intelligentcio.com
“
A10 NETWORKS
HAS INTRODUCED
A BUILT-IN
APPLICATION
TEMPLATE
TO DEPLOY
MORE THAN 15
APPLICATIONS
IN ALL NEW ACOS
RELEASES.
on the protocol ID and apply policies, such as
blocking WhatsApp, or we may allow Facebook
but block chatting on Facebook, for example.
We can go further than that and deploy a
full secure web gateway with transparent
or explicit proxy setup and use the
aforementioned features.
What would you say to CISOs who
might consider Thunder SSLi a
complex solution to deploy?
A10 Networks has introduced a built-in
application template to deploy more than
15 applications in all new ACOS releases.
SSLi provides a wizard to enable any feature
the security team wants to employ. Later
on, editing or modifying the configurations
using the same built-in template is possible.
Furthermore, Thunder SSLi provides a
detailed dashboard where the security team
can monitor the performance and report
any issue instantly. A10 Networks supports
all deployment modes such as Layer 2 or
Layer 3 or even fully transparent and security
devices can also be transparent or Layer
2 or Layer 3. It is worth mentioning that
A10 Networks also supports multi-tenancy
to divide the same Thunder instance
into isolated partitions to cover multiple
segments on the network. n
INTELLIGENTCIO
79