Thunder Convergent Firewall

A convergent firewall that empowers enterprises and service providers to streamline their networks by consolidating security and application networking into a single, high-performance solution. Thunder CFW combines a Secure Web Gateway, Data Center Firewall, Gi/SGi Firewall and IPsec VPN together and leverages the ACOS Harmony platform to deliver outstanding performance.

Secure Web Gateway Data Center Firewall Gi/SGi Firewall IPSEC Site-to-site VPN Cloud-ready platform chosen by thousands of enterprises and service providers

 

download datasheet

FORM FACTOR OPTIONS >

 

Thunder Convergent Firewall's
Secure Web Gateway
How it benefits your business

Decrypt SSL once, inspect multiple times

Decrypt SSL once, inspect multiple times

Best-in-class SSL decryption eliminates the blind spot in corporate defenses by enabling third-party security devices to inspect encrypted traffic.

Superior URL classification coverage

Gain superior URL classification coverage

A cloud-based self-learning network that can classify over 13 billion URLs and 460 million domain names into over 83 web categories.

SSL decryption, URL filtering and ICAP integration

Extend the life of security infrastructure

The high-performance Thunder CFW platform offloads burdensome tasks such as SSL decryption, URL filtering and ICAP integration from perimeter security.

Key features

SSL decryption

SSL decryption

Discover hidden threats by decrypting SSL traffic and sending it unencrypted to inline and non-inline security devices for inspection.

URL filtering

URL filtering

Monitor and restrict access to malicious and undesirable websites to improve employee productivity and reduce security risks.

ICAP integration

ICAP integration

Enable third-party data loss prevention (DLP) and antivirus scanners to proactively inspect and block threats with ICAP.

Unburden proxy from intensive SSL decryption

Explicit proxy

Replace an existing proxy or unburden a proxy from intensive SSL decryption and processes with a high-speed explicit proxy and proxy chaining.

Third-party security device scaling

Third-party security device scaling

Load balance firewalls and other security devices to increase overall performance and network capacity.

High availability

High availability

Detect and route around failed devices with application delivery and health monitoring to maximize network uptime.

L4 Stateful firewall

L4 Stateful firewall

Block network attacks and unauthorized access with a stateful firewall. Control access by zones and objects with easy-to-define firewall rules.

Audit trail of URL filtering activity and decryption events

High-speed logging

Maintain an audit trail of URL filtering activity and decryption events. Leverage aFleX scripting to record any type of incident with granular detail.

Tabs

IDC

Thunder CFW is a logical extension of A10’s security strategy," said Brad Casemore, Research Director, Datacenter Networks, at IDC. "It takes A10’s SSL Insight into new realms, allowing customers to increase employee productivity and reduce risk with URL filtering and threat intelligence. It should draw consideration from a wide range of A10 customers, including service providers, cloud providers, and large enterprises.

Brad Casemore
Research Director, Datacenter Networks

Have More Questions?

Get in touch with our expert sales team

Contact Sales