FORM FACTORS

PHYSICAL

FEATURES &
 BENEFITS

DECRYPT ACROSS PORTS AND PROTOCOLS

Decrypt traffic across all standard TCP ports and advanced protocols like SSH, STARTTLS, XMPP, SMTP and POP3.

FULL-PROXY ARCHITECTURE

As a full proxy, ciphers can be re-negotiated to ciphers of similar strength to prepare for future ciphers or TLS versions.

ICAP-COMPATIBLE

Acting as an ICAP client, Thunder SSLi passes traffic to a network’s existing DLP systems without the need for extra solutions.

FIPS 140-2 LEVEL 3 COMPLIANCE

The only SSL decryption solution that supports up to four internal HSMs, and multiple external HSMs, to secure private keys.

URL BYPASSING

Selectively bypass traffic decryption to enforce privacy policies using a list of over 460 million domains.

URL FILTERING

Maximize employee productivity and reduce risk by blocking non-business and malicious websites, including malware and phishing sources.

LOAD BALANCING AND STEERING

Increase security capacity by load-balancing multiple security devices and selective traffic steering based on fine-grained policies.

APPCENTRIC TEMPLATES

Reduce deployment times, and simplify configuration, management and troubleshooting with the AppCentric Templates.

DEPLOYMENT SCENARIOS

Thunder SSLi can decrypt traffic for a variety of security products simultaneously, including inline, non-inline (passive/TAP) and ICAP-enabled devices.

Thunder SSLi decrypts traffic for variety security devices from the top vendors.

Helpful Resources

Webinar
5 Threats Hiding in Your SSL Traffic
Videos
A10 and Cisco SSL Traffic Inspection Solution Video Sponsored by Cisco Security
Solution Briefs
A10 Thunder SSLi Enables Organizations to Protect Themselves from Threats Hidden in Encrypted Traffic
eBooks
Exposing Hidden Threats: Why Your Organization Needs SSL Inspection
Videos
Find out how A10 helps solve today's encryption challenges
Solution Briefs
Secure Web Gateway with SSL Insight
Solution Briefs
SSL Insight
Deployment Guides
SSL Insight and Cisco FirePOWER
White Papers
The Ultimate Guide to SSL Inspection: Uncover Threats in SSL Traffic
Data Sheets
Thunder SSLi
Tech Specs
Thunder SSLi Model Comparisons
Infographics
Top 6 Dangers of Not Inspecting SSL Traffic
Customers are demanding a purpose-built standalone solution to address the SSL blind spot without degrading the performance of the security infrastructure.”

SCHEDULE A DEMO

Ready for a first-hand demonstration of A10 SSL decryption solutions?
Sign up for your one-on-one session.

RELATED PRODUCTS