Kenneth MurrayData Center Network Engineer at Bridgeton Board of Education and Public Schools
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"We have several proxies in our environment, so we localized internet traffic between these proxies. Instead of getting a really huge proxy box, according to our size, we can use three boxes and share the traffic with A10's load-balancer feature."
"Its most valuable feature is its ability to do its job accurately, effectively, and very quickly. The amount of traffic that we have going through our system is astounding... The delay with the SSL decryption turned on is almost unnoticeable."
"Its security features are very good. It has normal security, and then it has add-on security with a separate license, which I find very good. It is also very stable."
"The initial setup isn't too difficult."
"Every scenario we have put the solution through it has been able to handle it one way or another."
"It would be great if it supported SSL operations according to Active Directory users. For example, if we want to bypass one of the servers or a client's internet access for SSL interception, we have to do it according to the IP address. It would be better if we could do it according to the Active Directory username. A10 says they kind of support that but we haven't tested it."
"There is one thing I would like to see changed. In their features for setting things up, there is a templating system that would normally assist clients. However, we had a better time setting up the device either through the command line or through the interface and not using the templates that were pre-installed. So there is room for improvement to the templates for initial installation."
"It can have more features on the cloud side because we are moving a lot of servers to our cloud. Its support and scalability also need improvement. Currently, their technical support is slow, and its scalability is complex. It should have integrated SSL decryption with some special machine algorithm to tell us about certain kinds of security issues. Currently, it can decrypt, but it should also provide more information. It can have some kind of algorithm to inform us about how the packets should or shouldn't be. It should inform us when certain things are happening. When users are going to the internet and it sees an abnormal behavior or abnormal type of traffic, it should alarm us about this. It should tell us that there is some kind of strange traffic, and it shouldn't be like that. Currently, it lacks in this aspect."
"The most difficult thing that we have to deal with is SSL Hardening. Vulnerabilities are found in various ciphers, getting them removed, identifying them, et cetera."
"The installation is complex but not more than other competitors."
"Our licensing costs, yearly, are just under $15,000. Your initial cost of acquisition is obviously going to be more than $15,000..."
"The price of the solution is a little high."
Earn 20 points
SSL encrypted traffic is growing, rendering most security devices ineffective.
Gain visibility into encrypted traffic with SSL Insight and stop potential threats.
The majority of malware and data exfiltration hides within SSL/TLS encryption, blinding your security inspection tools. Decrypt and orchestrate to make your controls more effective.
A10 Networks Thunder SSLi is ranked 1st in SSL/TLS Decryption with 2 reviews while F5 SSL Visibility (EOL) is ranked unranked in SSL/TLS Decryption with 3 reviews. A10 Networks Thunder SSLi is rated 8.6, while F5 SSL Visibility (EOL) is rated 8.4. The top reviewer of A10 Networks Thunder SSLi writes "Enables our content filter to do its job without any noticeable delay ". On the other hand, the top reviewer of F5 SSL Visibility (EOL) writes "Consistent and stable with a straightforward setup". A10 Networks Thunder SSLi is most compared with Symantec SSL Visibility Appliance, F5 BIG-IP Local Traffic Manager (LTM), Fortinet FortiADC and Fortinet FortiWeb, whereas F5 SSL Visibility (EOL) is most compared with Symantec SSL Visibility Appliance.
See our list of best SSL/TLS Decryption vendors.
We monitor all SSL/TLS Decryption reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.