Maximize infrastructure investments, efficiencies, and security with dynamic, policy-based decryption, encryption, and traffic steering through multiple inspection devices.
❭❭ SSL Visibility
Provides SSL decryption and encryption, strong cipher support, and flexible deployment.
❭❭ Dynamic Service Chaining
Provides service insertion, service resiliency, service monitoring, and load balancing.
❭❭ Context Engine
Supports geolocation, IP reputation, URL categorization, and 3rd party ICAP integration.
❭❭ Granular control
Header changes, support for port translation, and control over ciphers and protocols.
❭❭ Support all inspection devices
Supports inline layer 3, Inline layer 2, ICAP services, and receive-only modes.
❭❭ Support all deployment modes
Single-box and Dual-box modes for standalone, cluster, and separate ingress/egress tiers.
❭❭ Transparent and explicit proxy
Intercept and inspect traffic without requiring any special client configuration.
❭❭ Extensive logging
Collect and send logs and statistics to Syslog, ArcSight, Splunk, and other log servers.