ASI Series
SSL Intercept
& Visibility

Download Datasheet
Say Goodbye to Encryption Blind Spots

Say Goodbye to Encryption Blind Spots

Array SSL intercept provides enterprises with visibility into encrypted traffic entering, leaving, and traversing their network. Deployed in conjunction with solutions such as next-generation firewalls, network monitoring, and intrusion detection and prevention, SSL intercept offloads compute-intensive decryption and re-encryption tasks to allow essential security functions to operate at scale. SSLi is an ideal solution for optimizing both security and infrastructure efficiency.

Every ASI SSL intercept solution supports Layer-2 and Layer-3 deployment modes, inline and out-of-band inspection, service chaining and the ability classify Web traffic to ensure regulated data is handled in accordance with compliance policies. Available as physical or virtual appliances, the ASI Series is ideal for businesses needing to protect user privacy while gaining scalable visibility into the increasing number of advanced threats hiding within SSL traffic.

Gain Visibility & Maintain Compliance

Array SSL inspection provides businesses with visibility into blind spots created by SSL encryption, and leverages adaptive inspection to maintain regulatory compliance and assure data privacy.

Deploy

  • Inbound, Outbound
  • Layer-2, Layer-3
  • Service Chaining
  • Inline, Out-of-Band

Classify

  • Source/Destination
  • IP Source/Destination Port
  • URL Category
  • Webroot Integration

Inspect

  • Forensics, Analytics
  • Next-Gen Firewall
  • IPS/IDS, DLP
  • Anti-Malware
Gain Visibility & Maintain Compliance

Advanced SSLi Features

  • Visibility to SSL Encrypted Traffic

    Visibility to SSL Encrypted Traffic

    Eliminate blind spots and threats created by encrypted traffic entering, leaving and traversing private networks.

  • Service Chaining & Traffic Management

    Service Chaining & Traffic Management

    Create custom traffic flows spanning a range of multi-vendor security, inspection and monitoring solutions.

  • Pre-Filtering & URL Classification

    Pre-Filtering & URL Classification

    Selectively intercept traffic based on IP reputation, port, protocol and URL to assure regulatory compliance.

  • Centrally Controlled Keys & Ciphers

    Centrally Controlled Keys & Ciphers

    Manage encryption keys and ciphers for multiple security devices on a purpose-built SSL intercept platform.

  • Flexible deployment modes

    Flexible deployment modes

    Select from multiple modes of operation, including Layer 2 or Layer 3, inbound or outbound, using one or more appliances.

  • Inline and passive inspection

    Inline and passive inspection

    Use in the data path for real-time inspection and attack prevention, or out-of-band for monitoring and analytics.

  • Hardware accelerated decrypt & encrypt

    Hardware accelerated decrypt & encrypt

    120 Gbps of SSL throughput and 240 thousand SSL TPS for inspecting encrypted application traffic at scale.

  • Physical, Virtual & Cloud Deployment

    Physical, Virtual & Cloud Deployment

    Available as physical or virtual appliances, or as cloud-native instances on AWS, Azure and Google Cloud Platform.

Prevent hackers from using the cloak of SSL to deliver malicious payloads.

Deployment Options

  • Hardware

    Hardware

    Dedicated appliances scalable to 120 Gbps of HW-accelerated SSL throughput. Multi-tenant network hyper-converged infrastructure for flexibility with performance.

  • Software

    Software

    SSLi virtual appliances with support for popular hypervisors including VMware, Hyper-V and KVM. Available as permanent or subscription licenses.

  • Cloud

    Cloud

    Available natively on industry-leading cloud platforms including AWS, Azure and Google Cloud. Supports utility consumption and BYOL license options.

Need more information?

Connect with an Array expert today; we look forward to learning more about your unique business and technical requirements.