Try our new research platform with insights from 80,000+ expert users

A10 Networks Thunder SSL Insight (SSLi) vs Fidelis Elevate comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

A10 Networks Thunder SSL In...
Ranking in SSL/TLS Decryption
3rd
Average Rating
9.0
Number of Reviews
3
Ranking in other categories
No ranking in other categories
Fidelis Elevate
Ranking in SSL/TLS Decryption
2nd
Average Rating
8.4
Reviews Sentiment
7.2
Number of Reviews
7
Ranking in other categories
Endpoint Detection and Response (EDR) (32nd), Threat Deception Platforms (6th), Network Detection and Response (NDR) (13th), Managed Detection and Response (MDR) (24th), Extended Detection and Response (XDR) (25th)
 

Mindshare comparison

As of August 2025, in the SSL/TLS Decryption category, the mindshare of A10 Networks Thunder SSL Insight (SSLi) is 28.3%, up from 22.9% compared to the previous year. The mindshare of Fidelis Elevate is 8.9%, down from 12.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
SSL/TLS Decryption
 

Featured Reviews

CH
We used to have to bypass on the firewall, proxy, and IPS; now we can do it in one place
For us, it would be great if it supported SSL operations according to Active Directory users. For example, if we want to bypass one of the servers or a client's internet access for SSL interception, we have to do it according to the IP address. It would be better if we could do it according to the Active Directory username. A10 says they kind of support that but we haven't tested it. Another thing is SNI. A10 intercepts all the traffic according to the SNI, the server name indicator. It would be better if it intercepted traffic according to the IP addresses. A10 can only understand that a website is within the banking category or the website is in the social media category, according to the SNI. Without SNI, there is no way to understand it; there is no bypass operation. It would be better if worked without SNI as well. Also, the solution comes with web categories like banking and social media. There are suspicious URLs, malicious URLs, etc. It would be better if it had an application category as well. For example, it would be helpful if we had the chance to bypass all Office 365 applications: OneDrive, Skype, Outlook, etc. According to Microsoft, we need to bypass SSL for all Office 365 applications but we need to create custom categories and put all the Microsoft URLs in them and then we can bypass. It would be great if an application category could recognize Dropbox, for example. For now, we have to put the Dropbox URLs in one custom category and bypass them. Application categories could be very useful.
Mostafa Ameen - PeerSpot reviewer
Advanced threat detection capabilities with comprehensive incident response features providing robust cybersecurity for organizations
The initial aspect concerns two engines. The first one mentioned is available for searching behaviors directly. The second engine involves the Google Ade tool, which operates on the machine. The challenge arises when attempting to rectify protection rules, causing confusion. It would be beneficial to enhance Rigixs Query. I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"With the Thunder SSLi, we're better protected. We can stop use of VPN and proxies. We are better protected against dirty traffic coming back to our schools. Having a secure decrypt zone with the equipment lowers the chances that our security infrastructure could possibly miss an attack."
"Its most valuable feature is its ability to do its job accurately, effectively, and very quickly. The amount of traffic that we have going through our system is astounding... The delay with the SSL decryption turned on is almost unnoticeable."
"We have several proxies in our environment, so we localized internet traffic between these proxies. Instead of getting a really huge proxy box, according to our size, we can use three boxes and share the traffic with A10's load-balancer feature."
"It has also improved our hunt ability with quick search tools, to zone in on malware or other anomalies. It is able to link items to incidents from other consoles, and works natively with the SIEM."
"The initial setup is very straightforward. The deployment of the server doesn't take so long; about a day or two max."
"Reporting is great, it is easy to do a quick search through 45 days of data for something of interest."
"There are many valuable features. The NDR gives very good network visibility, and the endpoint module has a great feature called "Live Connect" for remote connections. They also have "Tasks" that can be run on endpoints to gather specific information or retrieve logs."
"It ensures the stability of network behavior across various aspects of our network and offers responsive capabilities to address incidents promptly"
"The solution's technical support is perfect, so I rate the technical support a ten out of ten"
"Compared to similar solutions, it's quite scalable. You just need to add more storage to scale-up."
"After rack and stack, devices were up and running base configurations within two hours. As with any IPS, tuning is required to stop false positives. This is no different, but the ease of use of the interface allowed my team to start making adjustments within a few hours."
 

Cons

"There is one thing I would like to see changed. In their features for setting things up, there is a templating system that would normally assist clients. However, we had a better time setting up the device either through the command line or through the interface and not using the templates that were pre-installed. So there is room for improvement to the templates for initial installation."
"I would like them to have a better UI (better universal design)."
"It would be great if it supported SSL operations according to Active Directory users. For example, if we want to bypass one of the servers or a client's internet access for SSL interception, we have to do it according to the IP address. It would be better if we could do it according to the Active Directory username. A10 says they kind of support that but we haven't tested it."
"Fidelis Endpoint is an expensive product making it one of its shortcomings that needs improvement."
"There is room for improvement in email security. It's a security issue. If you're aiming for XDR, covering the entire threat landscape is crucial."
"The interface bug needs to be squashed once and for all. This has been the predominant issue with an otherwise stellar product. It reboots itself unscheduled, about once a month, due to a memory buffer flaw in the interface."
"Configuration, in terms of building the collector and communicating with endpoints, is complex."
"The reports in the endpoint area of Elevate can be improved."
"We position the solution as an antivirus, but this part of the solution needs improvement. They need to generally enhance the features that they have, rather than adding anything new."
"I encounter difficulty removing certain entries in behavior or alerts; likewise, I am unable to add specific calls."
 

Pricing and Cost Advice

"When you purchase the equipment, you purchase the licensing and warranty. It's all fairly standard. We haven't been caught with anything surprising."
"We always pay for support. Any organization of our size who doesn't is asking for problems."
"Our licensing costs, yearly, are just under $15,000. Your initial cost of acquisition is obviously going to be more than $15,000..."
"You license by the number of days of logs you need to maintain visibility for. Forty-five days is a good solid number for a company with around a 10k user base."
"Fidelis Endpoint is an expensive product. My company makes yearly payments toward the licensing cost of the solution."
"It's somehow expensive. From one to ten, I would rate it a five. They need to improve the prices. It's very high."
"It's quite expensive but we can customize it to reduce the price."
report
Use our free recommendation engine to learn which SSL/TLS Decryption solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Manufacturing Company
9%
Recreational Facilities/Services Company
9%
Government
9%
Financial Services Firm
14%
Computer Software Company
11%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Fidelis Elevate?
It ensures the stability of network behavior across various aspects of our network and offers responsive capabilities to address incidents promptly
What is your experience regarding pricing and costs for Fidelis Elevate?
It's somehow expensive. From one to ten, I would rate it a five. They need to improve the prices. It's very high. We lose customers for price. It's not always worth it for them. Even for enterprise...
What needs improvement with Fidelis Elevate?
The initial aspect concerns two engines. The first one mentioned is available for searching behaviors directly. The second engine involves the Google Ade tool, which operates on the machine. The ch...
 

Also Known As

Thunder SSLi
Fidelis Elevate Platform, Fidelis Enterprise, Fidelis Cloud, Fidelis Managed Detection and Response, Fidelis Deception, Fidelis Decryption, Fidelis Endpoint, Fidelis Network
 

Overview

 

Sample Customers

Klein Independent School District
First Midwest Bank
Find out what your peers are saying about A10 Networks Thunder SSL Insight (SSLi) vs. Fidelis Elevate and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.