Time for a security audit.
One thing that Komodia has shined a light on. All MITM software that pretends to inspect SSL traffic for your security, privacy, intellectual traffic protection and malware protection has probably been doing it wrong.
It's just a given in the slap-dash "OMG, SSL's gonna bypass our packet inspection and everything will be insecure again" way that this stuff has been thrown together, especially since the Google push for EVERYTHING HTTPS!
Growing pains, gotta love them. For most programmers, as in all things, hindsight's 100%, after all. Schneier's law kind of thing, the people coming up with this need someone external to break their stuff as they've focused so well on the implementation, that they've forgotten that there are a million people out there willing to crack bad implementation and use their product against their "customers".
Expect all security/safety MITM scan software to have severe flaws that allow them to rubber stamp invalid, revoked, specially crafted and self-signed certificates as fully non-trust breaking connections via their faked reassigned certificates unless proven otherwise.