Seeing Inside Encrypted Traffic: Blocking Threats and Enforcing Policy While Preserving Security, Compliance and Performance

Webinar Registration

Most of the traffic flowing through your firewall today is encrypted. In some ways that’s a good thing because encryption enables businesses to communicate securely with customers/partners and protects the privacy and integrity of data. But it creates new problems for information security folks because the only data you can actually see in the packet header is nothing but IP addresses and port numbers. There’s some monitoring and analytics you can do with that information such as with threat intelligence feeds and session profiling, but your hands are really tied if you can’t decrypt the traffic. 

The bad guys know that and actively use encryption to evade network-based security technologies. They are increasingly enhancing their APT payloads to hide their communications with command and control servers as well as the actual exfiltration of stolen information inside encrypted connections disguised to look like legitimate web traffic.

Attackers passively benefit from the prevalence of encryption. For instance, when an attacker compromises a legitimate website and uses it to deliver or stage malicious content, the fact that that legit website uses https means your network-based probes and monitoring agents are blind to the content. This leaves organizations wide open to malware attacks amongst others.

So, we obviously need visibility into encrypted data flowing between our network and the Internet and ideally even between portions of our internal network. But how do you get that visibility in the first place? Without breaking network performance? And what about compliance requirements specific to certain types of data or privacy regulations? 

SSL decryption is a fascinating and fast-growing area that ties several different technologies together for network security. such as:

  • Invisible proxy
  • PKI
  • Endpoint certificate trust
  • Dynamic certificate creation
  • ICAP – Internet Content Adaption Protocol

In this webinar I will show you how:

  • SSL decryption works
  • Common sources of performance degradation
  • ICAP support is critical to successful SSL decryption
  • Decryption needs to be policy based to avoid compliance problems

Our sponsor is A10 Networks and Parth Jagirdar will demonstrate their unique SSL decryption technology and how it provides performance and compliance while allowing you to leverage any security technology you need via integration through ICAP.

Please join us for this real training for free event.

First Name:   
Last Name:   
Work Email:  
Job Title:  

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us and the sponsor.



Additional Resources