Under the Hood Series: How to Responsibly Decrypt & Inspect Encrypted Traffic

Encrypted traffic is a key battleground for today’s security-conscious organizations. But how and where to fight is not always clear or easy to execute. This “fireside chat” explains how to establish a security model that can decrypt and inspect encrypted traffic without degrading performance or damage trust.

  • Outline the benefits of inspecting SSL/TLS traffic
  • Explain how to block encrypted malware downloads, including ransomware and zero-day cyberattacks
  • Demonstrate how to set up a typical next-generation firewall with DPI-SSL capabilities

Moderator: Ken Dang

Panelists: Rob Krug & Keith Adest

Trace:6e772ae5ec3bd53085d61ae1ba343a92-93