By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time at Manage Subscriptions.

    Under the Hood Series: How to Responsibly Decrypt & Inspect Encrypted Traffic

    Encrypted traffic is a key battleground for today’s security-conscious organizations. But how and where to fight is not always clear or easy to execute. This “fireside chat” explains how to establish a security model that can decrypt and inspect encrypted traffic without degrading performance or damage trust.

    • Outline the benefits of inspecting SSL/TLS traffic
    • Explain how to block encrypted malware downloads, including ransomware and zero-day cyberattacks
    • Demonstrate how to set up a typical next-generation firewall with DPI-SSL capabilities

    Moderator: Ken Dang

    Panelists: Rob Krug & Keith Adest

    Trace:a39913c6a0ef126b3331d1fb2ef6d8e7-77