Under the Hood Series: How to Responsibly Decrypt & Inspect Encrypted Traffic
Encrypted traffic is a key battleground for today’s security-conscious organizations. But how and where to fight is not always clear or easy to execute. This “fireside chat” explains how to establish a security model that can decrypt and inspect encrypted traffic without degrading performance or damage trust.
Outline the benefits of inspecting SSL/TLS traffic
Explain how to block encrypted malware downloads, including ransomware and zero-day cyberattacks
Demonstrate how to set up a typical next-generation firewall with DPI-SSL capabilities