Encrypted traffic SSL - Why network visibility matters for enterprises?

Encrypted traffic SSL - Why network visibility matters for enterprises?

SSL-encrypted traffic is a fast-growing portion of all enterprise traffic. According to several research studies, approximately 25 to 35 percent of enterprise traffic is encrypted in SSL and the number is growing. In many networks, half of all internet-bound traffic is already encrypted (mostly HTTPS) and it is likely more than three-quarters of network traffic will be encrypted within the next couple of years. With an increasing number of advanced threats hiding in SSL traffic, it is more important than ever to monitor and manage encrypted traffic in an enterprise. Decrypting/inspecting SSL traffic has created a number of challenges for security and networking teams in enterprises. 

Challenges due to encrypted SSL traffic

Decrypting/inspecting SSL traffic has created a number of challenges for security and networking teams in enterprises. SSL-based malware entering a network can easily go undetected and exploit a host or series of hosts. And since the traffic is invisible, it is not possible for an enterprise to know how much traffic is encrypted on the network on a certain today. As a result, it is not easy to know if the monitoring tools are tackling the entire traffic. SSL decryption is required for data loss prevention and application performance monitoring.

Cubro Solution

Cubro Sessionmaster EXA series is the next development stage of Cubro’s product line of network packet brokers which offers the application of delivering SSL/TLS decryption to various inline and out-of-band monitoring and security tools. The Sessionmaster helps maximize the overall efficiency, security and performance of the network infrastructure. Due to the sensitivity of the data, the SSL decryption capabilities in Sessionmaster provides the ability to selectively decrypt traffic based on policies using a variety of parameters including IP address, ports, VLAN tags, domain names and URL categories.


要查看或添加评论,请登录

Tamanna Bhatia的更多文章

  • From Visibility to Credibility

    From Visibility to Credibility

    With endless information available on the Internet and in social media, building credible visibility for oneself is…

  • The OSI Model

    The OSI Model

    The OSI (Open Systems Interconnection) Model was created based on recommendations from the International Organization…

  • Towards a more transparent network...

    Towards a more transparent network...

    In the recent years, the demand for network visibility tools has increased because they make existing monitoring tools…

  • What is a bypass switch?

    What is a bypass switch?

    A bypass switch (or bypass network TAP) is a simple piece of hardware that allows you to connect in-line security tools…

  • Difference between Big Data and Meta Data

    Difference between Big Data and Meta Data

    A major service provider was not able to understand why on certain days they had more complaints from the customers and…

    1 条评论
  • 5 ways network visibility will impact enterprises

    5 ways network visibility will impact enterprises

    External Security - With every kind of new technology there are inherent security risks. Enterprises face risks of…

  • Introduction to VLANs

    Introduction to VLANs

    Virtual LANs (VLANs) allow network administrators to subdivide a physical network into separate logical broadcast…

  • Scalability in Network Architecture – Step Towards Future-proof Network Monitoring

    Scalability in Network Architecture – Step Towards Future-proof Network Monitoring

    There is a surge in the network traffic and no industry is immune to being overwhelmed by data. Network visibility is a…

  • Network visibility for monitoring

    Network visibility for monitoring

    Challenges with Conventional Monitoring: SPAN Ports contention (capture packet loss by over-subscription and CPU burden…

  • 5 ways network visibility will impact telecommunication sector

    5 ways network visibility will impact telecommunication sector

    Meta data will influence the network design and the network management The buzzword is a self-organizing network (SON).…

社区洞察

其他会员也浏览了