Briefings Part 2: Effectively Exposing Hidden Threats and Malware

Logo
Presented by

Tom Clavel, Senior Manager, Security Product Marketing, Gigamon; Brandon Dunlap, Moderator

About this talk

As the volume and variety of network data increases, security tools in high-speed networks are unable to keep pace with the explosion of encrypted threats, from malware incursion to data exfiltration. The standard approach of decryption of traffic by each security tool no longer works. Additionally, this approach can result in performance degradation, massive inefficiencies and unnecessary expenditures by security teams. In this webcast, we’ll examine how to eliminate tool overload and high latency as well as how a “decrypt once and inspect many” approach to managing SSL traffic effectively detects hidden threats and provides greater security infrastructure resiliency.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (446)
Subscribers (139046)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.