As the volume of encrypted traffic continues to grow, organisations become even more vulnerable to encrypted attacks, threats and exploits that go undetected. Learn how to create a centralised “decryption zone” to decrypt traffic once and give security tools newfound visibility into encrypted traffic.
Join Ollie Sheridan (CISSP), Principal Engineer at Gigamon to learn:
• How the TLS 1.3 draft 28 proposal removes visibility which was widely deployed for threat identification in TLS 1.2.
• How to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns.
• Why deploying TLS decryption in the core of networks is critical to detecting threats.
• How to deploy innovative architectures for TLS decryption while maintaining availability and reliability.
• How to manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.