Handling Encrypted Traffic in 5G

Logo
Presented by

Ryan Mahoney, Product Management Director, Service Providers, Gigamon

About this talk

5G standards were designed with the use of ephemeral key-based encryption. With the scale of devices, volume of traffic, and virtualization in the 5G core, the ability to gain visibility into the encrypted traffic for effective performance monitoring and security can be quite difficult. In this session we will explore some of the options for avoiding these challenges.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (99)
Subscribers (3499)
Learn more about your Gigamon products and features, how they work, and how you can optimize your usage to maximize network performance and security.