Column Control DTX

Best Practices For Monitoring Encrypted Data

White Paper

Once used to increase the security of Internet traffic, encryption can actually make some types of security monitoring more difficult. Many firewalls and other security tools do not understand encrypted traffic, and many organizations have chosen to pass encrypted traffic into their networks without security inspection just to keep communication flowing. Unfortunately, this creates blind spots in network visibility—areas where the organization is unaware of the traffic moving inside and exiting its network.

Knowing that blind spots exist, criminals have increasingly encrypted their attacks to avoid detection and cover their tracks. In a May 2016 study, “Hidden Threats in Encrypted Traffic,” Ponemon Institute found that 40% of cyber-attacks leveraged secure sockets layer (SSL) encryption to bypass traditional security solutions 1. It’s no coincidence that, despite the introduction of more sophisticated prevention and detection solutions, cyberattacks and data loss continue.

×

*Indicates required field

*Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight -Datenschutzaussage Informationen darüber, wie wir diese Daten verwenden.

Thank you.

A sales representative will contact you soon.

Column Control DTX