Best Practices For Monitoring Encrypted Data
Having trouble viewing this PDF? If you are using Microsoft Edge, please try Google Chrome or another browser, while we work as quickly as we can to improve your viewing experience. Thanks for your patience and we apologize for any inconvenience.
Once used to increase the security of Internet traffic, encryption has actually made the work more difficult. Many firewalls and other security tools do not understand encrypted traffic and many organizations have chosen to pass encrypted traffic into their networks without security inspection, just to keep communications flowing. Unfortunately this creates blind spots in network visibility – areas where the organization is unaware of the traffic moving inside and exiting the network.