Column Control DTX

Best Practices For Monitoring Encrypted Data

白皮书

Once used to increase the security of Internet traffic, encryption can actually make some types of security monitoring more difficult. Many firewalls and other security tools do not understand encrypted traffic, and many organizations have chosen to pass encrypted traffic into their networks without security inspection just to keep communication flowing. Unfortunately, this creates blind spots in network visibility—areas where the organization is unaware of the traffic moving inside and exiting its network.

Knowing that blind spots exist, criminals have increasingly encrypted their attacks to avoid detection and cover their tracks. In a May 2016 study, “Hidden Threats in Encrypted Traffic,” Ponemon Institute found that 40% of cyber-attacks leveraged secure sockets layer (SSL) encryption to bypass traditional security solutions 1. It’s no coincidence that, despite the introduction of more sophisticated prevention and detection solutions, cyberattacks and data loss continue.

×

请销售人员联系我。

*Indicates required field

您希望以何种方式进行联系? *必填项
Preferred method of communication? 更改电子邮件地址?
Preferred method of communication?

请通过单击按钮,提供给是德科技您的个人数据。请在Keysight隐私声明 中,参阅有关我们如何使用此数据的信息,謝謝。

感谢您!

A sales representative will contact you soon.

Column Control DTX