The Ultimate Guide to SSL Inspection- Uncover Threats in SSL Traffic
16.06.2017Encrypted traffic accounts for a large and growing percentage of all
network traffic. While the adoption of SSL, and its successor, Transport
Layer Security (TLS), should be cause for celebration – as encryption
improves confidentiality and message integrity – it also puts
organizations at risk. This is because hackers can leverage encryption
to conceal their exploits from security devices that do not inspect
SSL traffic.
How serious is the threat? According to a recent Gartner survey,
“less than 20% of organizations with a firewall, an intrusion prevention
system (IPS) or a unified threat management (UTM) appliance decrypt
inbound or outbound SSL traffic.”1 This means that hackers can evade
over 80% of companies’ network defenses simply by tunneling attacks
in encrypted traffic.
To stop cyber attacks, organizations must gain insight into encrypted
data, and to do this, they need a dedicated security platform that can
decrypt inbound and outbound SSL traffic.
Zdroj: http://resources.computerworld.com/ccd/assets/136696/detailAutor: JP
Heuristické vyhledání souvisejících článků v archívu NEWS
Pozor - není zdaleka přesné a výsledek je bez záruky...
Chcete-li článek obsahující konkrétní termín - pou·ijte funkci
vyhledávání !