Enterprise cybersecurity technology research that connects the dots.
Omdia Principal Analyst Eric Parizo discusses the changing network traffic decryption landscape amid encryption standards changes, and presents ways to maintain critical network traffic visibility.
January 12, 2022
Most enterprise network traffic is now encrypted. Many organizations do not decrypt and inspect this traffic, however, leaving them vulnerable to potential threats hiding within encrypted traffic flows.
Numerous barriers make purchasing, deployment, and management of decryption technology difficult, if not impossible, for many organizations. Worse yet, improvements to encryption standards and important changes to enterprise network design and deployment may soon render many of today's enterprise decryption approaches and architectures obsolete. Given the rapid pace of change in both standards and technology, it is imperative that all organizations revisit how they undertake network traffic decryption, and more broadly how they address network traffic visibility in the context of risk management.
In this Omdia webinar, featuring Principal Analyst Eric Parizo, learn about the changing network traffic decryption landscape, and how to maintain critical traffic visibility. Topics include changing encryption standards, emerging decryption approaches and new techniques for classifying encrypted traffic that promise supplemental or alternative options to the pressing need for every organization to review risk management in the encryption era.
Editor's note: This video features excerpts from a webinar originally recorded in 2021.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024