![]() Many technical options are available to decrypt traffic on your network, including web proxies, application delivery controllers, SSL visibility appliances and next-generation firewalls. Decryption, one of the "10 Things Your Next Firewall Must Do," is required for several security-related actions, including threat prevention, advanced malware prevention, file blocking, data filtering and blocking of malicious webpages. This is where SSL decryption – the ability to decrypt, inspect and re-encrypt internet traffic before it is sent to its destination – comes into play. Without the ability to decrypt, classify, control and scan SSL-encrypted traffic, it's impossible for an organization to adequately protect its business and its valuable data from modern threats. An attacker can place an infected file in a legitimate shared folder in an organization's sanctioned file storage application, such as Box or Dropbox®, and from there, the infected file can easily spread to users who sync their files with the folder.įigure 1: Examples of malware transferred over encrypted traffic based on Palo Alto Networks Unit 42 threat research Moreover, attackers increasingly use SaaS applications to deliver malware. Even legitimate websites that use SSL can be infected with malware. Unfortunately, criminals have learned to exploit this lack of visibility and identification to hide from security surveillance within encrypted traffic and deliver malware. However, encrypted traffic is essentially opaque data that leaves organizations blind to security threats contained inside. Major browsers, including Chrome®, Firefox®, Safari® and Internet Explorer®, are in various stages of marking HTTP webpages "not secure."Įncryption is a great means for secure and private business information exchange, and it is necessary for compliance. ![]() The next major revision of HTTP 1.1 is HTTP/2, and although the standard itself does not require encryption, most client implementations have stated they will only support HTTP/2 over TLS, which effectively makes encryption mandatory. Given the primary benefits of encryption – the private and secure exchange of information over the internet, and compliance with certain regulations, such as the Health Insurance Portability and Accountability Act and the Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the upward trend in SSL adoption is expected to continue. According to the Google® Transparency Report: "Desktop users load more than half of the pages they view over HTTPS and spend two-thirds of their time on HTTPS pages." Internet traffic encrypted with Secure Sockets Layer or Transport Layer Security protocols – SSL and TLS, respectively – is on an explosive upturn.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |