OnDemand Panel: The Risky Business of UnInspected Encrypted Traffic, User Privacy, and Compliance
With the ever-expanding amount of encrypted network traffic mandated, it’s important to understand how to balance user and customer privacy with security controls.
So how do you foster an environment that can help detect hidden security threats, even those lurking in encrypted traffic.
While using encryption for data privacy and protection, an organization should be able to answer the questions, How much of the digital business uses strong encryption? What is the quality of that encryption?
This information is very important to prevent attackers from getting into the encrypted stream in the first place. Today, the only way to ensure that encrypted traffic is policy compliant is to perform periodic audits to look for any TLS violations. However, this is not a great strategy due to the number of devices and the amount of traffic flowing through the business
join this panel discussion with Chase Cunningham, Chris Steffen, and Jason Wright to learn more about:
- How network and security teams can quickly gain visibility into all traffic across the enterprise
- Sources and meaning of mandates for internal and external compliance
- Different approaches to managing encrypted data/traffic
- Ways to achieve cryptographic compliance