What Are You Doing to Inspect Encrypted Traffic?

Mission Critical Marketing Team
Blog Image

Blog provided by A10 written by Andrew Hickey

Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols for data exfiltration.

SSH, for example, is often used for remote management access because it performs well. Adversaries now use remote desktop protocol (RDP) and data exfiltration over SSH.

And when nearly 70 percent of all enterprise traffic is encrypted, understanding what’s hiding inside that traffic is imperative. What are you doing to inspect that traffic?

With A10 Thunder SSLi, we can break and inspect that traffic – whether it’s SSH, HTTPS or XMPP STARTTLS.

In the video above, A10 Networks Federal Lead SE James Schweitzer discusses the enterprise threat model and how A10 Thunder SSLi breaks and inspects SSL encrypted traffic and works in concert with existing security infrastructure without negatively impacting performance.

To learn more about A10 visit our A10 Page.