Shake the Box: How to Get Encrypted Traffic Insights Without Decryption.
The most advanced security teams rely on network traffic as a fundamental data source, ground truth for security investigations, but encryption has made certain aspects of that truth increasingly difficult to obtain.
Decrypting the traffic would seem the obvious solution, but in many cases it's not an optimal or even technically possible countermeasure. Decryption can be cost prohibitive at scale, violate privacy policies or laws, or unacceptably degrade network performance.
In cases where organisations can't decrypt traffic due to cost, performance, privacy regulations or technical limitations, open-source Zeek is the best tool for deriving insight from encrypted traffic. While encryption obscures payloads it doesn't obscure the endpoints or timing of a communication, or the fact that a conversation took place, or didn't take place.
Read More
By submitting this form you agree to Corelight contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Corelight web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: Authentication & Access Systems, Data Loss Prevention (DLP), Data Recovery, Disaster Recovery, Email Security, Endpoint Security, Event Management, Firewall, IT Security, IT Threats & Vulnerabilities, Log Management, Malware, Mobile Security, Network, Network Security, Sales, Security Management, Security Solutions, Server, VPN
More resources from Corelight
Why Corelight Is Your Best Next Move In Enter...
Despite spending billions annually on security infrastructure and services, even the most sophisticated enterprise continues to be breached, attack...
Shake the Box: How to Get Encrypted Traffic I...
The most advanced security teams rely on network traffic as a fundamental data source, ground truth for security investigations, but encryption has...
Assessing Network Traffic Analysis (NTA) Requ...
Many organizations are struggling to detect, hunt, investigate, and respond to threats in an efficient and effective manner. In the meantime, busin...