How to Combat Encrypted Cyber Threats
More than 80% of enterprise web traffic and 94% of Google traffic is now encrypted. CISOs, security architects, and network managers must find ways to see inside encrypted network data, identify security threats, and resolve performance issues.
Join Endace, Ixia, and Plixer, as we review a best practice approach to regain visibility and security with fully integrated decryption, traffic analysis, and packet capture technologies. Our security experts will show you how to:
- Implement reliable, tiered network monitoring to decrypt both TLS 1.3 with Ephemeral Keys and legacy encryption for both active inbound and outbound SSL traffic
- Apply network traffic analytics to detect advanced threats, data exfiltration, and performance issues
- Know exactly what happened with integrated access to an always-on full capture of decrypted traffic.
Who Should Attend?
CISO/CIOs, Security Architects, Network Managers, Security Analysts, NetOps/SecOps, Security Threat-Hunters, Network Forensic Engineers
Presenters
Michael Githens |
Bob Noel |
Cary Wright |
Register Now
Date
Wed, November 13th
Time
New Zealand: 14:00PM
Australia (Syd/Melb) : 12:00PM
Singapore: 09:00AM
Japan: 10:00AM