70% of all Internet traffic is encrypted. And F5 Labs threat research shows that 68% of malware uses encryption to hide when calling back to command and control.
Decrypting and re-encrypting traffic is computationally intensive, and many inspection tools—like next-generation firewalls and malware protection platforms—are simply unable to decrypt at scale. But visibility into encrypted traffic is not enough. The daisy chain of decryption and re-encryption through multiple security devices induces unnecessary latency and complexity. Policy-based orchestration breaks the daisy chain to most effectively stop malware and protect user privacy.
Get the eBook >Find the hidden threats in both inbound and outbound traffic.
Easily add and remove security tools in your architecture over inline layer 2, inline layer 3, inline web proxy, ICAP, and TAP.
Drive traffic to security tools based on context like IP reputation, port/protocol, and URL categorization.
Set custom granular policies regarding how encrypted traffic is routed through your architecture.
No need to copy private encryption keys to multiple devices.
Easily integrates into complex architectures over layers 2 or 3.
Choose cipher sets in one place, with the latest available PFS ciphers.
Use out-of-band tools even when the traffic is encrypted with perfect forward secrecy.