Encrypted traffic is on an explosive upturn. Cyber adversaries are using encryption to hide from security surveillance and bypass security controls. What this means is even businesses with mature security measures in place can be breached if they’re not securing encrypted traffic.
Next-generation firewalls from Palo Alto Networks® decrypt, inspect and then re-encrypt network traffic before it is sent to its destination. This provides visibility into encrypted traffic and controls to safely enable applications while preventing hidden threats, attacks and data leakage.
Security professionals must be able to stop threats hidden in encrypted traffic while preserving the privacy of legitimate users.
Palo Alto Networks next-generation firewalls use policy-based decryption. It’s flexible enough that certain types of encrypted traffic can be left alone to comply with privacy standards and regulations (for example, traffic from known banking or healthcare organizations), while all other traffic can be decrypted and inspected.