SSL Decryption

Safely enable applications, prevent successful cyberattacks

The use of encryption is exploding; users are spending 80% of their time on encrypted websites or applications to keep their information private. Unfortunately, bad actors are using encryption to hide threats. In the last year alone, 3.5 million unique malware samples were delivered over encrypted connections.

Palo Alto Networks Next-Generation Firewalls decrypt SSL inline. As an integrated capability, there is nothing else to purchase, install, or manage, allowing you to decrypt once and share decrypted traffic with other devices easily. Now you can decrypt malicious traffic and preserve the privacy of sensitive traffic at the same time.

Learn more about SSL Decryption.

 


 

TRANSCRIPT

 

Samantha Pierre:

The use of encryption is exploding. People now spend 80% of their time on encrypted websites or applications. Why? Because encryption keeps information private. But bad actors are using encryption to hide threats. Last year alone, 3.5 million unique malware samples were delivered over encrypted connections. If you want to protect privacy and prevent attacks, you need to selectively decrypt SSL traffic, inspect it, then re-encrypt it. There are many options for doing this: Web proxies, application delivery controllers, visibility appliances and more. But these so-called solutions create new problems. They usually require separate devices. They allow gaps in coverage and they tend to be expensive add-ons.

 

Samantha Pierre:

We have a smarter proposition. Our next-generation firewalls decrypt SSL inline. It's a built in capability, nothing else to purchase, install or manage. You decrypt once and you can share decrypted traffic with other devices easily, so you get visibility into encrypted traffic without compromising privacy and you can apply security to safely enable applications and protect against threats that may be coming across the network.

 

Samantha Pierre:

This approach is a breakthrough. Now you can decrypt malicious traffic and preserve the privacy of sensitive traffic at the same time. You can comply with legal and compliance policies. You can consolidate security functions for ease of operation. Bottom line, you can prevent hidden threats, attacks, and data leakage without adding new devices.

 

Samantha Pierre:

Regulations require privacy. Deliver it in a way that doesn't sacrifice security compliance or access. Take a closer look at advanced decryption capabilities of our next-generation firewall and PAN-OS.