{"id":27101,"date":"2014-10-30T05:41:08","date_gmt":"2014-10-30T09:41:08","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27101"},"modified":"2014-10-30T05:41:08","modified_gmt":"2014-10-30T09:41:08","slug":"gigamon-says-it-can-analyze-attacker-ssl-traffic-without-hitting-performance","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/gigamon-says-it-can-analyze-attacker-ssl-traffic-without-hitting-performance.php","title":{"rendered":"Gigamon says it can analyze attacker SSL traffic without hitting performance"},"content":{"rendered":"<p><p>    Encrypting data traffic is mandatory for safeguarding    information. But when attackers use encryption to mask their    activity, it can be hard for enterprises to figure out what    they're stealing.  <\/p>\n<p>    Gigamon,    based in Santa Clara, California, says it has developed a    capability to deeply analyze all SSL\/TLS (Secure Sockets    Layer\/Transport Layer Security) traffic.  <\/p>\n<p>    SSL\/TLS is the cornerstone of Web security, encrypting data    between a client and a server. If the traffic is intercepted,    it appears as gibberish unless the person has the corresponding    private encryption key required to decrypt it.  <\/p>\n<p>    Analyst Gartner predicts that attackers will increasingly use    encryption in order to try to evade security products, from    around 5 percent of network attacks using encryption today to    50 percent by 2017.  <\/p>\n<p>    Many organizations now want to have visibility on the encrypted    traffic, so are deploying SSL proxies, which are incorporated    into a firewall or a load balancer, said Ananda Rajagopal,    Gigamon's vice president for product management.  <\/p>\n<p>    The proxy terminates the SSL session with a remote server and    initiates a new one, which gives it an accessible private key,    Rajagopal said. It means that all SSL traffic can now be    analyzed for traits that might indicate an attack is underway.  <\/p>\n<p>    Other security related vendors are using this method to look at    the traffic and run checks, but it is done in-line or in-band,    as the traffic is moving back and forth. Since that traffic is    live, there is a limit on the amount of scans that can be done    without impacting performance.  <\/p>\n<p>    What Rajagopal said Gigamon has cracked is the ability to run    many more security checks on the decrypted SSL traffic. Gigamon    peels off SSL traffic and analyzes it without disrupting the    flow of data by creating a copy of it and subjecting it to many    more analyses.  <\/p>\n<p>    \"There is a limit in terms of how many tools can be deployed in    band,\" Rajagopal said. \"Your performance is as strong as the    weakest link.\"  <\/p>\n<p>    In-line products tend to only have a firewall, an anti-malware    scan and intrusion protection system to maintain performance,    Rajagopal said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"http:\/\/news.techworld.com\/security\/3583096\/gigamon-says-it-can-analyze-attacker-ssl-traffic-without-hitting-performance\/?olo=rss\/RK=0\/RS=d3GXC5b5hTR2yY2MQHzt3uvvtzY-\" title=\"Gigamon says it can analyze attacker SSL traffic without hitting performance\">Gigamon says it can analyze attacker SSL traffic without hitting performance<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Encrypting data traffic is mandatory for safeguarding information. But when attackers use encryption to mask their activity, it can be hard for enterprises to figure out what they're stealing. Gigamon, based in Santa Clara, California, says it has developed a capability to deeply analyze all SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) traffic<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-27101","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27101"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27101"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27101\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}