Decryption Lessons Learned: The Most Efficient Deployment Models

Logo
Presented by

Martyn Crew, Senior Director of Solutions Marketing and Partner Technologies and Ram Mohan, Technical Marketing Engineer

About this talk

The need to inspect encrypted traffic is critical given the prevalence of encrypted malware lurking in our midst. But with over 90 percent of enterprise data being encrypted, managing this traffic and determining when and where to decrypt it remains a significant challenge for many organizations. Gigamon provides a range of decryption solutions and in this session, we’ll explore the pros and cons of the most common deployment scenarios and help you to learn how to decide which model is most efficient and effective for your organization.
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (197)
Subscribers (27128)
Gigamon® offers a deep observability pipeline that efficiently delivers network-derived intelligence to cloud, security, and observability tools. This helps eliminate security blind spots and reduce tool costs, enabling you to better secure and manage your hybrid cloud infrastructure. Gigamon has served more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations.