![]() ![]() Use Inlinde Decryption with Keysight's NetStack, PacketStack and AppStack capabilities for flexibility and limitless visibility. So security and monitoring tools appropriate for each mode can be used in the same deployment. Simultaneous deployment: With Keysight's Vision ONE and Vision X, both inline and out-of-band modes can be used at the same time.These tools use the decrypted traffic to generate alerts. Out-of-band: traffic comes into the network packet broker and is decrypted, copied and sent to out-of-band security and monitoring tools.Re-encrypting the data with an ephemeral key ensures network security, while allowing inspection, the best of both worlds! For optimal security, this is done with a Bypass switch in an active-active resilient architecture. By default, the same cipher is used, but you can apply any policy required. After inspection, tools send the data back to the network packet broker where it is re-encrypted with the Inline Decryption capability. With Inline Decryption, data that comes into a network packet broker is decrypted and then sent to security and monitoring tools. Inline: traffic that is coming into or leaving the network can be inspected enroute.Inline Decryption can be used for both inline and out-of-band tool deployments. Moreover, it includes built-in policy management, Uniform Resource Locator (URL) categorization, support for all leading ciphers, and reporting. With a dedicated cryptographic processor, Inline Decryption provides the best throughput integrated with a visibility solution. The Inline Decryption capability is available via separate high-performance application modules that are compatible with Vision ONEā¢ and Vision X, both turnkey network packet brokers that provide high-performance, lossless visibility. Keysight's Inline Decryption can be used for both inline and out-of-band tools, for outbound and inbound traffic, and it can be used simultaneously with NetStack, PacketStack and AppStack capabilities. Keysight's Inline Decryption capability, an addition to the SecureStack feature set, enables organizations to see inside traffic that uses ephemeral key cryptography through its visibility platform. As most traffic becomes encrypted and with ephemeral key on its way to becoming the dominant technology, organizations need a way to retain the benefits of Transport Layer Security (TLS) 1.3, while being able to inspect traffic for threats and malware to protect their networks and users.
0 Comments
Leave a Reply. |