Addressing Risk from the Encrypted Threat Vector: Analysis of the Impact and Importance of Cisco ETA
Addressing Risk from the Encrypted Threat Vector: Analysis of the Impact and Importance of Cisco ETA
21-Jul-2017
North America
Description
Research from the Internet Security Research Group (ISRG) shows that over 50% of Web traffic is now encrypted, since 2016. As the amount of encrypted traffic mounts, enterprises are being forced into difficult decisions, choosing between visibility and data privacy. An all-together new approach to inspecting encrypted traffic, without exposing sensitive and potentially private data, may be required.
On June 20, 2017, Cisco announced a new solution called Encrypted Traffic Analytics (ETA), which would offer a non-intrusive method for assessing encrypted traffic for signs of compromise or threats. This paper will provide an overview of the Cisco ETA solution, and assess the practical use of this technology in enterprise networks, and the impact it will have on the security industry.
Table of Contents
Introduction
The Encryption Challenge
Threat Actors Also Use Encryption
Inspection of Encrypted Traffic is Clunky, at Best
Cloud Adoption Raises Further Questions
Enter Cisco Encrypted Traffic Analytics (ETA)
But How Does It Work?
The Impact of Cisco ETA
Complementing Enterprise IT Tools and Practices
Delivering Options to a Broader Market
Respecting Privacy Requirements
Mitigating Critical Threat Vectors
Alleviating the Burden on Security Point Products
Addressing Future Encryption Trends
Stratecast - The Last Word
About Stratecast
About Frost & Sullivan
Related Research
Popular Topics
No Index | No |
---|---|
Podcast | No |
Author | Chris Rodriguez |
Industries | Information Technology |
WIP Number | 9B0F-00-32-00-00 |
Is Prebook | No |