Case Study

Encrypted Traffic Analysis

Encrypted Traffic Analysis

Pages 4 Pages

Encryption is on the rise and for a good reason, too - the protection of customer information and business-sensitive data is of great concern to all businesses today. Although it is necessary for data protection, encryption creates certain obstacles for security teams, who are still required to protect their networks in spite of the lack of visibility. Moreover, encryption can be used by attackers to mask their intentions, and weak encryption can even be exploited to their advantage. It is estimated that up to 50 % of all known cyber attacks use encryption, and there is universal agreement that encrypted traffic is an important source of security risks. In spite of this, many businesses still lack the means to monitor encrypted traffic, where up to a half of organizations cannot det

Join for free to read