What you can expect:
Much of today's network traffic is encrypted – and attackers exploit this very channel to infiltrate malware or steal data without being detected. Traditional security mechanisms quickly reach their limits here.
In this webcast, we provide a practical overview of how Palo Alto Networks firewalls can be used to control and secure encrypted SSL and SSH traffic. Topics include:
- Decryption policies: selective decryption by source, destination, service or URL category.
- Use of decryption profiles to control certificates, protocols and cipher suites.
- Differences and use cases of SSL forward proxy, SSL inbound inspection and SSH proxy.
- Best practices for productive use (e.g. handling certificate pinning, exceptions for sensitive applications).
Sign up now