What you can expect:

Much of today's network traffic is encrypted – and attackers exploit this very channel to infiltrate malware or steal data without being detected. Traditional security mechanisms quickly reach their limits here. 
In this webcast, we provide a practical overview of how Palo Alto Networks firewalls can be used to control and secure encrypted SSL and SSH traffic. Topics include:

  • Decryption policies: selective decryption by source, destination, service or URL category.
  • Use of decryption profiles to control certificates, protocols and cipher suites.
  • Differences and use cases of SSL forward proxy, SSL inbound inspection and SSH proxy.
  • Best practices for productive use (e.g. handling certificate pinning, exceptions for sensitive applications).

Sign up now

Agenda.

10:00 pam
Start of webinar

Lorem ipsum dolor sit amet

11:00 pm
End of webinar

Speaker.

 Portrait of James Lepthien
James Lepthien

Solutions Consultant | Palo Alto Networks GmbH