6 Discoveries IT Security Pros Need to Know about SSL Inspection

Resource description

Threat actors are evolving. They are leveraging SSL-based encryption to hide malicious activity from existing security controls.

To shed light on this emerging threat, A10 Networks commissioned the Ponemon Institute to conduct an exclusive study that evaluates threats hiding in SSL traffic, barriers for implementing decryption controls and features for decryption solution selection.