際際滷

際際滷Share a Scribd company logo
FEATURED | WE SUPPORT SAFE AND CLEAN NETWORK ENVIRONMENT
See encrypted traffic in your network.The use of Secure Sockets Layer (SSL) /Transport Layer Security
(TLS) communications in todays enterprises is huge. Websites that take advantage of it such as
Google.com, Yahoo.com and Facebook.com are commonplace and rapidly growing. Today, 25% or
more of enterprisesnetwork traffic uses SSL /TLS encryption.Encryption protects sensitive data from
being viewed in transit over the Internet,but it also creates a significant blind spot for advanced mal-
ware while facing privacy and regulatory compliance risks.
You need to manage this dilemma and establish a comprehensive encrypted traffic management
strategy that addresses acceptable-use policies for inbound and outbound encrypted traffic, while
considering an extensible architecture that will protect the business, and also adaptable to privacy
and compliance demands.
To identify hidden threats to your organization, its clear you need complete visibility into the
encrypted traffic coming into and out of your business.However,to comply with local privacy regula-
tions that protect certain types of data,such as financial or healthcare-related,as well as with corpo-
rate policies on the acceptable use of applications,organizations must be able to selectively decrypt
network traffic.
Decrypting SSL Traffic:
Provides data for a quick countermeasure after analyzing decrypted network communi-
cation for threats from encrypted network communication.
Convenient blocking / managing policy by various configurations:
With web-based management page,managing access policy by using various condition
(user/server IP/URL) and user information for local privacy regulations and corporate
policies.
Interworking with various 3rd
party solutions and S/W:
Provides cooperated shield system and combined security policy by Interworking other
S/W such as internet access management/DLP/Malware Preventing Solution for compre-
hensive protection of your network.
Supporting all web browser and internet S/W:
Monitoring access to the website regardless of version and type of web browsers.Also
support all OS type for access monitoring.
Various network environment compositions:
Supports three installation methods considering the network environment and policy
(Explicit Mode,Transparent Mode,and WCCP Mode) for easy installation / management.
SSLVisibility Solution
Your answer to solve those issues: eWalker SSLVisibility Solutions
FEATURED | WE SUPPORT SAFE AND CLEAN NETWORK ENVIRONMENT
PLUSTECH INC. 1Bamgogae-ro 1-gil,Gangnam-gu,Seoul,Korea 135-539 / TEL:+82.2.541.0073 / FAX:+82.2.541.0204 / www.plustechglobal.com
System Composition

More Related Content

Ssl visibility solution - eWalker SSL

  • 1. FEATURED | WE SUPPORT SAFE AND CLEAN NETWORK ENVIRONMENT See encrypted traffic in your network.The use of Secure Sockets Layer (SSL) /Transport Layer Security (TLS) communications in todays enterprises is huge. Websites that take advantage of it such as Google.com, Yahoo.com and Facebook.com are commonplace and rapidly growing. Today, 25% or more of enterprisesnetwork traffic uses SSL /TLS encryption.Encryption protects sensitive data from being viewed in transit over the Internet,but it also creates a significant blind spot for advanced mal- ware while facing privacy and regulatory compliance risks. You need to manage this dilemma and establish a comprehensive encrypted traffic management strategy that addresses acceptable-use policies for inbound and outbound encrypted traffic, while considering an extensible architecture that will protect the business, and also adaptable to privacy and compliance demands. To identify hidden threats to your organization, its clear you need complete visibility into the encrypted traffic coming into and out of your business.However,to comply with local privacy regula- tions that protect certain types of data,such as financial or healthcare-related,as well as with corpo- rate policies on the acceptable use of applications,organizations must be able to selectively decrypt network traffic. Decrypting SSL Traffic: Provides data for a quick countermeasure after analyzing decrypted network communi- cation for threats from encrypted network communication. Convenient blocking / managing policy by various configurations: With web-based management page,managing access policy by using various condition (user/server IP/URL) and user information for local privacy regulations and corporate policies. Interworking with various 3rd party solutions and S/W: Provides cooperated shield system and combined security policy by Interworking other S/W such as internet access management/DLP/Malware Preventing Solution for compre- hensive protection of your network. Supporting all web browser and internet S/W: Monitoring access to the website regardless of version and type of web browsers.Also support all OS type for access monitoring. Various network environment compositions: Supports three installation methods considering the network environment and policy (Explicit Mode,Transparent Mode,and WCCP Mode) for easy installation / management. SSLVisibility Solution Your answer to solve those issues: eWalker SSLVisibility Solutions
  • 2. FEATURED | WE SUPPORT SAFE AND CLEAN NETWORK ENVIRONMENT PLUSTECH INC. 1Bamgogae-ro 1-gil,Gangnam-gu,Seoul,Korea 135-539 / TEL:+82.2.541.0073 / FAX:+82.2.541.0204 / www.plustechglobal.com System Composition