Encrypted traffic surge demands smarter decryption. GigaSMART® TLS/SSL Decryption unlocks deep observability for security and monitoring tools, allowing you to protect your network against threats. Decrypt selectively, maintain data privacy, optimize performance, and validate against security policies for Zero Trust compliance.
TLS/SSL Decryption empowers SecOps, NetOps, and application teams to:
Streamline and boost the effectiveness of your security and monitoring tools by delegating resource-intensive decryption tasks.
Leverage Existing Tools
Allow inspection by security and monitoring tools while maintaining overall data and security posture.
Maintain Data Encryption
Enable decrypted data to be
re-encrypted before sending
it to its intended destination.
Reinforce Zero Trust
Validate encrypted traffic to reinforce Zero Trust architectures and enforce security policies.
GigaSMART centralizes decryption, including TLS 1.3, enhancing security and performance across the hybrid cloud. It exposes malware hidden in encrypted traffic and supports both inline and passive modes.
Flexible Deployment Options
Enable TLS/SSL detection on any port or application, from 10 Mb up to 100 Gb interface support. Decrypt once, feed as many tools in any sequence as required.
Integration Options
Integrate smoothly with the Venafi Trust Protection Platform, Thales Luna HSM, and Entrust nShield HSM to centralize key management and validation.
Future-Proof Scalability
Protect tool performance and scale as needed. Support easy tool maintenance, updates, and upgrades. Add or remove tools with no service interruption.
Rapid Troubleshooting
Assess performance, compliance, and risks with granular visualization controls in the TLS/SSL Dashboard.
To protect vital data, enterprises and other organizations implement Transport Layer Security (TLS), commonly referred to as the superseded Secure Socket Layer (SSL), to encrypt data as it is exchanged over IP networks. But what is SSL decryption and how does it work? SSL/TLS creates a secure channel between the server and the end user's computer or other devices as they exchange information over the internet and different browsers.
TLS is an industry standard based on a system of trusted rules and certificates issued by certificate authorities and recognized by servers. SSL decryption was replaced by the TLS standard in 2015. In 2018, TLS 1.3 was standardized, which is a policy that mandates the use of perfect forward secrecy for maximum security. About 20 percent of corporate internet traffic is now on TLS 1.3.[3]
While protecting data, encryption also blinds network security and application monitoring tools. TLS/SSL decryption traffic is crucial for these tools. However, it is extremely computationally intensive and can introduce network latency.
The best architecture minimizes the decryption required to inspect all relevant and active traffic while offering legal and privacy controls. The centralized approach to SSL decrypting offered by Gigamon — decrypt once and feed all tools — provides such an architecture.
“Before Gigamon, we had out-of-band SSL decryption everywhere, and we were decrypting about 65 percent of traffic on average. Now, with the GigaSMART SSL decryption engine, we typically get well over 90 percent visibility in the encrypted traffic.”
“Gigamon is traditionally thought of as a network efficiency platform, but the underlying technology has radical implications in cybersecurity as well. Visibility of encrypted packets is more of a must-have than a like-to-have, and intelligent traffic handling is a requisite in optimizing bandwidth and reducing storage costs.”
"It's a set it and forget it type of appliance, I love the deduplication features, SSL Decryption, and multiple cloud virtual tap functionality! So this is a very hybrid solution!"
Gartner® and Peer Insights™ are trademarks of Gartner, Inc. and/or its affiliates. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
To explore more use case videos, visit the Tech Hub.