[E-book] Encrypted Traffic Visibility For Modern Networks

By clicking download, you agree to your information being included in the marketing database of ipoque.

This special edition e-book features the views of 25 leading IP networking solution vendors on the benefits and impact of encryption, and the approaches for addressing visibility loss from emerging encryption protocols.

Over the last decade, there has been a sharp growth in the use of encryption, driven by the need for user and data privacy, increasing concerns over cyberattacks such as breaches and ransomware, and the overall ease of implementing encryption technologies. In March 2023, 93% of pages loaded on a Chrome browser on Windows were encrypted, according to Google’s Transparency Report. Seven years ago, this figure was only 39%.

At the same time, advancements in encryption methodologies have led to stronger and more secure encryption protocols, such as TLS 1.3, ECH and QUIC. As these protocols evolve, we expect to see technologies such as post-quantum cryptography and homomorphic encryption emerge, which will lead to encrypted traffic being nearly impossible to decipher or crack.

These two trends in combination pose an enormous challenge to network operators as they can no longer inspect or analyze encrypted traffic using traditional network visibility tools, resulting in the inability to identify and classify the traffic traversing their networks.

This visibility gap leads to the inability to correctly execute network policies, route and optimize traffic, detect threats, generate insights and analytics, troubleshoot network issues and more. As a result, network costs increase, user experience takes a hit and ironically, network security deteriorates.

To address this lack of visibility, operators and enterprises are adopting a number of technologies, including SSL / TLS inspection, behavioral / statistical / heuristic analysis, machine learning and deep learning.

The Fast Mode spoke to 25 leading IP networking solution vendors that offer policy control, traffic management, network security, analytics and network performance management solutions, on their thoughts on:

  • The benefits of encryption
  • The impact of encryption on today’s networks and networking functions
  • The tools and technologies that can be used to achieve encrypted traffic visibility

Vendors featured in the e-book include:

  • ALE International
  • Alepo
  • Amdocs
  • Anritsu
  • Aryaka
  • Catchpoint
  • CMC Networks
  • Comcast Business
  • Emblasoft Test & Measurement
  • F5
  • Futurism Technologies
  • Gigamon
  • Involta
  • ITRS Group
  • Juniper Networks
  • Lancom Systems
  • Mutare
  • NTT
  • Optiva
  • Regpack
  • Spirent Communications
  • Tata Communications
  • Teneo
  • Versa Networks
  • VMware

Get your free copy today by filling in the download form to the right.

22 March 2023 / Telecom White Papers / By Ray Sharma