{"id":71021,"date":"2018-04-05T05:00:36","date_gmt":"2018-04-05T12:00:36","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=71021"},"modified":"2019-01-29T13:20:25","modified_gmt":"2019-01-29T21:20:25","slug":"decrypt-not-decrypt-even-question","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2018\/04\/decrypt-not-decrypt-even-question\/","title":{"rendered":"To Decrypt or Not to Decrypt \u2013 Is That Even a Question?"},"content":{"rendered":"<p>When you clicked a link to view this blog post, both your web request and the response were encrypted. Many of the websites you visit today\u2014search engines, social media sites, news sites, video streaming sites\u2014use HTTPS to encrypt communications. In fact, HTTPS now accounts for more than 69 percent of web traffic.<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> Although all this encryption improves security and privacy, it also allows attackers to conceal their threats from security controls that inspect application traffic.<\/p>\n<p>If you\u2019re a security professional, you might be wondering what you should do to protect your organization and your data. If you\u2019ve implemented Palo Alto Networks Next-Generation Security Platform, then you can relax; we\u2019ve got you covered. You just need to make sure you\u2019re taking advantage of the features we offer to eliminate blind spots in your defenses.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">A Comprehensive Approach to Securing Encrypted Traffic<\/span><br \/>\nPalo Alto Networks has developed multiple technologies to inspect and secure all traffic, including encrypted traffic. These technologies include:<\/p>\n<table style=\"height: 386px;\" border=\"0\" width=\"628\">\n<tbody>\n<tr>\n<td style=\"width: 208px; vertical-align: top;\"><div style=\"max-width:100%\" data-width=\"210\"><span class=\"ar-custom\" style=\"padding-bottom:78.1%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-71366 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/04\/magnifier1.png\" width=\"210\" height=\"164\" \/><\/span><\/div><\/td>\n<td style=\"width: 209px;\"><img decoding=\"async\"  class=\"aligncenter wp-image-71273 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/04\/screenshot-2.png\" alt=\"Magnifier 2\" width=\"210\" \/><\/td>\n<td style=\"width: 210px;\"><div style=\"max-width:100%\" data-width=\"210\"><span class=\"ar-custom\" style=\"padding-bottom:78.1%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-71405 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/04\/magnifier3.jpg\" alt=\"magnifier3\" width=\"210\" height=\"164\" \/><\/span><\/div><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 208px;\"><strong>High-Speed SSL Decryption<br \/>\n<\/strong>Next-generation firewalls can decrypt and inspect SSL traffic. Supporting flexible deployment options, including the ability to act as an <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2018\/02\/announcing-pan-os-8-1-streamline-ssl-decryption-accelerate-adoption-security-best-practices\/\">SSL decryption broker<\/a>, next-generation firewalls can decrypt SSL traffic and provide the decrypted data to other inline security devices.<\/td>\n<td style=\"width: 209px; vertical-align: top;\"><strong>Behavioral Analytics<br \/>\n<\/strong>Magnifier behavioral analytics monitors network traffic and detects anomalies indicative of active attacks. Because Magnifier analyzes network metadata rather than traffic contents, it can detect advanced attacks without requiring traffic to be decrypted.<\/td>\n<td style=\"width: 210px; vertical-align: top;\"><strong>Advanced Endpoint Protection<\/strong> Attacks hidden in HTTPS traffic ultimately target endpoints and their data.<\/p>\n<p>Traps advanced endpoint protection stops exploits and malware before they can compromise corporate machines.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Powerful SSL Decryption<\/span><br \/>\nTo stop attackers in their tracks, organizations should leverage all the capabilities of Palo Alto Networks Next-Generation Security Platform. By configuring the next-generation firewall to decrypt and inspect network traffic, customers can take full advantage of features and services such as App-ID, Threat Prevention and WildFire cloud-based threat analysis service.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 18pt;\">Stopping Network Attacks Without Decrypting Traffic<\/span><br \/>\nThreat actors operating inside the network will typically perform a step-by-step process to explore their surroundings and expand their realm of control until they locate and steal or destroy valuable data. Leveraging their existing access and privileges, they can often stay under the radar by avoiding the use of malware.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/products\/secure-the-network\/magnifier-behavioral-analytics\">Magnifier behavioral analytics<\/a>, the first app for Palo Alto Networks Application Framework, profiles user and device behavior and detects anomalies that indicate an attack is underway. Because Magnifier primarily analyzes network metadata\u2014such as the source and destination IP addresses, the protocols, and volume of traffic transferred\u2014rather than application contents, it can detect threats even when application contents are encrypted.<\/p>\n<p>Magnifier draws on rich data from next-generation firewalls, such as User-ID and endpoint data gathered by Magnifier Pathfinder endpoint analysis service, to augment its network findings.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>To learn how Magnifier uncovers internal network threats, download the white paper \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/stop-targeted-attacks-without-decrypting-traffic.html\">Stop Targeted Attacks Without Decrypting Traffic<\/a>.\u201d<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> Let\u2019s Encrypt with Firefox telemetry, <a href=\"https:\/\/letsencrypt.org\/stats\/\" rel=\"nofollow,noopener\" >https:\/\/letsencrypt.org\/stats\/<\/a>, web page loads as of March 12, 2018.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about our comprehensive approach to securing encrypted traffic<\/p>\n","protected":false},"author":370,"featured_media":71069,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6717,1229],"tags":[4716,5233,5230,747],"coauthors":[3907],"class_list":["post-71021","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-services","category-security-platform","tag-application-framework","tag-behavioral-analytics","tag-magnifier","tag-ssl-decryption"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2018\/04\/jyn-magnifier-blog-600x382-opa.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/71021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/370"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=71021"}],"version-history":[{"count":12,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/71021\/revisions"}],"predecessor-version":[{"id":74402,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/71021\/revisions\/74402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/71069"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=71021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=71021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=71021"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=71021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}