Solved

Blue Coat: SSL Interception

Posted on 2011-02-23
2
1,454 Views
Last Modified: 2012-05-11
What exactly does the SSL Interception do? I understand how it works, however what does Blue Coat do with the decrypted traffic.

Thanks.

0
Comment
Question by:NYGiantsFan
2 Comments
 
LVL 32

Accepted Solution

by:
dpk_wal earned 250 total points
ID: 34968149
This provides some input:
https://forums.bluecoat.com/viewtopic.php?f=1&t=6609

Thank you.
0
 
LVL 63

Assisted Solution

by:btan
btan earned 250 total points
ID: 34986023
thought you would check out my replies to learn more of SSL intercept
@ http://www.experts-exchange.com/Security/Encryption/Q_26691453.html?cid=1065#a34434902

Since you are aware of the SSL Interception, I will not delve into that, and in particular for Bluecoat, it actually has two mode namely the transparent and explicit mode - I see it as passive and active enforcement check. The key is typically the decrypted traffic is needed to scan for exploits and malicious content such as shellcode and etc. Bluecoat help to intercept and decrypt the traffic so that other server such as AV Server, DLP Server and etc can perform their checks and alert back to trigger alarm. Bluecoat provides such facilities and actually if you have other proxy server and can pass on the decrypted (or even encrypted) traffic for staged processing depending on deployment need. Basically, Bluecoat just wanted to do due diligence in content filtering and it need such visibility - additional support or scanning can be offload ...

0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question