Solved

Blue Coat: SSL Interception

Posted on 2011-02-23
2
1,461 Views
Last Modified: 2012-05-11
What exactly does the SSL Interception do? I understand how it works, however what does Blue Coat do with the decrypted traffic.

Thanks.

0
Comment
Question by:NYGiantsFan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 32

Accepted Solution

by:
dpk_wal earned 250 total points
ID: 34968149
This provides some input:
https://forums.bluecoat.com/viewtopic.php?f=1&t=6609

Thank you.
0
 
LVL 63

Assisted Solution

by:btan
btan earned 250 total points
ID: 34986023
thought you would check out my replies to learn more of SSL intercept
@ http://www.experts-exchange.com/Security/Encryption/Q_26691453.html?cid=1065#a34434902

Since you are aware of the SSL Interception, I will not delve into that, and in particular for Bluecoat, it actually has two mode namely the transparent and explicit mode - I see it as passive and active enforcement check. The key is typically the decrypted traffic is needed to scan for exploits and malicious content such as shellcode and etc. Bluecoat help to intercept and decrypt the traffic so that other server such as AV Server, DLP Server and etc can perform their checks and alert back to trigger alarm. Bluecoat provides such facilities and actually if you have other proxy server and can pass on the decrypted (or even encrypted) traffic for staged processing depending on deployment need. Basically, Bluecoat just wanted to do due diligence in content filtering and it need such visibility - additional support or scanning can be offload ...

0

Featured Post

Create Professional Looking Email Signatures

Create "Professional HTML Email Signatures" with ease.
7 Day Money Back Guarantee if not 100% Satisfied.
Affordable - Try it out for 7 Days Totally Risk Free.
Installers provided for over 45 Email clients.
Both Windows & MAC Supported.
Highly Recommended!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question