Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Blue Coat: SSL Interception

Posted on 2011-02-23
2
1,450 Views
Last Modified: 2012-05-11
What exactly does the SSL Interception do? I understand how it works, however what does Blue Coat do with the decrypted traffic.

Thanks.

0
Comment
Question by:NYGiantsFan
2 Comments
 
LVL 32

Accepted Solution

by:
dpk_wal earned 250 total points
ID: 34968149
This provides some input:
https://forums.bluecoat.com/viewtopic.php?f=1&t=6609

Thank you.
0
 
LVL 63

Assisted Solution

by:btan
btan earned 250 total points
ID: 34986023
thought you would check out my replies to learn more of SSL intercept
@ http://www.experts-exchange.com/Security/Encryption/Q_26691453.html?cid=1065#a34434902

Since you are aware of the SSL Interception, I will not delve into that, and in particular for Bluecoat, it actually has two mode namely the transparent and explicit mode - I see it as passive and active enforcement check. The key is typically the decrypted traffic is needed to scan for exploits and malicious content such as shellcode and etc. Bluecoat help to intercept and decrypt the traffic so that other server such as AV Server, DLP Server and etc can perform their checks and alert back to trigger alarm. Bluecoat provides such facilities and actually if you have other proxy server and can pass on the decrypted (or even encrypted) traffic for staged processing depending on deployment need. Basically, Bluecoat just wanted to do due diligence in content filtering and it need such visibility - additional support or scanning can be offload ...

0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
how to remove .wallet ransomware 8 209
fb messenger security and privacy 15 95
CSS: Making Pure CSS read more boxes thinner 5 41
Moving from Mcrypt to OpenSSL 18 45
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question