Detect. Decrypt. Deter.
Encryption Orchestration without Compromise
Addressing Visibility Challenges with TLS 1.3
Mira Security is working with the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) on the Addressing Visibility Challenges with TLS 1.3 Project.
Introducing the World’s First Dedicated Virtual TLS Decryption Appliance for Enterprises
Sign up for your exclusive Mira vETO Virtual Decryption Appliance trial today.
Nearly all Network Traffic is Encrypted.
And Encryption Standards are Getting Tougher.
While encryption is great for ensuring privacy and data protection, current security tools are “blind” to threats carried by encrypted connections. And that gives bad actors a method to infiltrate networks.
Today, with enterprise networking moving to the cloud, and workers moving to the home, a whole new set of challenges is forcing compromises between privacy and security.
The Word “Mira” Indicates Visibility.
Mira Encrypted Traffic Orchestration (ETO) enables enterprises to remove this “blind spot” by providing visibility into unencrypted traffic for the full range of security and analytic tools being used. The Mira solution addresses encryption challenges and removes bottlenecks today, and can scale with the architectures of tomorrow.
Mira provides safe and secure visibility into encrypted traffic allowing the tools used by enterprise security teams to function effectively
Mira ETO software enables the enterprise security stack to detect and mitigate threats while ensuring that privacy and compliance requirements can be met.
- Automatically detect all SSL/TLS and SSH traffic in the network, no matter what ports are being used
- Capable of decrypting SSL v3, TLS 1.0, 1.1, 1.2 and 1.3, as well as SSHv2
- Transparent to the higher-level protocols being carried on top of the encrypted layer providing decrypted flows to security tools for any existing or future protocols
Mira seamlessly integrates with existing security tools to protect your investments
- Policy control over which encrypted traffic is made visible allows compliance with industry requirements and enterprise policies on data privacy
- Policy control over which encryption mechanisms are allowed in the enterprise network to prevent weak or obsolete methods from being used
- Comprehensive logging enables the enterprise to analyse encrypted traffic within the network and derive actionable changes to operational policy
- Scaling from a sub 1G for branch offices and micro edge locations to nearly 100G allows for growth and supports the collapsing of data centers.
Enterprises need to balance the security risks of not decrypting traffic with the privacy implications of doing so.
Mira ensures that balance is achieved.
Encrypted Traffic Inspection in Today’s Enterprise
Mira Security’s David Wells – Head of Product Strategy, will be presenting on October 11 at 12:10 p.m. ET at the Venafi Virtual Machine Identity Management Summit 2022.
David’s presentation will focus on how security teams can architect for visibility into encrypted traffic for TLS and SSH in 2022 and beyond. TLS 1.3 has brought many new questions; but, still, most of the needs for visibility in and out of organizations is for TLS 1.2 visibility. And we are now faced with new questions like, “How does visibility fit in to a zero trust strategy?” and, “How to address new cloud-native architectures?” Security teams need to know why an encrypted traffic strategy is still required by the enterprise, how it is done safely, what is changing in the standards, and how this impacts visibility solutions. There are so many questions, and this session will get to the answers for all of them.
Wednesday-Friday November 9-11, 2022
Grand Hyatt Athens, Athens, Greece
SuriCon is an annual open source technology community conference that highlights discussions and developments relative to Suricata, the powerful intrusion detection and prevention tool. Throughout the span of three days, SuriCon showcases speakers from around the globe who provide their expertise and insight into how best to maximize the application of Suricata’s technology. Attendees have the opportunity to network with sponsors, discuss new applications and knowledge during poster sessions, & mingle freely in a more relaxed environment than the usual virtual space Suricata users often occupy. SuriCon also hosts an add-on option for advanced hands-on training sessions which take place throughout the two days prior to the general sessions. These are led by Suricata developers.
mnemonic AS Podcast
Episode 66: Encrypted Traffic Management
TLS, SSL, HTTP, keys, authentication, clients, servers and ciphers – encryption is complicated.
To help shed some light on how enterprises can remove the “blind spot” of encrypted network communication, we’ve invited David Wells, co-founder of Netronome and Mira Security, who is a pioneer in the SSL/SSH inspection space.
David explains why being able to see and analyze encrypted traffic is necessary in order to gain full security value out of your network data, and shares his experiences since he inadvertently invented a tool for SSL inspection in 2003.