Orchestrate Encrypted Traffic Across the Enterprise Using Safe, Secure and Scalable Decryption.

How Mira Works

Mira Encrypted Traffic Orchestration (ETO) automatically detects SSL, TLS and SSH traffic and feeds it to one or more security tools that detect and mitigate any threats that may be present. No special interfaces or software changes are required to the security tools. They simply receive traffic from Mira ETO as if it was traffic directly from the network. This means the existing security stacks can regain their effectiveness, diminished by the increase in encrypted traffic, simply by deploying Mira ETO to feed them.

MIRA DEPLOYMENT MODES

Mira Deployment Mode Architectures

Software Subscription License

Mira ETO software is licensed as a subscription model. Subscriptions can be for 12 months or 36 months and can be upgraded during the subscription period. The license purchased determines the amount of encrypted traffic that can be decrypted to provide visibility for security tools.

Mira ETO Demo

In this video we see how Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.

Enterprises need to balance security risks of not decrypting traffic with the privacy implications of doing so.

Mira ETO provides the flexible policy controls to ensure that balance is achieved.

Mira Log Overview Screen

Flexible policy control features of Mira ETO enable enterprises to enforce policy on what encryption mechanisms are allowed in order to ensure a secure environment. For encrypted traffic that is allowed, there are fine-grained policies that enable control over which encrypted flows are decrypted and made visible to security tools. Policy controls can optionally make use of the Mira category database and/or a locally created category database to determine which types of traffic are decrypted.

Mira ETO software is designed for high-performance decryption and can work with link speeds of 1, 10, 25, 40 and soon 100 Gbps, providing decryption for anywhere from <1 Gbps of encrypted traffic up to >100 Gbps. Mira’s ETO software supports high rates of new TLS handshakes per second, ensuring that there is no performance impact when deployed. The software is architected to allow the use of external hardware PKI engines enabling both decryption performance and new handshake performance to be scaled even higher.

Mira Log Details Screen
Mira Security Appliances

Appliance Licensing

A license can be used on either a virtual appliance or on one of the hardware appliances available from Mira Security. The following matrix shows which licenses can be used on specific appliance models:

Mira Security Licensing Table

Virtual Appliance Details: Support for KVM and ESXi. Licensed capacity defines requirements for virtual appliance in terms of memory and CPU cores.

LOOK DEEPER INTO MIRA

Mira removes enterprise network “blind spots” by providing visibility into unencrypted connection for the full range of security and analytic tools.

Learn more about Mira by downloading the product data sheet or whitepaper.

Mira Security Documents

Sign Up for Your Exclusive Mira Demo Today.

We always respect your privacy. Read our PRIVACY POLICY.