Mira Security Resources
Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.
For any assistance please contact us at support@mirasecurity.com.
PRODUCT BRIEF
Mira Security Encrypted Traffic Orchestration
Encrypted traffic has become ubiquitous in networks today, delivering privacy and protecting users’ data. However, encrypting data also creates a new set of security issues for enterprises, as existing security mechanisms are “blind” to any threats carried by encrypted connections. The Mira ETO software enables an enterprise to remove this “blind spot” by providing visibility into the unencrypted connection for the full range of security and analytic tools being used.
PRODUCT BRIEF
Mira Security Virtual Encrypted Traffic Orchestration
Mira Virtual Encrypted Traffic Orchestration (vETO) software provides safe and secure visibility into encrypted traffic allowing the tools used by enterprise security teams to function effectively, even when all the important traffic is encrypted. Enabling the enterprise security stack to detect and mitigate threats while providing features to enable privacy and ensure compliance requirements can be met is central to Mira vETO software.
MIRA WHITEPAPER
Without Visibility, There is No Security
These days all network traffic is encrypted making the job of security tools significantly more difficult as threats are hidden inside the encrypted traffic flow. This paper looks at the reasons why visibility into encrypted traffic may be required by an enterprise and then considers the technical mechanisms available to provide such visibility to security tools as well as network performance management tools. The benefits and drawbacks of different approaches are discussed with examples of what an enterprise deployment may look like.
MIRA WHITEPAPER
Architecture Matters when Choosing a TLS Visibility Solution
Gaining visibility into encrypted traffic, primarily TLS, in order to detect and prevent cybersecurity threats is an important part of an Enterprise security strategy. In order to protect against these attacks, security devices need the ability to see inside encrypted flows in order to detect and block threats.The focus of this paper is on the differing ways that security tools can gain visibility into TLS traffic flows and the strengths and weaknesses of the architectures underpinning these approaches.
mnemonic AS Podcast
Episode 66: Encrypted Traffic Management
TLS, SSL, HTTP, keys, authentication, clients, servers and ciphers – encryption is complicated.
To help shed some light on how enterprises can remove the “blind spot” of encrypted network communication, we’ve invited David Wells, co-founder of Netronome and Mira Security, who is a pioneer in the SSL/SSH inspection space.
David explains why being able to see and analyze encrypted traffic is necessary in order to gain full security value out of your network data, and shares his experiences since he inadvertently invented a tool for SSL inspection in 2003.

Intro to Mira Security
Welcome to Mira Security. Find out a bit more about our history and how we can improve your networks security.
Mira ETO Demo
In this video we see how Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.
Mira Category Database
In this video we see how the Mira Category Database is able to bypass categories of traffic to ensure the integrity of user’s sensitive personal data.
Minimum Decryption Policy
In this video we see how to create a policy and segment with the minimum settings needed to decrypt traffic flows.