Mira Security Product Videos
Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.
For any assistance please contact us at support@mirasecurity.com.
Intro to Mira Security
Welcome to Mira Security. Find out a bit more about our history and how we can improve your networks security.
Mira ETO Demo
In this video we see how Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.
Mira Category Database
In this video we see how the Mira Category Database is able to bypass categories of traffic to ensure the integrity of user’s sensitive personal data.
Minimum Decryption Policy
In this video we see how to create a policy and segment with the minimum settings needed to decrypt traffic flows.
VLAN Tag-Based Rules
This video shows how to use the VLAN tags to create rules in order to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestration (ETO).
Decryption Within Tunnels
This video covers decryption within tunnels: How you can use the Mira ETO to decrypt traffic that’s encapsulated within a tunnel.
Creating Matchlists for Rules
This video demonstrates how to create matchlists and use them in rules to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestrator (ETO).
Configuring Local Category Database
This video demonstrates how to create the local category database and use in rules to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestrator (ETO).
Configuring Remote Syslogs
This video demonstrates how to configure a remote syslog server to receive ETO’s session logs, system logs, and Alerts which are sent from ETO over the management port.
NGFW Data Filtering
This demo demonstrates how a NGFW filtering capability could benefit from the ETO TLS decryption in an inline/inline mode to detect, filter, and, if needed, block any malicious attempts to send confidential data outside of your network.