+1 (412) 533-7830 info@mirasecurity.com
  • LinkedIn
  • YouTube
  • LinkedIn
  • YouTube

Mira Security Product Videos

Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.

For any assistance please contact us at support@mirasecurity.com.

Intro to Mira Security

Welcome to Mira Security. Find out a bit more about our history and how we can improve your networks security.

Mira ETO Demo

In this video we see how Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.

Encrypted Traffic Orchestrator working as a TLS/PKI Firewall

In this demo, we will explore how ETO enhances your network security, particularly in the realm of TLS traffic and certificates, working as a firewall at the SSL and PKI level.

Mira Category Database

In this video we see how the Mira Category Database is able to bypass categories of traffic to ensure the integrity of user’s sensitive personal data.

Minimum Decryption Policy

In this video we see how to create a policy and segment with the minimum settings needed to decrypt traffic flows.

VLAN Tag-Based Rules

This video shows how to use the VLAN tags to create rules in order to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestration (ETO).

Decryption Within Tunnels

This video covers decryption within tunnels: How you can use the Mira ETO to decrypt traffic that’s encapsulated within a tunnel.

Creating Matchlists for Rules

This video demonstrates how to create matchlists and use them in rules to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestrator (ETO).

Configuring Local Category Database

This video demonstrates how to create the local category database and use in rules to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestrator (ETO).

Configuring Remote Syslogs

This video demonstrates how to configure a remote syslog server to receive ETO’s session logs, system logs, and Alerts which are sent from ETO over the management port.

NGFW Data Filtering

This demo demonstrates how a NGFW filtering capability could benefit from the ETO TLS decryption in an inline/inline mode to detect, filter, and, if needed, block any malicious attempts to send confidential data outside of your network.