Mira Security Product Videos
Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.
For any assistance please contact us at support@mirasecurity.com.
Intro to Mira Security
Welcome to Mira Security. Find out a bit more about our history and how we can improve your networks security.
Mira ETO Demo
In this video we see how Mira Security Encrypted Traffic Orchestration can enable your network security systems to properly monitor traffic and detect threats that they would otherwise miss due to encryption.
Mira ETO SSH Decryption Demo
This video explains configuring SSH decryption in the Mira Security Encrypted Traffic Orchestrator.
Encrypted Traffic Orchestrator working as a TLS/PKI Firewall
In this demo, we will explore how ETO enhances your network security, particularly in the realm of TLS traffic and certificates, working as a firewall at the SSL and PKI level.
Mira Category Database
In this video we see how the Mira Category Database is able to bypass categories of traffic to ensure the integrity of user’s sensitive personal data.
Minimum Decryption Policy
In this video we see how to create a policy and segment with the minimum settings needed to decrypt traffic flows.
VLAN Tag-Based Rules
This video shows how to use the VLAN tags to create rules in order to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestration (ETO).
Decryption Within Tunnels
This video covers decryption within tunnels: How you can use the Mira ETO to decrypt traffic that’s encapsulated within a tunnel.
Creating Matchlists for Rules
This video demonstrates how to create matchlists and use them in rules to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestrator (ETO).
Configuring Local Category Database
This video demonstrates how to create the local category database and use in rules to bypass, drop or decrypt traffic on the Mira Encrypted Traffic Orchestrator (ETO).
Configuring Remote Syslogs
This video demonstrates how to configure a remote syslog server to receive ETO’s session logs, system logs, and Alerts which are sent from ETO over the management port.
NGFW Data Filtering
This demo demonstrates how a NGFW filtering capability could benefit from the ETO TLS decryption in an inline/inline mode to detect, filter, and, if needed, block any malicious attempts to send confidential data outside of your network.
Encrypted Traffic Orchestrator (ETO) Integration with Trellix IPS Platform
In this demo, we will be able to see how Mira’s Encrypted Traffic Orchestrator (ETO) and the Trellix IPS Platform can enhance enterprise threat detection capabilities by preventing malicious network activity.