SSL Visibility Appliance

SSL Visibility Appliance

Clear your encrypted traffic blind spot. Use of Secure Sockets Layer (SSL) or Transport Layer Security (TLS) encryption is pervasive and growing tremendously—and quickly—worldwide. Today, 35% or more of enterprises’ network traffic uses SSL / TLS encryption. Encryption protects data from being viewed in transit over the Internet—but it also creates a significant blind spot for advanced malware while introducing privacy and regulatory compliance risks.

You need to manage this dilemma and establish a comprehensive encrypted traffic management strategy that addresses acceptable-use policies for inbound and outbound encrypted traffic, while considering an extensible architecture that will scale and protect the business—and also adhering to privacy and compliance demands.

The Blue Coat SSL Visibility Appliance is an integral component of any encrypted traffic management strategy, and enhances your existing security and risk posture. This unique solution offers complete visibility and control of encrypted traffic without requiring the re-architecting of the network infrastructure. It lets you add policy-based SSL inspection and management capabilities to your network security architecture and lift the security blindfold created by encrypted traffic.

Bonus points: The appliance enables products like Data Loss Prevention (DLP), sandbox, next-generation firewall (NGFW) and intrusion prevention systems (IPS) with complete visibility into SSL /TLS traffic — and increases their security effectiveness and performance.

You get the following benefits with the SSL Visibility Appliance:

  • A powerful, purpose-built platform that eliminates the SSL / TLS blind spot in your network infrastructure. This unique appliance automatically sees all SSL / TLS traffic – all ports and applications – without the need for complex scripting or configuration. This means you’ll spend less time administering your network security while having a more complete view of what encrypted applications and hidden potential threats are running in and out of your organization.
  • A comprehensive, extensible platform that assures high-security encryption. As a solution solely focused on managing encrypted traffic, the SSL Visibility Appliance provides timely and complete standards support, with over 70 cipher suites and key exchanges offered, and growing. Furthermore, unlike some competitive offerings, this solution does not “downgrade” cryptography levels and weaken your organization’s security posture, putting it at greater risk. As the SSL/TLS standards evolve, so will the management and enforcement capabilities of the SSL Visibility Appliance.
  • A solution that cost-effectively enhances your existing security infrastructure. The SSL Visibility Appliance can decrypt and re-encrypt both inbound and outbound network traffic in a single device – offering the performance and scalability to support the most demanding enterprises. Recognizing that multiple devices need access to SSL/TLS traffic in your infrastructure, this solution can feed active and passive devices simultaneously, perfectly complementing your existing security solutions without breaking your budget. The SSL Visibility Appliance enhances your installed security devices (e.g. DLP, IPS, NGFW, sandbox, network forensics), offloading the SSL/TLS inspection capabilities without degrading performance. This avoids the 2x to 3x hardware capacity upgrade costs typically required by these security solutions needing SSL inspection.
  • A solution that preserves data privacy and compliance while enabling comprehensive security. The SSL Visibility Appliance is a powerful policy-enforcement point for controlling SSL/TLS traffic throughout your organization. Offering selective decryption based on policies, the solution can be customized per organizational needs. For example, ‘whitelist’ policies can readily be established to let critical applications traverse your network without decryption and inspection (e.g. “Do not decrypt financial or banking traffic”). Likewise, ‘blacklist’ policies can be established to block or decrypt and inspect suspicious or unknown traffic a la “Decrypt all traffic from Gambling and Social Media sites.” Utilizing its unique Host Categorization service combined with Blue Coat’s market-leading Global Intelligence Network, the SSL Visibility Appliance can easily help your organization balance data privacy and security demands and satisfy your Legal, Compliance and Risk Management teams. Additionally, the SSL Visibility Appliance ensures data integrity and auditing of the decrypted data it manages – simplifying monitoring and logging of data for compliance purposes.

Blue Coat offers a full line of SSL Visibility Appliances that effectively meet the expanding security needs of today’s enterprises. All of these appliances offer the unrivaled policy-based Host Categorization service as well as the “Decrypt Once Feed Many” functionality that complements your existing security infrastructure, providing tremendous scale and cost benefit to all organizations.

Additionally, the SSL Visibility Appliance supports a broad ecosystem of partner solutions, including IPS, DLP, NGFW, anti-malware / sandbox, security analytics and certificate and key management systems. These compatible solutions are the foundation of Blue Coat’s Encrypted Traffic Management (ETM) Ready Partner Program. Collectively, the integration of the SSL Visibility Appliance and these powerful third-party security technologies provides a comprehensive encrypted traffic management solution for enterprises large and small.

Learn more about Blue Coat’s unique Encrypted Traffic Management (ETM) Ready Partner Program.

Share this: 

Videocast Demo: SSL Visibility Appliance

The Blue Coat SSL Visibility Appliance helps organizations mitigate risk by removing the security “blindfold” caused by encrypted traffic in today’s networks. It provides the most cost-effective way to manage SSL encrypted traffic while preserving privacy, policy, compliance and the investment in the security infrastructure. See how.