SSL Interception - a feature that provides full network security even with encrypted data

Wien, (PresseBox) - SSL is a useful technology to transmit sensitive data. But it can also hide malicious content within encrypted data streams. Secure Web from CYAN Networks offers an "SSL Interception" feature with full security and control of encrypted data streams.

SSL Interception makes activities visible, unmasked and prevents attacks on the key corporate network.

Safety is always a kind of cat and mouse game, and therefore requires speed and professional tools. CYAN Networks has been a leader in active IT security systems and has continuously developed its Secure Web software. One of these developments is SSL Interception. Data encryption with SSL is a common standard for the transfer of sensitive data and therefore widespread. But what if there is a Trojan hidden in the encrypted data stream that thus gets into the corporate network? The effort and cost for the removal of this always particularly tricky malicious code is high.

Therefore it is important to intercept malicious communications in SSL encrypted data streams at a preliminary stage. This is precisely where the SSL Interception feature from CYAN Networks operates. It interrupts the encrypted connections at the very entrance into the company, the gateway and makes the data packets visible to virus scanners and other filters for screening. The transfer of all data remains of course encrypted. Secure Web from CYAN Networks comprehensively protects all your employees who are online and your corporate network.

For all decision-makers who are interested, CYAN Networks provides a free 30-minute webinar on the subject of SSL interception and system security. For your personal webinar appointment, please e-mail with your contact information to the sales team at CYAN Networks

Press releases you might also be interested in

Weitere Informationen zum Thema "Sicherheit":

So geht das VPN in die Cloud

Si­cher­heits-Ser­vices wie ein Vir­tual Pri­va­te Net­work (VPN) las­sen sich heu­te ein­fach in die Cloud aus­la­gern. Wich­tig ist, sich im Vor­feld über das ge­for­der­te Si­cher­heits­ni­veau und die An­for­de­run­gen und Ein­satz­um­ge­bun­gen der Cli­ents klar zu wer­den und dies für den Cloud-VPN-Pro­vi­der nach­voll­zieh­bar zu do­ku­men­tie­ren. Best Practi­ces für die Aus­wahl des Pro­vi­ders und den Ablauf des Pro­jekts hel­fen da­bei, sch­nell und mög­lichst kos­ten­güns­tig zum Ziel zu kom­men.


Subscribe for news

The subscribtion service of the PresseBox informs you about press information of a certain topic by your choice at a choosen time. Please enter your email address to receive the email with the press releases.

An error occurred!

Thank you! You will receive a confirmation email within a few minutes.

I want to subscribe to the gratis press mail and have read and accepted the conditions.