Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

What ist the benefit of IPS, Zero-Day Protection, ATP and web filtering without deep packet inspection on TLS sessions

stupid question, I know, but honestly: what is the benefit of the Xstream protection when you decide not to break TLS sessions at all (besides mail filtering)?

Will someone earn any higher protection level with all these features activated without breaking TLS in comparison to a base licence?

I am asking because when I look around (ca. 100 and more customers, even at enterprise level), nobodoy, really nobody does TLS decryption in any case but for testing purposes. There are a lot of reasons against: privacy breach (admins may read passwords of users in clear text) and simply because many things won't work anymore because lots of (web) applications rely just on working https connections. Things get more and more complicated.

So on one hand every manufactor praises zero-trust, xstream, total protection, 360 degree of comfort or whatever term came to your mind, but what does it help in reality when you are able only to inspect unsecured connections? How much do you raise your security level? In percentage maybe: 5, 10, 25 or even 42%?

I can read and read whitepapers and watch demos: It will not get to my mind, what is the purpose of buying all these features, when nobody make use of it?

Some help and clarification would be really appreciated.



This thread was automatically locked due to age.
Parents
  • I would not want to work for any of those 100 organizations. I am a contractor and I can assure you that my clients make me use their laptop to access their network and they've got full firewall and endpoint security implemented. Enterprise-level organizations have enterprise-level endpoints and so installing certificates (and having users have to deal with that) aren't a problem. (Yes, this may include things like installing certificates for Python to use, etc, if you're a programmer.)

    Heck, I use TLS decryption at home, and it works well. Yes, there are default exemptions for OS upgrades, and sites like financial sites check certificates closely and need to be exempted as well. But on the whole, it's not a disaster (even though I don't have an enterprise-level infrastructure which would make it trivial), and to be honest, the exceptions in TLS rules mean that maybe the majority of my TLS traffic isn't decrypted at some points in time -- things like OS updates, streaming video, account for a LOT of traffic -- but not going to the trouble to do it where possible is just an amateur move, in my opinion.

Reply
  • I would not want to work for any of those 100 organizations. I am a contractor and I can assure you that my clients make me use their laptop to access their network and they've got full firewall and endpoint security implemented. Enterprise-level organizations have enterprise-level endpoints and so installing certificates (and having users have to deal with that) aren't a problem. (Yes, this may include things like installing certificates for Python to use, etc, if you're a programmer.)

    Heck, I use TLS decryption at home, and it works well. Yes, there are default exemptions for OS upgrades, and sites like financial sites check certificates closely and need to be exempted as well. But on the whole, it's not a disaster (even though I don't have an enterprise-level infrastructure which would make it trivial), and to be honest, the exceptions in TLS rules mean that maybe the majority of my TLS traffic isn't decrypted at some points in time -- things like OS updates, streaming video, account for a LOT of traffic -- but not going to the trouble to do it where possible is just an amateur move, in my opinion.

Children
No Data