October 25, 2018
Simplify Your IT
Denver Biz Tech Expo
Mile High Stadium
9:00 am – 3:30 pm
How to Protect Your Company’s Website & Internet Browsing at the Necessary SSL Encryption Level
Statement: SSL encryption (port 443) is the de-facto encryption technology for delivering secure Web browsing, and the benefits it provides. SSL encryption is driving the levels of SSL Web traffic to new heights. According to different industry authorities such as Google, Gartner & Forester in 2018 about 70% of all casual Web traffic is now HTTPS encrypted. Some industries such as finance, government, healthcare & legal are even higher. Warning -not all SSL traffic is benign. Without the right security tools, SSL is a blind spot in your network rendering gateway security measures neutered.
Next Generation Firewalls (NGFW) using Web filters, Application Awareness, Anti-Virus Gateway, and IDS/IPS can only provide limited protection against malicious SSL traffic. Advanced Threat Protection (ATP) sandboxes provided limited protection against HTTPS traffic too. A more advanced approach of intercepting the SSL traffic allowing the NGFW & ATP devices to examine all Web traffic HTTP & HTTPS traffic is fast becoming a critical requirement.
Description: TLS and its predecessor SSL, are important Internet protocols that encrypt communications over the Internet between the client and server. These protocols (and protocols that make use of TLS & SSL, such as HTTPS) use certificates to establish an identity chain showing that the connection is with a legitimate server verified by a trusted third-party certificate authority.
HTTPS inspection works by intercepting the HTTPS network traffic and performing an authorized Man-In-The-Middle (MITM) attack on the connection. In MITM attacks, sensitive client data can be transmitted to a malicious party spoofing the intended server. To perform HTTPS inspection without presenting client warnings, administrators must install trusted certificates on client devices. Browsers and other client applications use this certificate to validate encrypted connections created by the HTTPS inspection product. In addition to the problem of not being able to verify a web server’s certificate, the protocols and ciphers that an HTTPS inspection product negotiates with web servers may also be invisible to a client. The problem with this architecture is that the client systems have no way of independently validating the HTTPS connection. The client can only verify the connection between itself and the HTTPS interception product. Clients must rely on the HTTPS validation performed by the HTTPS interception products.
Senior Security Specialist
As a Senior Security Specialist for Juniper Networks Jeff is responsible for educating internal teams, partners, and customers on the Juniper Networks security portfolio. Jeff is passionate about the role Juniper’s solutions can play in combatting the threat cyber-attacks pose to corporations and state entities. Juniper’s continued focus on automation with Software-Defined Secure Networking (SDSN) can streamline security operations, so threats are mitigated faster with less reliance on expensive and increasingly scarce cybersecurity human resources. Jeff is a 20+ year veteran of the Information Security & Networking industry and has held positions with multiple Silicon Valley security-focused companies such as McAfee, Blue Coat, Sophos, and Dell. Over the years, Jeff has worked in technical sales roles assisting service providers, resellers, and end users to secure their networks. Jeff holds a Bachelor of Science in Engineering from Indiana University of Pennsylvania and a Master of Arts in Management from City University of Seattle.