Encrypted Traffic Management (ETM) – The SSL Threat Hiding in

Transcription

Encrypted Traffic Management (ETM) – The SSL Threat Hiding in
Security Forum Presentation and Presenter Bio
“Encrypted Traffic Management (ETM) – The SSL Threat Hiding in Your
Network”, by Ron Burkett, Senior Systems Engineering Manager for Blue Coat
Systems Inc
Driven by web, mobile and cloud applications, 25-35% of enterprise network
traffic is encrypted and growing 20% annually (NSS Labs and Gartner, 2013).
Many enterprise customers report that upwards of 70% of their network traffic is
encrypted. According to Gartner 50% of ALL network attacks will hide in SSL by
2017, and the majority of Advanced Persistent Threats (APTs) use SSL
encryption today.
Ron Burkett, Senior Systems Engineering Manager for Blue Coat Systems Inc.,
will expose the threats contained in your network encrypted traffic and discuss
strategies for protecting your enterprise while preserving privacy, policy and
regulatory compliance. Learn how Encrypted Traffic Management (ETM)
solutions eliminate the SSL encrypted traffic blind spot by providing tools to
combat the security threats hiding in encrypted traffic.”
Ron Burkett
Ron Burkett is a Senior Systems Engineering Manager for Blue Coat currently
responsible the North Central region of North America. Ron has been with Blue
Coat for over 9 years in total and worked with numerous customers on all Blue
Coat product lines. Having a diverse background in both networking, security,
and applications Ron has been able to help customers of all sizes develop
security and optimization strategy. Prior to joining Blue Coat Ron worked at
Packeteer and Tacit Networks. Ron also has a number of years of experience in
the customer role both as an IT Director and Network Manager for companies in
Western Pennsylvania. In addition, Ron is also an accomplished trainer, having
spent many years delivering training for Fortune 500 companies on both
Microsoft and Cisco technologies. Ron’s experience in understanding both the
customer and vendor requirements has allowed him to be uniquely positioned to
provide the insight necessary to keep companies safe without compromising the
user’s ability to get the job done.