Encrypted Traffic Management (ETM) â The SSL Threat Hiding in
Transcription
Encrypted Traffic Management (ETM) â The SSL Threat Hiding in
Security Forum Presentation and Presenter Bio “Encrypted Traffic Management (ETM) – The SSL Threat Hiding in Your Network”, by Ron Burkett, Senior Systems Engineering Manager for Blue Coat Systems Inc Driven by web, mobile and cloud applications, 25-35% of enterprise network traffic is encrypted and growing 20% annually (NSS Labs and Gartner, 2013). Many enterprise customers report that upwards of 70% of their network traffic is encrypted. According to Gartner 50% of ALL network attacks will hide in SSL by 2017, and the majority of Advanced Persistent Threats (APTs) use SSL encryption today. Ron Burkett, Senior Systems Engineering Manager for Blue Coat Systems Inc., will expose the threats contained in your network encrypted traffic and discuss strategies for protecting your enterprise while preserving privacy, policy and regulatory compliance. Learn how Encrypted Traffic Management (ETM) solutions eliminate the SSL encrypted traffic blind spot by providing tools to combat the security threats hiding in encrypted traffic.” Ron Burkett Ron Burkett is a Senior Systems Engineering Manager for Blue Coat currently responsible the North Central region of North America. Ron has been with Blue Coat for over 9 years in total and worked with numerous customers on all Blue Coat product lines. Having a diverse background in both networking, security, and applications Ron has been able to help customers of all sizes develop security and optimization strategy. Prior to joining Blue Coat Ron worked at Packeteer and Tacit Networks. Ron also has a number of years of experience in the customer role both as an IT Director and Network Manager for companies in Western Pennsylvania. In addition, Ron is also an accomplished trainer, having spent many years delivering training for Fortune 500 companies on both Microsoft and Cisco technologies. Ron’s experience in understanding both the customer and vendor requirements has allowed him to be uniquely positioned to provide the insight necessary to keep companies safe without compromising the user’s ability to get the job done.