Divi Wordpress theme nulled

Lynx Transparent SSL/TLS Traffic Decryption

WHEEL LYNX SSL INSPECTOR

WHEEL LYNX SSL Inspector enables transparent SSL/TLS traffic decryption for further analysis by DLP/IDS/IPS systems.

The appliance works in transparent bridge mode intercepting selected network traffic. SSL sessions pass through WHEEL LYNX SSL Inspector transparently so the client software thinks it connects directly to the target server as it uses the original address of the target host. The decrypted network traffic is forwarded to the dedicated DLS/IDS/IPS device for evaluation. WHEEL LYNX SSL Inspectorencrypts data again and sends it over to the target server. The DLP/IDS/IPS systems can order WHEEL LYNX SSL Inspector to terminate the connection. Unencrypted traffic, which can also pass through WHEEL LYNX SSL Inspector, is forwarded to the IDS/IPS without being modified.

FEATURES

Main features

  • signed and self-signed certificates handling
  • Server Name Indication (SNI)
  • OCSP support
  • decrypt once feed many
  • selective whitelisting based on categories
  • network bypass
  • whitelisting source and target hosts
  • whietlist subscription service
  • supports connections initialized as encrypted (such as HTTPS) as well as protocols, which can begin encrypted transmission by executing the STARTTLS command (e.g. SMTP)
  • TLS SNI (Server Name Indication) extension support

Supported protocols

  • SSL 2.0
  • SSL 3.0
  • TLS 1.0
  • TLS 1.1
  • TLS 1.2

BUSINESS ADVANTAGES

Integrating SSL inspector with DLP/IDP/IDS systems enables a thorough analysis of  network traffic. Decrypted traffic is analyzed for signs of security and data breaches. It is possible to detect viruses, unauthorized document copying as well as malware attacks.

Feel free to contact us by means of the form hereunder.

Your Name (required)

Your Email (required)

Subject

Your Message

GET GDPR READY NOW!  The time is ticking -> 25 may 2018

FEATURED DOWNLOAD -(GDPR READINESS ASSESSMENT)

1. DO YOU KNOW WHO, WHAT, WHERE AND WHEN CHANGES ARE BEING MADE TO YOUR CRITICAL IT SYSTEMS?
2. HOW DO YOU TRACK COPYING, ACCESS OR HOW DO YOU TRACK WHO HAS ACCESS TO WHICH FILES AND FOLDERS? 
3. HOW DO YOU TRACK WHO HAS ACCESS TO WHICH FILES AND FOLDERS AND HOW IT WAS GRANTED?
4. HOW DO YOU PROTECT YOUR SELF FROM INSIDER THREATS AND RANSOMWARE?

Get Change Audit on Active Directory, Group Policy, SQL Server, SharePoint, File Server, NetApp Filers, Exchange,, O365 (Exchange Online,Sharepoint Online)...
Get Control with Interactive User Management, Auditor Portal, Active Directory Self Service, Mobile App (LiveFeed), Real Time Alerting, Granular Reporting, Roll Back Changes and more...
DOWNLOAD NOW
close-link

Cynet is here to make things less scary!!!
We stopped WannaCry, we stopped Petya/NotPetya and we stopped BadRabbit. 

Do you have a ransomware incident & response plan?
Click here for more info!
Cynet 360 gives full visibility for your infrastructure!
 (EDR for Files, Hosts with Network & User Behavior Analytics)
close-link
Click Me