We are a federal organization and we are classified as number four in terms of sensitivity. That was enough for us to think about mitigating the blind spots in the traffic. We have to offer an SSL solution that could enable the rest of our analytics solution. We brought SSLV to start dictating the traffic. We actually wanted to efficiently utilize our security solution with a threat detection solution. This was something we were lacking, our FireEye did not have the ability to see the SSL traffic because FireEye was very late to release their SSL offloading functions. They were really late and they relied on F5 Orchestration and we did not want to go with it. So we got SSLV. Since we brought a system, we also started feeding the created traffic to analytics that also enhanced our detection rates and our proxy. That proxy is also benefiting from that. We are able to categorize and detect a lot of URLs, hostnames, and file types.
We are a federal organization and we host sensitive data from all over the country. The nature of our data was enough for us to start thinking about mitigating the blind spots in our traffic and security. At the same time, we needed to provide an analytic solution. The solution decrypts SSL traffic and integrates with our security solution.
We are a federal organization and we are classified as number four in terms of sensitivity. That was enough for us to think about mitigating the blind spots in the traffic. We have to offer an SSL solution that could enable the rest of our analytics solution. We brought SSLV to start dictating the traffic. We actually wanted to efficiently utilize our security solution with a threat detection solution. This was something we were lacking, our FireEye did not have the ability to see the SSL traffic because FireEye was very late to release their SSL offloading functions. They were really late and they relied on F5 Orchestration and we did not want to go with it. So we got SSLV. Since we brought a system, we also started feeding the created traffic to analytics that also enhanced our detection rates and our proxy. That proxy is also benefiting from that. We are able to categorize and detect a lot of URLs, hostnames, and file types.
We are a federal organization and we host sensitive data from all over the country. The nature of our data was enough for us to start thinking about mitigating the blind spots in our traffic and security. At the same time, we needed to provide an analytic solution. The solution decrypts SSL traffic and integrates with our security solution.