Zscaler, Inc.
Encrypted traffic inspection in a cloud-based security system

Last updated:

Abstract:

A node configured as any of a proxy, a Secure Web Gateway, and a Secure Internet Gateway is configured to perform steps of establishing a connection with a user device having a user associated with a tenant; obtaining policy for the user; monitoring traffic between the user device and the Internet including snooping session keys for any encrypted traffic; analyzing the traffic based on the policy including utilizing the session keys on the encrypted traffic; and one of allowing, blocking, or limiting the traffic based on the analyzing.

Status:
Application
Type:

Utility

Filling date:

7 Apr 2022

Issue date:

21 Jul 2022