Zscaler, Inc.
Encrypted traffic inspection in a cloud-based security system
Last updated:
Abstract:
A node configured as any of a proxy, a Secure Web Gateway, and a Secure Internet Gateway is configured to perform steps of establishing a connection with a user device having a user associated with a tenant; obtaining policy for the user; monitoring traffic between the user device and the Internet including snooping session keys for any encrypted traffic; analyzing the traffic based on the policy including utilizing the session keys on the encrypted traffic; and one of allowing, blocking, or limiting the traffic based on the analyzing.
Status:
Application
Type:
Utility
Filling date:
7 Apr 2022
Issue date:
21 Jul 2022