Encrypted Traffic Management

Gain visibility into encrypted traffic to stop threats

Most cyber threats hide in encrypted communications — up to 70 percent of all traffic. Symantec Proxy and SSL Visibility Appliance decrypt traffic, support infrastructure security to maintain privacy and data integrity.

Read the Brief

Symantec Gets the Only “A” for Securely Managing Encrypted Traffic

Third party research shows why we’re on top

A recent independent study by leading academics, Google, Mozilla and others looked at SWG, NGFW and ADC solutions to determine who was following industry best practices for securely intercepting encrypted web traffic. What they found - only the Symantec Proxy managed decryption while maintaining high security standards.

Proper certificate validation, the latest ciphers, advanced TLS support are just some of the reasons why we came out on top, and why can be counted on to securely help you manage encrypted threats.

Read the report

Manage encrypted traffic with SSL Visibility Appliance

Feed your security infrastructure

Symantec SSL Visibility Appliance provides visibility into all your encrypted traffic, supporting SSL/TLS decryption and inspection capabilities for your existing network security and advanced threat protections. Incorporating the Symantec Global Intelligence Network for up-to-date threat insights and traffic categorization, this appliance facilitates complete policy enforcement.

  • Identify SSL/TLS traffic, regardless of TCP port or application
  • Decrypt once, feed multiple security infrastructure tools
  • Preserve privacy and compliance with selective decryption.
  • Ensure highest security encryption and data integrity.

Learn More

Symantec Proxy

Stop threats hiding in encrypted traffic — with privacy

Symantec Proxy provides selective decryption, inspection, and orchestration of SSL and HTTPS web traffic. Based on established policies, it decrypts traffic, then shares it with your antivirus, advanced threat protection, sandbox, and data loss prevention for analysis. The Encrypted TAP option shares SSL-decrypted traffic to third-party monitoring and logging systems for further analysis, archiving, and network forensics.

  • Preserve compliance with selective traffic decryption
  • Extract and orchestrate documents to other security solutions
  • Prevent delivery of malicious payloads
  • Stream decrypted data to forensics infrastructure

Read the Solution Brief Download the Data Sheet

Symantec Technology Integration Partner Program

Extend your Encrypted Traffic Management (ETM)

The ETM Technology Track is designed to enable Symantec technology partners to build solutions that help combat security threats hidden in encrypted traffic while preserving privacy, policy and regulatory compliance.

Learn More

Our Products

  • SSL Visibility Appliance

    Improve the ROI of your security tools with our purpose-built encrypted traffic management solution.