YES! Encrypted Traffic Can (and Must) Be Classified

YES! Encrypted Traffic Can (and Must) Be Classified

Encryption Trends



Why is Traffic Encryption on the Rise?


Everywhere you look, the use of encryption is rising: on the Internet, in public and private Clouds, within enterprises, and across personal devices. One driver of this trend is the global demand for better protection of personal privacy on the Internet. It is a demand that spiked in the wake of Snowden’s revelations about NSA interception activities, and has continued to mount ever since.


Protecting Personal Privacy – and Corporate Intellectual Property


This demand has been embraced by major content providers like Facebook, YouTube, and Netflix, who are responsible for the majority of encrypted Internet traffic today. Encryption helps them meet public demand for personal privacy, while enabling them to better protect their own intellectual property (IP).


Protecting IP and personal customer information is likewise fueling the increased use of encryption by enterprises. This includes the use of encryption behind the firewall as well as across the wide network of data centers, public and private cloud providers, and mobile operators who comprise the contemporary enterprise network.


Complying with Regulations


Companies and their service providers have also turned to encryption to satisfy regulations like the General Data Protection Regulation (), Network and Information Security () Directive and .


Add to this voluntary initiatives like “Let’s Encrypt” and “Encryption Everywhere” by the Internet Security Research Group (ISRG) and Symantec respectively, and evolving Internet standards like HTTP Public Key Pinning (HPKP) and HTTP Strict Transport Security (HSTS), and the trend toward ubiquitous traffic encryption seems almost inevitable.


Who Else Likes Encryption? The Bad Guys


SonicWall’s found 2.4 million encrypted malicious attacks in the first six months of 2019, almost eclipsing the 2018 full-year total in half the time. A ..

Support the originator by clicking the read the rest link below.