GAUGING THE MARKET
Mark Jow , EMEA Technical Evangelist , Gigamon in hybrid cloud security strategies . But decrypting and inspecting all this traffic is not seen as cost-effective by many businesses . As a result , this same security strategy is commonly exploited to hide malware , mask malicious activity , and even smuggle stolen data through encrypted east-west traffic .
Currently , over two-thirds of businesses allow encrypted data to flow freely . Security professionals and boards are leaving their networks vulnerable to attacks which could cause significant financial and reputational damage , and worse still , may not be discovered at all until their data is already for sale . With particularly sensitive data to protect , financial services organisations should be especially aware of the risk of uninspected encrypted traffic .
Without complete visibility of all network traffic , including east-west and encrypted data-in-motion , all organisations are vulnerable to encrypted malware , data theft and ‘ living off the land ’ attacks . It is exceedingly difficult to defend against invisible threats you cannot see , and unprotected blind spots present organisation-wide risks with expensive consequences . For financial institutions and any other nationcritical organisations , gaining full network visibility must be a number one priority . � www . intelligentfin . tech
19