Encrypted networks complicate security monitoring because traffic needs to be decrypted at wire speed for capture and forensics
The encrypted network is now a reality within many firms, which means the only way to effectively enforce security policies, catch attacks, and monitor networks is to see all traffic. This paper describes how to set policies, determine what type of device will meet your requirements, and select a dedicated decryption device.
It covers some of the following areas:
Where to do the decrypting
Enforcing security policies