Skip to main content
banner image
venafi logo

Why the rise of encryption is actually increasing your security risks

Why the rise of encryption is actually increasing your security risks

October 12, 2016 | Allen Marin

Encryption is growing at a steady rate. According to a report issued by Sandvine, the percentage of web traffic that’s encrypted will increase 40% over the next 12 months. Unfortunately, there is a corresponding increase in the number of threats that hide in encryption. A recent study, published by the Ponemon Institute and A10 Networks, explores the challenges enterprises face in detecting attacks in encrypted traffic.

Malware hidden inside encrypted traffic is a serious risk

The Ponemon/A10 study revealed that 81% of organizations have been victims of a cyber-attack or malicious insider during the past year. And 41% of those say attackers used encryption to evade detection and steal data. 51% of the organizations surveyed expect network attackers to increase their use of encryption over the coming year.

Here’s the challenge: most security tools cannot inspect encrypted traffic. That’s a problem for solutions like malware detection and intrusion prevention that are designed to secure data and networks across the enterprise. When encrypted data isn’t inspected, these solutions are limited in their ability to protect against attacks

Without proper controls, the problem will only get worse

As encryption continues to grow, more endpoints, network devices, optimization appliances, and security solutions will need to process, relay, and inspect data. And more of these devices and applications will require access to SSL/TLS certificates to process that encrypted data.

Organizations will need scalable solutions to protect these certificates and their associated encryption keys to orchestrate and control this tsumani of encryption assets.

However, 56% of IT security professionals still manage their keys and certificates manually. This model is simply not sustainable. What organizations need is an orchestration platform that can secure and protect keys and certificates across the enterprise. Only then will organizations know how many certificates they have, where they are, and know they can confidently scale their encryption environment as fast as needed.

Simplified integration improves security and network optimization

The new Venafi Adaptable Application Driver makes it faster and easier to integrate any application or network device with our proven Trust Protection Platform. With automated protection for applications across their environment, organizations can finally bring order to key and certificate chaos. Not only will they have full visibility and control over all keys and certificates, their forensic security solutions and network infrastructure will also be able to operate more effectively and securely.

Venafi has a long history of interoperability and an extensive partner community to support even the most diverse customer environments. And now we’ve made it even easier to bring real-time protection of certificates to any application that needs it.

How prepared is your organization to support all the certificates for the myriad applications and devices in your environment? 

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

Orange Umbrella

PKI for non-PKI experts: How to Address Compliance Requirements

PKI for non-PKI experts: What You Need to Know about Ongoing Maintenance

PKI for non-PKI experts: How Do You Get Your Systems Up to Policy?

About the author

Allen Marin
Allen Marin

Allen Marin writes for Venafi's blog and is an expert in machine identity protection.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat