You can't defend against threats you can’t see. By enabling decryption on your next-gen firewalls you can inspect and control SSL/TLS and SSH traffic so that you can detect and prevent threats that would otherwise remain hidden in encrypted traffic. Use the best practice guidelines in this site to learn how to plan for and deploy decryption in your organization.
Table of Contents
What Do You Want To Do?
Best Practice Decryption Profile: Internet Gateway
Best Practice Decryption Profile: Data Center
Prepare to Deploy Decryption
Size the Firewall Decryption Deployment