Skip to content
Information Technology

Hey threat actors… we see you!

PR Deadlines 3 mins read

A huge cybersecurity threat exists because threat actors are hiding in encryption, one of the very mechanisms created to protect us, warns Jonathan Hatchuel, Country Manager A/NZ, at Gigamon. 

He says that’s why his company has launched a breakthrough cybersecurity technology for the world, specifically designed to eliminate this blind spot.

Today, over 90 percent of all communications are encrypted, including organisations’ internal communications, and threat actors are increasingly hiding their activity under the cover of encryption.

As attackers have grown more sophisticated, they are even employing encryption for their own lateral movement, data siphoning and data exfiltration. Moreover, they are doing this on virtual and cloud workloads, where the security measures are still maturing.

More advanced security organisations have been attempting to address this using decryption. The U.S. National Security Agency (NSA), among others, promotes TLS decryption as necessary for a strong security posture.

Unfortunately, decryption can prove costly, modern TLS 1.3 has made it wicked hard, and it’s an outright nightmare in cloud and containers, where systems and microservices are designed to take advantage of efficient lateral communication.

According to a report by EMA, a staggering 90 percent of organisations expressed concern over the lack of visibility that comes with TLS 1.3.

This problem set is now directly addressed with our new technology  Gigamon Precryption™ , which allows security teams to shine a bright spotlight on encrypted lateral (also known as East-West) traffic across virtual, cloud, and container workloads.

Leveraging Linux eBPF and standard encryption libraries, Precryption technology offers plaintext visibility into all encrypted communications before the payload is encrypted, hence the name Precryption.

With Precryption, no decryption is required — the first of several reasons why this is a breakthrough technology.

Rather than try to break something that wasn’t meant to be broken, we access traffic at the most basic level, then deliver it efficiently and securely to the full security stack for further inspection. We’re leveraging a process that’s already happening, making this an elegant solution and not some unnatural act.

Not only is it elegant, it’s independent. Precryption technology is part of the GigaVUE® Universal Cloud Tap, which runs independently of other applications or containers.

In this way, we’re simultaneously providing an independent, immutable source of truth, while avoiding any operational entanglements around testing and upgrades commonly associated with embedded agents.

Today, a proper solution for plaintext visibility is more important than ever. As organisations modernise their security posture to become perimeter-less or adopt Zero Trust architecture, inspection becomes mandatory for lateral traffic.

This point always gets head nods by those who understand how cybersecurity breaches are perpetrated, and even bigger head nods when considering they need to apply it to modern virtual or cloud workloads. Precryption technology meets them exactly where they are.

The goal is to broaden the scope of an organisation’s security posture, extending it all the way to lateral movement. And to do so efficiently and at scale.

Since no decryption is taking place, this means we don’t have to manage keys, we don’t sniff keys, we don’t expose keys, we don’t need key libraries, and we certainly don’t care about cipher strength.

Also we aren’t having to break and inspect the encrypted channel: nothing gets broken, no proxies, no re-encryption, no retransmissions. But the critical plaintext inspection still happens.

 

Lastly, Precryption technology is an extension of our Deep Observability Pipeline. The plaintext access is just the first step: along with that comes a whole host of filtering, optimisation, transformation and replication capabilities.

Packets get delivered to NDR tools, metadata gets enriched for SIEM tools, and the whole security stack works better because it now knows what’s inside the encrypted traffic versus guessing with other approaches.

Too often organisations get serious about modernising their security posture only after they’ve had a breach. With Gigamon, you can move from reactive breach management to proactive threat detection and can now see where threat actors hide — especially in the cloud.

###

More from this category

  • Information Technology
  • 14/05/2025
  • 16:26
Maxon Computers

Maxon Introduces New Real-Time Rendering and Cinematic Previews Solution for Architects

Maxon gives first preview of new solution with partner Vectorworks at AIA Conference on Architecture & Design 2025 BAD HOMBURG, GERMANY / ACCESS Newswire / May 14, 2025 / Maxon, maker of powerful, approachable software solutions for creators working in 2D and 3D design, motion graphics, visual effects, gaming and more, is further optimizing its cinematic rendering technology for architectural visualization (ArchViz). For decades, Maxon's technology has empowered top artists to achieve the impossible in both the real world and imaginary-from architecture, construction and product design, to mind-bending visual effects, animation and 3D sculpting. Now, that same level of excellence…

  • Business Company News, Information Technology
  • 14/05/2025
  • 15:05
ASUS Australia

ASUS Announces Availability of ZenWiFi BD4 Outdoor Worry-free WiFi 7 for any outdoor environment

ASUS today announced availability of the ZenWiFi BD4 Outdoor, a powerful and durable router which extends seamless WiFi 7 connectivity to any outdoor environment.…

  • Contains:
  • Information Technology
  • 13/05/2025
  • 21:10
OMP

OMP’s Unison Planning Achieves SAP(R) Certified Integration with RISE with SAP S/4HANA(R) Cloud

ANTWERPEN, BE / ACCESS Newswire / May 13, 2025 / OMP, a global leader in supply chain planning solutions, announced today that its Unison PlanningTM platform has achieved SAP® certification as integrated with RISE with SAP S/4HANA® Cloud. Continuing its long history of providing SAP-certified integration, this milestone confirms Unison Planning's full support for S/4HANA environments and its compatibility with RISE with SAP.The integration delivers seamless, near-real-time connectivity between SAP and Unison Planning's advanced supply chain capabilities, reinforcing OMP's role as a trusted partner for navigating complex planning environments."Achieving this certification highlights our commitment to innovation and enterprise-grade reliability," says…

Media Outreach made fast, easy, simple.

Feature your press release on Medianet's News Hub every time you distribute with Medianet. Pay per release or save with a subscription.