According to new research by Enea and Cybersecurity Insiders, Intrusion Detection & Prevention Systems (IDS/IPS) are widely deployed but face challenges to remain effective. Cybersecurity professionals express concern over noisy alerts, limited visibility inside cloud workloads, and blindness to threats in fully encrypted environments.

Key findings of the research:

  • IDS/IPS functionality is now equally deployed on-premises and in the cloud
  • 45% of respondents consider inaccurate, noisy alerts as their biggest headache
  • 41% of respondents want their IDS/IPS to improve detection of anomalous and evasive traffic
  • 64% of respondents require expanded IDS/IPS protocol and application coverage for cloud-based business apps (Salesforce, Office 365, etc.)
  • 23% of respondents need better traffic visibility in encrypted environments

> For more details, see the full announcement

Duration: 45 min + Q&A

ON-DEMAND WEBINAR: How to Survive the Encrypted Network Traffic Apocalypse


In this webinar recording, a roundtable of leading decryption technology and traffic intelligence specialists from Omdia, Enea Qosmos, Juniper and F5 present the changing network traffic decryption landscape and discuss ways to maintain critical traffic visibility.


  • Most enterprise network traffic is now encrypted but many organizations do not decrypt and inspect this traffic, leaving them vulnerable to potential threats hiding within encrypted traffic flows.
  • Numerous barriers make purchasing, deployment, and management of decryption technology difficult, if not impossible. Worse yet, improvements to encryption standards and important changes to enterprise network design and deployment may soon render many of today’s enterprise decryption architectures obsolete. Given the rapid pace of change in both standards and technology, it is imperative that all organizations revisit their approaches to network traffic decryption and risk management.

Key Topics for Discussion

  • Inbound and outbound network traffic decryption challenges impacting enterprise network security visibility
  • Architectural changes affecting decryption techniques as they relate to secure network design and deployment
  • Emerging supplemental or alternative approaches to traditional network traffic decryption
  • Importance of setting strategic and tactical objectives for encrypted traffic visibility, and best practices for achieving them in the enterprise