Nubeva FAQ

    by Nubeva 26 December 2018

    Frequently Asked Questions


    Nubeva was born in the cloud for the cloud. We help enterprise IT organizations embrace cloud security using modern encryption protocols (TLS 1.3) and ciphers by enabling decryption when and where you want it. We do all of this with a fast, easy-to-deploy solution that is affordable by design.

    Randy Chou co-founded Nubeva in 2017 and created a team that built a blueprint to unlock the potential for running security in the cloud. Today, Nubeva's TLS Decrypt solution Nubeva's TLS Decrypt Solution works with any cloud platform -- public, private and hybrid -- so enterprises can maximize security and get quick, easy access to decrypted packet traffic.


    What does Nubeva make for the public cloud?

    Nubeva offers its cloud-native TLS Decrypt solution featuring Symmetric Key Intercept to enterprises that need to perform deep packet inspection. This innovative solution is independent of any kind of packet stream like stored PCAPs, Azure Vtaps or Amazon VPC traffic mirroring. It also works with legacy packet brokers. Our TLS Decrypt solution works with any tool that consumes packet traffic and it works within any cloud subscription to deliver decrypted visibility for both east/west and north/south traffic.


    How does Nubeva ensure security in the public cloud?

    Nubeva has solved the out-of-band decryption challenge so you can inspect cloud traffic easily, when and where you need to see it, and at low-cost. Our engineers developed Symmetric Key Intercept, which discovers the final symmetric keys after TLS handshakes are complete.

    Symmetric keys are important because they are unique to each session. Nubeva's agent discovers and extracts these keys, securely stores them in a key database set up and managed by the user, and then makes the keys available to for use on demand. It’s absolutely, the most secure and most scalable decryption solution available today.

    Don’t the big public cloud providers offer visibility into packet traffic?

    Public cloud platforms offer preventative security, but that’s only half the battle. Figuring out what happened when a breach occurs is more difficult than simply patching a vulnerability after the fact. AWS, Azure and Google Cloud share logs, which provide a partial answer. Flow records may offer additional insight, but they may not be adequate if you need to conduct forensic investigation. Through deep packet inspection, users can troubleshoot and ID the root cause of a threat or potential issue. Need to know exactly what happened last night at 11:55 p.m.? Pull the actual traffic and replay it using security tools. If a specific security event happened in the last seven days, organizations must have access to the complete data haystack in order to find the appropriate needle. But in order to do any of this, users must decrypt the encrypted traffic in a way that doesn't open the enterprise to additional risk.


    Why is it important to see this detail in the public cloud?

    If organizations can’t quickly and accurately see what’s going on across their public cloud environment at all times, they run the risk of not knowing when they’re being attacked or compromised. Continuous traffic visibility inside the cloud, and the ability to “insert” security control points, is the key. These are critical steps toward improving security, especially when dealing with the dynamic, elastic nature of modern cloud computing environments. 


    What does the future hold as more organizations move to the cloud?

    For organizations with strong confidence and proven applications already in the cloud, adopting a cloud-first strategy for all IT decision making will become the norm. Cloud first is simply a tech philosophy designed to maximize AWS and Microsoft Azure as a core business strategy. Cloud offers organizations the ability to keep servers up no matter what, so critical business operations aren’t using up valuable resources for maintenance, updates, upgrades and infrastructure expansion demands. As cloud migration becomes the norm, organizations will demand simplicity and high-performance that matches their experience in traditional data centers. This means moving security to the cloud and having the means to decrypt packet traffic when and where needed.


    Nubeva and its TLS Decrypt Solution with Symmetric Key Intercept technology enables IT teams to capture and store keys and inspect packets on demand, while embracing all of today's modern encryption protocols.


    Nubeva is listed in the TSX Venture Exchange ("TSXV) in Canada under the ticker symbol "NBVA".


    For more information: or email at 


    Tags: resources
    Download PDF Media