Nubeva created a new way for modern network visibility so you don’t have to “make do” with legacy decryption methods. It's time to question your current approach to network visibility.
Maximize the use of existing systems by offloading the heavy processes that rely on man-in-the-middle, key regeneration, and handshake replay or session termination for decryption. We restore the use of out-of-band services broken by advanced TLS and create new visibility not previously possible. Nubeva customers achieve dramatically reduced price performance, improve overall functionality of systems, and radically simplify operations for security and application monitoring.
By design, out-of-band inspection systems can’t replay sessions to discover final encryption keys. With Elliptic Curve Diffie Hellman ciphers and PFS-enabled TLS, the certificate exchange is encrypted and the symmetric key is only known by the TLS server and TLS client. This completely breaks the ability for legacy solutions to replay sessions and regenerate keys for decryption and inspection. Add the reliance on 3rd party services and the ever-increasing volume and speed of traffic, out-of-band solutions have been essentially rendered obsolete for deep network visibility.
Nubeva’s Advantage for Passive Systems:
Using next-generation firewalls, secure web gateways, application delivery controllers and other proxies for decrypted visibility poses several challenges. Combined with decryption restrictions imposed with modern TLS and pinned certificates, these solutions face an increased transaction volume, crushing the performance of the core functionality of the tool.
You are left with two options: Rely on the stunted man-in-the-middle approach or use risky session termination, which may require you to spend more money on additional boxes to keep up; or bypass more and more traffic leaving your team open to risk and management challenges
Nubeva’s approach to modern TLS visibility allows you to augment inline systems by offloading resource intensive man-in-the-middle decryption. With our patented Symmetric Key Discovery approach, Nubeva discovers the session specific keys allowing you to decrypt on your inspection tools simply with no need to manage or share certificates.
We let you enhance your existing solutions to inspect more traffic including inbound and outbound traffic; and traffic previously inaccessible such as those encrypted with certificate pinning and 3rd party sessions. Nubeva enables your tools to once again do what they do best, URL filtering and load balancing at high speed and top performance.
See More Traffic: See all your traffic from pinned applications while reducing the need for multiple systems to handle the load.
Enhance Performance: Offload man-in-the-middle decryption allowing product performance to soar 5 to 10x above its current capacity.
Simplicity: Eliminate hand-crafted exception rules and constant tinkering to keep systems working.
Using next-generation firewalls, secure web gateways, application delivery controllers and other proxies for decrypted visibility poses several challenges. Combined with decryption restrictions imposed with modern TLS and pinned certificates, these solutions face an increased transaction volume, crushing the performance of the core functionality of the tool.
You are left with two options: Rely on the stunted man-in-the-middle approach or use risky session termination, which may require you to spend more money on additional boxes to keep up; or bypass more and more traffic leaving your team open to risk and management challenges
Nubeva Symmetric Key Intercept introduces a new way to discover the final encryption keys from previously “unreachable” places. Our read-only sensors discover symmetric keys from container and Kubernetes environments (including intra-Kubernetes and container to container), intra-zone VPCs and high-speed connections, cloud and 3rd party API connections, East-West traffic, cloud infrastructure calls, and pinned traffic - with more options being added all the time.
Nubeva decouples key acquisition and packet capture for optimum security. As a universal solution, it syncs with any packet acquisition source, including taps, spans, NPB and cloud-provided mirroring services, and works with your inspection tools of choice with complementing deployment options.
See More: Unlock visibility into your compute environments like Kubernetes, containers and 3rd party API calls.
Enhance Performance: Experience high-speed scaling and parallel processing that pushes performance off the charts.
Simplicity: Deploy one solution for any environment, no code changes, no application changes, no library changes required.
The heavy adoption of elastic compute environments in the public cloud and private data center introduce areas of the network that are largely inaccessible to legacy decrypt, inspection and detection tools. The challenge is not only discovering the final keys for decryption to unlock packets for inspection, but also to acquire the traffic from VPCs, VNETs, Kubernetes clusters, container environments and high-bandwidth E-W networks.
Get decrypted visibility and eliminate legacy performance costs. Use existing tools to inspect and monitor all traffic at line speed.
Extend the ROI of your existing solutions. Enable pure, fast symmetric decryption with Nubeva and continue to use the tools, teams and processes in place.
SKI works regardless of encryption protocol or cipher suite. The confidentiality of traffic and integrity of the session is preserved while legitimate availability is allowed and protected.
Start Seeing. Start Now. Start Free.