Nubeva's foundational SKI product was developed to fill a growing gap facing network inspection. While the technology started here, it has expanded to other use cases, including the ability to discover and extract ransomware encryption keys to enable instant decryption and restoration. While the use case is different, the concept is similar.
The ability to fully inspect network packets for cybersecurity and application assurance is vital for enterprises and service providers. Over recent years, traditional decryption methods have seen growing capability gaps and operational complexities. For technologies with DPI services, these issues reduce product capability, raise operating costs, slow sales velocity, and increase support requirements. The industry needs an answer. Nubeva SKI offers a new simple approach to enable solution providers and the enterprises they support.
Nubeva SKI is a powerful, new approach to decrypt modern TLS (SSL) traffic. With the advancements in today’s application, computing, and networking environments, SKI delivers a leap forward in capability and performance to quickly enable cybersecurity and application monitoring systems. SKI is employed both as an augmentation to legacy forward and reverse-proxy engines or as a fix to passive intercept systems due to pending obsolescence from Perfect Forward Secrecy.
Nubeva SKI Delivers:
The Decryption of Any TLS for Passive and Inline systems
For Any Environment and Traffic Flow
SKI provides the ability to GET SESSION KEYS from TLS clients and servers in real-time and to USE SESSION KEYS to decrypt TLS on authorized systems to enable deep packet inspection.
With session keys available, one can decrypt any session with simple and efficient bulk decryption. As such, SKI is universal to all traffic flows and use cases and applications: inbound, outbound, east-west, clients, servers, data center, cloud. Since TLS session keys are symmetric (shared by both endpoints), keys only need to be obtained from one side of a connection and therefore can apply to client connections to foreign servers and services.
The idea of getting and using keys is not a completely new concept. Keylogging, typically used by DevOps/SecOps and in some commercial systems has been widely used for a long time but is not a viable solution for scaled and secure mission-critical use. With SKI, Nubeva has taken the basic idea of keylogging and delivered an enterprise-grade, complete solution for modern TLS visibility.
Unlike legacy man-in-the-middle/forward proxy, session pre-termination/reverse proxy, and RSA Passive Intercept, SKI does not involve certificates or server keys, nor does it manipulate or change traffic, connections, authentication, or PKI. Instead, it simply works with the individual TLS session encryption keys (aka, ephemeral, symmetric, or bulk encryption keys) that are developed during the handshake, shared by the TLS client and servers, used for the bulk encryption/decryption of the communication, then discarded.