Encrypted malware vs. F5's full proxy architecture
Published Feb 15, 2017
Version 1.0Was this article helpful?
very true @Fulmetal...thanks for the comment! Visibility is certainly important, but not final. After decryption, a malware tool is needed to inspect the cleartext and determine if it's malware or not. Thanks again for the clarification!