<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
Skip to content

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.

Resources

Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.

Blog

The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners

Partners

Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.

Company

Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.

Contact

Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

Mira Security Encrypted Traffic Orchestration

Safe and secure visibility into encrypted traffic



Request a Quote Request a Demo View Datasheet

 

Mira Encrypted Traffic Orchestration (ETO) software provides safe and secure visibility into encrypted traffic allowing the tools used by enterprise security teams to function effectively, even when all the important traffic is encrypted. Enabling the enterprise security stack to detect and mitigate threats while providing features to enable privacy and ensure compliance requirements can be met is central to Mira ETO software. Mira ETO software decrypts traffic and feeds it to one or more security tools that actually detect and mitigate any threats that may be present. No special interfaces or software changes are required to the security tools; they simply receive traffic from Mira ETO as if it was traffic directly from the network.

mira-default-actions
mira-rule-overview
mira-log-details
mira-log-overview
Mira-1U-appliance-face
Mira-7xxx-appliance-face

Key Features

  • Automatically detect all SSL/TLS and SSH traffic in the network, no matter what ports are being used
  • Capable of decrypting SSL v3, TLS 1.0, 1.1, 1.2 and 1.3, as well as SSHv2
  • Transparent to the higher-level protocols being carried on top of the encrypted layer providing decrypted flows to security tools for any existing or future protocols
  • Seamless integration with existing security tools protects existing security investments
  • Policy control over which encrypted traffic is made visible allows compliance with industry requirements and enterprise policies on data privacy

Additional

  • Mira ETO software is licensed as a subscription model
  • Specifications
  • Resources
  • Network Diagram
  • Request a Quote

vETO
(Virtualized Decryption Appliance)
ETO-DL-0.5 ETO-DL-1 ETO-DL-2.5 ETO-DL-5
Licensed Decrypt Gb/s 0.5 1.0 2.5 5.0
Min CPU Cores/Memory 8/16GB 8/16GB 10/24GB 12/32GB
TLS Sessions/s RSA 2048 750 750 2,200 3,000
TLS Sessions/s EC256 1,400 1,400 3,800 5,800
Max TLS sessions 100,000 100,000 300,000 400,000
Boosted CPU Cores/Memory 10/24GB 10/24GB 12/32GB 14/40GB
TLS Sessions/s RSA 2048 2,000 2,000 3,000 4,500
TLS Sessions/s EC256 2,000 2,000 8,800 8,800
Max TLS sessions 300,000 300,000 650,000 650,000
 

Interested in purchasing this product?

Simply fill out this request a quote and one of our team members will contact you. Thank you.

Request for Quote

Request for Quote