Roy Zisapel
Analyst · Jefferies.
Okay. So, I think this is a very big problem today in security, because more and more of the traffic of the network traffic is now encrypted for privacy and other reasons, predominantly through SSL and DDoS. When you encrypt the traffic, all your network security devices are blind to the content and cannot detect any attack that is passing through. The only way for you to a -- to bring back the power to the -- to those different systems is by terminating, by opening the traffic, showing -- let all those security tools scanning and try to detect attacks that way. But, that means that you're terminating the encrypted traffic before the end point, before your servers. Some customers would like to do it, some would not, but in order to do that, definitely the customer has to be in control of the one that wants to protect us, to have the certificates, the key for the encryption. Now, if you look on a service provider that the traffic flows through their network maybe to the end customer or in transit, they probably would not have the keys, or the certificates. And as a result, they're blind to all the encrypted traffic flowing through those systems. So for them to be able to protect against encrypted attacks without opening or without decrypting the content we think is -- and that's what we hear from them, it's a game changer. On the enterprise side and especially on software-as-a-service side, they can theoretically protect against encrypted attacks, especially floods, by building huge capacity of SSL termination. By itself, it's an issue budget operational and so on, but it's -- at least technically possible, but put aside the budget considerations. It adds a lot of latency, you terminate all connections, all traffic even when you don't have an attack and 99.99% of the time you're not being attacked. So you will hitch performance. You will need to put the very, very expensive and slow and limited infrastructure to do that, and your game is security, but it's quite limited. What we are doing with these new set of algorithms, we are changing the game. We can detect attacks without terminating and then we can decide what to do? To block what we see if the attack traffic or to forward that specific portion of the traffic for decryption while all the rest continues to flow. So it changes latency in enterprise. It changes that the -- the budget, the trade-off for security, it improves customer experience and so on. So, again, very, very important, we are very, very pleased with the capabilities and what we're seeing already in our cloud, on our Cloud DDoS data, our ability to do that, and I think it's a very unique competitive advantage.