SSL termination

Data that requires protection is usually transmitted between browser and server in encrypted form, and the HTTPS protocol is used for this purpose. It is based on the SSL encryption method. The data is only readable by the two end points of an HTTPS connection; intermediaries in the transmission cannot "see" the transmitted information at all. Nevertheless, this encrypted data could itself represent an attack, so it is essential for a protective instance such as a web application firewall to terminate the SSL protocol. This gives it access to the data transmitted from the browser, so attacks can be detected and warded off in this way. Safe transmissions are re-encrypted as necessary and forwarded to the server.

Information for you

-Our whitepaper-

IT-security solutions

Digitalisation is presenting businesses with new challenges which go far beyond information technology. This primarily relates to an aspect which is becoming increasingly important: IT security.

Read our whitepaper to find out how IT-Security will become the pioneer of degitalization.

Request free of charge

Accelerate digitisation

To stay technically viable in this digital transformation, you must increasingly switch to hybrid cloud environments. This requires new security approaches as well as coordinated identity and access management.

Find out more in our whitepaper in collaboration with Deloitte, eperi and SHE.

Request free of charge

OWASP Top 10 for API Security

OWASP has created a new Top10 list for API Security. The top 10 listed reflect a broad consensus on what the most important API security issues are at the moment.

In our whitepaper you will learn how our Airlock API addresses the OWASP Top 10.

Request free of charge