Report Summary: TLS 1.3 Adoption in the Enterprise
This research project sought to gauge awareness of and adoption plans for the new TLS 1.3 specification published by the IETF in August, 2018 as RFC 8446, and to better understand how enterprises are adapting to the growing use of encryption overall. In its newest form, the transport layer encryption standard departs in significant ways from the longstanding TLS 1.2 version that a majority of enterprises have been using for years.
Some industry groups have expressed serious reservations over the ability to decrypt and inspect traffic for troubleshooting and possible malware using TLS 1.3, but the good news is that a healthy percentage of respondents in the survey are either already in the throes of enabling TLS 1.3 or plan to enable it in the near future. Although it's common for IT practitioners to be unaware of the details of new standard specifications as they are hashed out by IETF insiders, a very clear majority of the respondents in the survey indicated great familiarity with it on a technical level.
Download for more information.
Read More
By submitting this form you agree to F5 contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. F5 web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: Applications, Cloud, Compliance, Data Center, Data management, Email, Firewall, IT Security, Malware, Network, SAN, Server


More resources from F5

Choose the WAF That's Right for You
Despite the industry's best efforts to bolster secure application development practices, the growing decentralisation of infrastructure has resulte...

Building Better 5G Security: How to harness a...
As Mobile Network Operators (MNOs) implement standalone 5G core networks, they will need service-based architectures built using IT concepts and pr...

Inherent Vulnerabilities Harming Telecommunic...
Telecommunications companies are among the most targeted companies in the world, attracting the most sophisticated and well-resourced attackers.