Mira Security’s Encrypted Traffic Orchestration (ETO) provides safe and secure visibility into encrypted network traffic. ETO allows the tools used by enterprise security teams to function effectively, even when all the important traffic is encrypted. Enabling the enterprise security stack to consistently detect and mitigate threats, while providing features to enable privacy and ensure compliance requirements can be met, is central to Mira ETO software. Mira ETO software decrypts traffic and feeds it to one or more security tools that actually detect and mitigate any threats that may be present. No special interfaces or software changes are required to the security tools; they simply receive traffic from Mira ETO as if it is traffic directly from the network.
Garland Technology is the exclusive distributor for Mira’s ETO (Encrypted Traffic Orchestrator).

Key Features
- Automatically detect all SSL/TLS and SSH traffic in the network, no matter what ports are being used
- Capable of decrypting SSL v3, TLS 1.0, 1.1, 1.2 and 1.3, as well as SSHv2
- Transparent to the higher-level protocols being carried on top of the encrypted layer providing decrypted flows to security tools for any existing or future protocols
- Policy control over which encrypted traffic is made visible allows
- Policy control over which encryption mechanisms are allowed in the enterprise network
- Hardware, virtual appliance, or AWS
Benefits
- Seamless integration with existing security tools protects existing security investments
- No need to re-architect the network to attain visibility into encrypted traffic
- Scaling from lower speed branch offices and satellite locations to nearly 100G allows for growth and supports the collapsing of data centers
- Policy control ensures compliance with industry requirements and enterprise policies on data privacy
- Policy control prevents weak or obsolete encryption methods from being used
- Pair with a Garland Technology EdgeLens Inline Bypass Packet Broker gives you the power to install a visibility platform that you control
- Pairing with Garland gives you full visibility into network traffic, including encrypted traffic
Specifications
ETO Software Subscription Options for physical appliances
ETO License SKU |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
---|---|---|---|---|---|---|---|---|---|
Licensed Decrypt Gbps |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
MAX Full TLS Session/s EC256 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
Max Full TLS Sessions/s RSA 2048 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
ETO Software Subscription Options for physical appliances
1
1
1
1
1
1
1
1
1
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
Specifications
Appliance Model Capabilities
Appliance Model SKU |
Interfaces / Speeds |
Max Segments |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
ETOO-DL-1 |
---|---|---|---|---|---|---|
Licensed Decrypt Gbps |
1 |
1 |
1 |
1 |
1 |
1 |
MAX Full TLS Session/s EC256 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
Max Full TLS Sessions/s RSA 2048 |
2000 |
2000 |
2000 |
2000 |
2000 |
2000 |
Appliance Model Capabilities
1
1
1
1
1
1
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
2000
Resources

EdgeLens® Inline Security Packet Broker
Read Datasheet Now.png?width=50&height=50&name=Group%20(1).png)
3 Keys to Network Resiliency | Garland Technology
Managing the Edge of the Network
How Historical Look-back is Revolutionizing Network Forensics and Inline Deployment
Read Blog Now
Firewall Primer: Best Practices for Avoiding Downtime
Read Blog Now
Installation Guides | Garland Technology
Read Blog NowNetwork Diagrams
Request a Quote
Interested in purchasing this product? Simply fill out this request a quote and one of our team members will contact you.