Mira Security Encrypted Traffic Orchestration
Safe and secure visibility into encrypted traffic
Mira Security’s Encrypted Traffic Orchestration (ETO) provides safe and secure visibility into encrypted network traffic. ETO allows the tools used by enterprise security teams to function effectively, even when all the important traffic is encrypted. Enabling the enterprise security stack to consistently detect and mitigate threats, while providing features to enable privacy and ensure compliance requirements can be met, is central to Mira ETO software. Mira ETO software decrypts traffic and feeds it to one or more security tools that actually detect and mitigate any threats that may be present. No special interfaces or software changes are required to the security tools; they simply receive traffic from Mira ETO as if it is traffic directly from the network.
Garland Technology is the exclusive distributor for Mira’s standalone ETO (Encrypted Traffic Orchestrator).

Key Features
- Automatically detect all SSL/TLS and SSH traffic in the network, no matter what ports are being used
- Capable of decrypting SSL v3, TLS 1.0, 1.1, 1.2 and 1.3, as well as SSHv2
- Transparent to the higher-level protocols being carried on top of the encrypted layer providing decrypted flows to security tools for any existing or future protocols
- Policy control over which encrypted traffic is made visible allows
- Policy control over which encryption mechanisms are allowed in the enterprise network
- Hardware, virtual appliance, or AWS
Benefits
- Seamless integration with existing security tools protects existing security investments
- No need to re-architect the network to attain visibility into encrypted traffic
- Scaling from lower speed branch offices and satellite locations to nearly 100G allows for growth and supports the collapsing of data centers
- Policy control ensures compliance with industry requirements and enterprise policies on data privacy
- Policy control prevents weak or obsolete encryption methods from being used
- Pair with a Garland Technology EdgeLens Inline Bypass Packet Broker gives you the power to install a visibility platform that you control
- Pairing with Garland gives you full visibility into network traffic, including encrypted traffic
Specifications
ETO Software Subscription Options for physical appliances
ETO License SKU |
ETOO-DL-1 |
ETOO-DL-2.5 |
ETOO-DL-5 |
ETOO-DL-10 |
ETOO-DL-15 |
ETOO-DL-20 |
ETOO-DL-30 |
ETOO-DL-40 |
ETOO-DL-50 |
---|---|---|---|---|---|---|---|---|---|
Licensed Decrypt Gbps |
1 |
2.5 |
5 |
10 |
15 |
20 |
30 |
40 |
50 |
MAX Full TLS Session/s EC256 |
2000 |
5000 |
10000 |
15000 |
17000 |
22000 |
30000 |
40000 |
50000 |
Max Full TLS Sessions/s RSA 2048 |
2000 |
5000 |
7000 |
12000 |
14000 |
18000 |
25000 |
30000 |
35000 |
License Compatability
A License can be used on either a virtual appliance or on one of the hardware appliances available from Mira Security. The following matrix shows which licenses can be used on specific hardware appliance models:
Appliance Model Capabilities
Appliance Model SKU |
Interfaces / Speeds |
Max Segments |
Max SSL Flows/ Segment |
Max SSL Flows |
Max Session Log Entries |
Licensed Capacity Options |
---|---|---|---|---|---|---|
HN-3-0610 |
6 / 1, 10 Gbps |
1 |
4M |
4M |
300M |
1, 2.5, 5, 10, 15 |
HN-3-1010 |
10 / 1, 10 Gbps |
2 |
2M |
4M |
300M |
1, 2.5, 5, 10, 15 |
HN-5-1025 |
10 / 1, 10, 25 Gbps |
2 |
5M |
10M |
300M |
5, 10, 15, 20, 30 |
HN-7-1240 |
12 / 40 Gbps
|
3 (40 Gbps)
|
5M |
20M |
300M |
15, 20, 30, 40, 50 |
ETO Software Subscription Options for physical appliances
1
2.5
5
10
15
20
30
40
50
2000
5000
10000
15000
17000
22000
30000
40000
50000
2000
5000
7000
12000
14000
18000
25000
30000
35000
License Compatability
A License can be used on either a virtual appliance or on one of the hardware appliances available from Mira Security. The following matrix shows which licenses can be used on specific hardware appliance models:
Appliance Model Capabilities
HN-3-0610
6 / 1, 10 Gbps
1
4M
4M
300M
1, 2.5, 5, 10, 15
HN-3-1010
10 / 1, 10 Gbps
2
2M
4M
300M
1, 2.5, 5, 10, 15
HN-5-1025
10 / 1, 10, 25 Gbps
2
5M
10M
300M
5, 10, 15, 20, 30
HN-7-1240
12 / 40 Gbps
or
24 / 10 Gbps
(Breakout)
3 (40 Gbps)
or
6 (Breakout)
5M
20M
300M
15, 20, 30, 40, 50
Resources

Encrypted TrafficOrchestration
Read Datasheet Now
What is SSL and TLS and How it Works in Today’s Security
Read Blog Now
Axellio, Garland Technology, and Mira Security Join Forces to Provide Comprehensive Decryption and Network Visibility Solution
Read Blog NowNetwork Diagrams
Request a Quote
Interested in purchasing this product? Simply fill out this request a quote and one of our team members will contact you.