We currently inspect http traffic at our proxy server for attempts to go to bad websites, hacking sites, ****, etc. We are looking at doing the same for https traffic. Our question is how to do this for non-domain trusted or BYOD devices?
↧
We currently inspect http traffic at our proxy server for attempts to go to bad websites, hacking sites, ****, etc. We are looking at doing the same for https traffic. Our question is how to do this for non-domain trusted or BYOD devices?