Zscaler, on the other hand, operates as a forward proxy. To inspect traffic, Zscaler terminates the SSL/TLS connection, looks inside, and re-encrypts it.
The Zscaler Solution: Bypass is the Strategy Unlike malware or web browsing, real-time media cannot tolerate decryption and reassembly. The industry standard (and Zscaler’s recommendation) is Selective Bypass .
But here is the headache for network security teams:
Stop inspecting the media. Create surgical bypass rules, open the UDP floodgates, and let WebRTC do what it does best—move packets fast.
Zscaler, on the other hand, operates as a forward proxy. To inspect traffic, Zscaler terminates the SSL/TLS connection, looks inside, and re-encrypts it.
The Zscaler Solution: Bypass is the Strategy Unlike malware or web browsing, real-time media cannot tolerate decryption and reassembly. The industry standard (and Zscaler’s recommendation) is Selective Bypass . webrtc zscaler
But here is the headache for network security teams: Zscaler, on the other hand, operates as a forward proxy
Stop inspecting the media. Create surgical bypass rules, open the UDP floodgates, and let WebRTC do what it does best—move packets fast. on the other hand