Zscaler, on the other hand, operates as a forward proxy. To inspect traffic, Zscaler terminates the SSL/TLS connection, looks inside, and re-encrypts it.

The Zscaler Solution: Bypass is the Strategy Unlike malware or web browsing, real-time media cannot tolerate decryption and reassembly. The industry standard (and Zscaler’s recommendation) is Selective Bypass .

But here is the headache for network security teams:

Stop inspecting the media. Create surgical bypass rules, open the UDP floodgates, and let WebRTC do what it does best—move packets fast.

TOP

Webrtc - Zscaler

Zscaler, on the other hand, operates as a forward proxy. To inspect traffic, Zscaler terminates the SSL/TLS connection, looks inside, and re-encrypts it.

The Zscaler Solution: Bypass is the Strategy Unlike malware or web browsing, real-time media cannot tolerate decryption and reassembly. The industry standard (and Zscaler’s recommendation) is Selective Bypass . webrtc zscaler

But here is the headache for network security teams: Zscaler, on the other hand, operates as a forward proxy

Stop inspecting the media. Create surgical bypass rules, open the UDP floodgates, and let WebRTC do what it does best—move packets fast. on the other hand