Reviewed by Tom Stitt · July 24, 2025
Encrypted traffic analysis (ETA) within network detection and response (NDR) solutions is a sophisticated network security approach designed to analyze encrypted data flows without the need for decryption. This is crucial because over 85% of modern cyber attacks use encrypted channels to evade detection.
ETA allows NDR security tools to gain visibility into these encrypted communications, identifying malicious activities while simultaneously preserving data confidentiality and privacy.
Webinar
NDR solutions employing ETA do not "look inside" the encrypted packet payload. Instead, they focus on the observable characteristics and behavior patterns of the encrypted traffic itself to reveal attacker behaviors.
This is achieved by understanding normal network behavior and flagging deviations that indicate an issue security teams should investigate.
Key techniques include:
AI-driven threat detection can uncover threats that bypass traditional methods, including novel malware and unknown attack techniques.
ETA enhances the capabilities of NDR solutions in a number of ways:
Full decryption is not always feasible or effective. There is no universal standard for encryption, and attackers may use custom or old ciphers. In addition, decryption technologies struggle with applications using certificate pinning or hardcoded server certificates.
Furthermore, ETA can detect threats that full decryption might miss, such as invalid TLS certificates, by analyzing the encryption process and protocol information itself.
Notably, ETA generally cannot detect attacks leveraging encrypted Microsoft protocols such as MSRPC, SMB, Kerberos, or WinRM, where full decryption is often needed for detailed analysis. However, for a significant portion of threats, ETA provides crucial visibility and detection capabilities without the overhead and risks of universal decryption.
Since 95% of network traffic is encrypted, traditional deep packet inspection struggles to see threats. Trellix Network Detection and Response uses advanced ETA to identify threats without decryption, maintaining data confidentiality.
Key features include:
These capabilities use behavioral analysis, not content inspection, ensuring privacy and comprehensive threat visibility.
Discover Trellix NDR risk-based intelligence for modern network security. Prioritize threats and streamline investigation with advanced detection and GenAI.
Find out how a groundbreaking approach to NDR leverages on-device large language models and an interconnected network of AI agents to detect and disrupt attacker activity.
Eliminate security blind spots and disrupt attackers at every stage of the cyber kill chain, while accelerating investigation and response.
Reviewed by Tom Stitt, who serves as Director of Network Security Product Marketing at Trellix, leading strategy for Network Detection and Response solutions. With over two decades of cybersecurity experience at companies including Cisco, ExtraHop, BitSight, and IBM, Tom specializes in product launches, market positioning, and alliance partnerships across enterprise security markets.