Content control of web traffic and SSL decryption

Why control web traffic and implement the SSL

Gartner reports 50% of all network attacks to be hidden in the SSL-encrypted traffic. The SSL connections bring advanced targeted attacks and other threats that evade the common network security safeguards. The SSL connection, on the other hand, is also an uncontrolled connection to the Internet, through which uncontrolled data theft can occur.



Simple configuration for a quick and efficient setup.

An increased visibility

Increases the capabilities (IDS/IPS, DLP, NGFW, sandbox) with expanded insight into the SSL traffic.


Integration of the solution into the existing security infrastructure for the sake of its fortification.

Strengthen the SSL traffic control

The insight into and control of the SSL-encrypted traffic is necessary because it can help:

  • eliminate the SSL blind spot,
  • get insight into the threat spreading process,
  • extend the life cycle of the existing security infrastructure,
  • maintain data privacy and GDPR compliance,
  • ensure data integrity and audits.

A secure web gateway for protection against targeted attacks

In order to ensure a comprehensive protection against advanced targeted attacks, set up a system to exchange detected data, which stops attacks at their source. This way you can control the three-key attack vectors, i.e. email, web traffic and end stations.

The ProxySG and CAS (Content Analysis System) devices exchange information via the ICAP protocol. The ProxySG device checks URLs, SSL decryption, categorisation and real-time blocking policies.


Get an insight into the SSL encrypted traffic

Are you wondering which solution is right for you? Our cybersecurity experts can help you.

Why trust our team

We have been deploying advanced cybersecurity ICT solutions for over three decades.


We specialise in deploying advanced cybersecurity technology solutions.

International certificates

Our hands-on experience is upgraded and maintained by maintaining international professional certificates in cybersecurity.

Own laboratory

The developed technical solutions are verified in our own state-of-the-art laboratory.

Technical support

We provide 24/7 phone support at the service centre.

Partners in the field of technology

We cooperate with global leaders in the field of cyber security.

Explore further


I agree that you may permanently store personal data in the notification list of:

We will store and process your information in order to occasionally notify you of any specialist content and send you invitations to specialised events by e-mail. We will use your personal information confidentially and will not share it with any third parties. We address your privacy in accordance with the provisions of the GDPR and the Personal Data Protection Act.

You can withdraw your consent at any time upon receipt of the email or by sending an e-mail with the subject line "Cancelling my subscription" to marketing@smart-com.si. After processing the subscription cancellation request, Smart Com will stop sending you the content you have unsubscribed from.

For details on subscription cancellation, processing, and protecting personal information, see Legal notices.