Attackers increasingly use encrypted traffic to mask their activity. While most agree that better visibility into this traffic would improve their organization’s security posture, many continue to forgo decryption for a variety of reasons. While tools that can detect threats in encrypted traffic remain fairly new, they represent an attractive approach to improve visibility into encrypted threats without sacrificing privacy or performance.