A network security module for protecting computing devices connected to a
communication network from identified security threats communicated in a
secured communication is presented. The network security module is
interposed, either logically or physically, between the protected
computer and the communication network. Upon detecting a secured
communication, the network security module obtains a decryption key from
the computing device to decrypt the secured communication. The network
security module then processes the decrypted communication according to
whether the decrypted communication violates protective security measures
implemented by the network security module.