Know your gear
Today's tech-savvy users are spending more and more time on their favorite web site or using the latest and greatest web application. This unfettered web surfing and application use exposes organizations to security and business risks including propagation of threats, possible data loss, and lack of regulatory or internal policy compliance.
Stand-alone URL filtering solution is an insufficient control mechanism because it is easily bypassed with external proxies (PHproxy, CGIproxy), circumventors (Tor, UltraSurf, Hamachi) and remote desktop access tools (GoToMyPC, RDP, SSH). Controlling users' application activity requires a multi-faceted approach that implements policies to control web activity and the applications that are commonly used to bypass traditional security mechanisms.
Palo Alto Networks' innovative firewalls identify and control applications, irrespective of port, protocol, encryption (SSL or SSH) or evasive characteristic. Once identified, the application identity, not the port or protocol, becomes the basis of all security policies, resulting in the restoration of application control. Acting as the perfect complement to policy-based application control is a URL filtering database that securely enables web usage. By addressing the lack of visibility and control from both the application and website perspective, organizations are safeguarded from a full spectrum of legal, regulatory, productivity and resource utilization risks.
Stand-alone URL filtering solution is an insufficient control mechanism because it is easily bypassed with external proxies (PHproxy, CGIproxy), circumventors (Tor, UltraSurf, Hamachi) and remote desktop access tools (GoToMyPC, RDP, SSH). Controlling users' application activity requires a multi-faceted approach that implements policies to control web activity and the applications that are commonly used to bypass traditional security mechanisms.
Palo Alto Networks' innovative firewalls identify and control applications, irrespective of port, protocol, encryption (SSL or SSH) or evasive characteristic. Once identified, the application identity, not the port or protocol, becomes the basis of all security policies, resulting in the restoration of application control. Acting as the perfect complement to policy-based application control is a URL filtering database that securely enables web usage. By addressing the lack of visibility and control from both the application and website perspective, organizations are safeguarded from a full spectrum of legal, regulatory, productivity and resource utilization risks.