Friday, July 15, 2011

The Evolving Complexity of Network Security

As network design complexity has increased and hackers have taken to designing threats via malicious applications, it has become clear the traditional firewall security approach with port blocking and URL filtering no longer suffices to protect an enterprise network.

Today, many applications share the same port while some Web 2.0 applications use multiple ports. Malicious applications can use non-standard ports and SSL encryption to avoid detection and control. Application control is no longer simply managed by allowing or blocking the ability of users to "run" an application.

To prevent data loss and network security threats, organizations must control legacy applications as well as Web 2.0 applications. Applications filtering is critical to lock down the network. Moving forward, we suggest network administrators consider the following:
  • Do you have a comprehensive enterprise network security policy and plan?

  • What means do you have to monitor and block malicious Web 2.0 applications threats?

  • Are end users able to effectively perform their job functions without putting corporate information at risk in terms of attacks and/or confidentiality?

  • Would a way to effectively control the use of internet-based applications improve overall enterprise network security?
Do you have any war stories or suggestions around the topic of network security related to Web 2.0 applications? To learn more about PTS' network security approaches, please contact us or visit the PTS website.