Today, many applications share the same port while some Web 2.0 applications use multiple ports. Malicious applications can use non-standard ports and SSL encryption to avoid detection and control. Application control is no longer simply managed by allowing or blocking the ability of users to "run" an application.
To prevent data loss and network security threats, organizations must control legacy applications as well as Web 2.0 applications. Applications filtering is critical to lock down the network. Moving forward, we suggest network administrators consider the following:
- Do you have a comprehensive enterprise network security policy and plan?
- What means do you have to monitor and block malicious Web 2.0 applications threats?
- Are end users able to effectively perform their job functions without putting corporate information at risk in terms of attacks and/or confidentiality?
- Would a way to effectively control the use of internet-based applications improve overall enterprise network security?