SoundMind-Logo

770-594-7147

email

Block Cyber Threats

block-threat-quoteThe 2014 Application Usage and Threat Report, prepared annually by Palo Alto Networks with client data, found that common sharing applications, such as email, social media, file sharing, etc., delivered 32% of  all threats found (exploits and malware), and 19% of all code execution exploits found.

With this said, any Network Manager or Network Security Engineer wants to know, “How do I block or eliminate these threats?” A traditional port blocking firewall is nearly useless in this regard.   I like Palo Alto Networks approach, which is essentially, “Control the application. Block the threat.”

According to Palo Alto Networks:

block-threats“Applications are integral to virtually all cyber threats. In some cases, the application is the threat, such as a botnet communicating via a peer-to-peer network. In other cases the threat is enabled by an application that provides a vector for the threat or obscuring it from security solutions, such as an SSL encrypted browser session that obscures the delivery of malware.

By leveraging App-ID™, Palo Alto Networks provides visibility into all applications, where they can be controlled by policy and fully inspected for threats. Undesirable applications such as P2P file sharing, external proxies or circumventors, can be summarily blocked, or limited to the few users with a valid use case. Additionally, staff can easily restrict applications by their ability to tunnel other applications, transfer files, or history of being used by malware. These controls can instantly reduce the attack surface of the enterprise. Applications that are permitted can be controlled and inspected at a very granular level for viruses, spyware and vulnerability exploits. App-ID enhances the threat prevention logic through the use of more than 100 application and protocol decoders, which further reveal exactly where to look for different types of threats.” (The above quote was excerpted from the Palo Alto Networks Threat prevention Data Sheet.)

PANGFW Known Protocol Decoder

Palo Alto Networks Next Generation firewall has integrated the ability to search for application specific threats and Intrusion attempts into their core firewall, with Single-PassTM architecture. This enables their firewall to provide best of breed IPS and threat prevention at wire-speed scalable beyond 10 GB. Speed and capability are crucial components, but what really make revolutionary technology effective is that it is easy to implement and manage, even for companies with minimal network security experience. 

Application Usage and Threat Report

Today’s advanced cyber threats use applications as their infiltration vector, exhibit application-like invasion tactics, and act as, or use common network applications for communications and exfiltration. The Application Usage and Threat Report is an analysis of applications and their link to cyber threats within the enterprise. The report is a must read and be sure to check out the interactive component.

Get the Report

Cost of Data Breach Report

Throughout the world, companies are finding that data breaches have become as common as a cold, but far more expensive. As revealed in the 2014 Cost of Data Breach Study, the average cost to a company was $3.5 million in US dollars and 15 percent more than what it cost last year. Read this report to understand the nature and cost of data breaches, and the impact it could have on your organization.

Get the report

Soundmind Network Solutions has been providing World Class Network Engineering services in the Atlanta Area for over a decade. We are an authorized reseller of Palo Alto Networks Firewalls and maintain the highest levels of technical certification.