The Network Application Security Architecture Requirement

Download Now
Provided by: Enterprise Strategy Group
Topic: Networking
Format: PDF
In the past, applying network security policies at an enterprise organization meant deploying network firewalls with rules for blocking IP addresses, specific protocols, and TCP ports. This was effective for things like preventing IT employees from using clear text Telnet traffic over port 23 for remote system administration or making sure SNMP events remained within the building. Unfortunately, existing safeguards are no longer enough. Why? Because of an onslaught of new Web-based and social networking applications. Unlike other network services, Web-based applications and social networking traffic typically travels over wide open port 80, making it more difficult to monitor application traffic, let alone block security threats.
Download Now

Find By Topic