Putting BitTorrent Under the Spotlight

Sep 02, 2010
1 minutes

We have added a new video that introduces the key security concerns swirling around BitTorrent and specifically how to manage the risks that this incredibly popular application brings to your networks. We will cover how BitTorrent has evolved to avoid detection by traditional firewalls and IPS, how hackers are using BitTorrent to control malware, and why in some geographies BitTorrent can account for more than half of all combined enterprise and consumer internet traffic.

View the video

As always, we love to hear your feedback, so take a look and let us know if you have any questions or have an application that you would like to see profiled.

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.