What's next -- the missile launch codes? While the record industry has targeted the universities and student populations in their battle against piracy, P2P use has enjoyed continued success in the business world with the most recent example being the discovery of the blue prints for Marine One, President Obama's helicopter being found "in-the-wild".
This MSNBC article, talks about how Marine One helicopter blueprints along with the maintenance schedule were discovered on a P2P network at an Iranian IP address. Apparently the files were exposed by a defense contractor using P2P on their work PC. The blueprint discovery will no doubt garner some very visible press but it is no less serious than the discovery of many thousands of medical records on P2P networks.
In the case of the health care records discovery, one treasure trove of data included data on 20,000 patients, including names, Social Security numbers, insurance carriers and codes for diagnoses. The codes identified by name four patients infected with AIDS, the mental illnesses that 201 others were diagnosed as having and cancer findings for 326 patients. Data also included links to four major hospitals and 355 insurance carriers that provided health coverage to 4,029 employers and 266 doctors.
The unapproved use of P2P in enterprise and services organizations is common. Palo Alto Networks' own analysis of the traffic flowing across sixty different customer's networks shows that 92% of them have at least one instance of P2P filesharing. In some cases, there were as many as 12 different variants of P2P filesharing found. In all cases, when asked if P2P was allowed, the answer was no.
One of the big reasons that P2P continues to enjoy high usage is because it is capable of evading detection by today's security infrastructure. P2P can bypass security using a number of evasion techniques such as hopping ports, tunneling HTTP and using encryption. The issue is not whether the IT department wants to block P2P - it is more the fact that their tools are incapable of doing so.
Can Palo Alto Networks help these organizations regain control over the use of P2P? Without a doubt the answer is yes, along with all their other application traffic. Here's how.
These are just a few of the things we can do to help businesses regain control over all the applications traversing their networks - including P2P. This is not the first exposure of this type (P2P exposing confidential files) and because of the evasive nature of P2P and its popularity, it certainly won't be the last. It's time to fix the firewall.
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.