• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

White Paper

Secure the Network through Application Visibility PDF

Jul 18, 2017
asset thumbnail

Both governments and businesses must continuously assess the use of new applications and services that bring efficiencies and improve operations. As such, they must weigh the business benefits from the adoption of newly desired applications against potential risk to the organization, its data and other resources. If applications are not appropriately secured in the business network, today’s attackers can hide within the very communication mechanisms the applications use.

The premise that applications use only a specific set of well-known TCP or UDP ports is misguided, however, as applications are not so well-behaved anymore. They may use encryption, bind to arbitrary ports or even hop ports during a session. Attackers can hide their malicious activities in plain sight by “piggybacking” through existing port- and protocol-based security policies in firewalls. Network security that controls application traffic based only on ports and protocols expose their businesses to greater risk of successful cyberattacks which may culminate in identity theft and data breach.

Palo Alto Networks App-ID™ technology forms a foundation from which to reduce the attack surface, allowing administrators to safely enable applications through policies that allow or deny them contextually by specific users or groups. Attacks that try to evade detection by masquerading as legitimate traffic, hopping ports or sneaking through the firewall using encryption (TLS/SSL or SSH), are seen and stopped.

Download our use case "Secure the Network through Application Visibility" for the benefits of this approach, along with some common concerns over adoption, and read about the experiences of several anonymous customers across different industries who made this transition successfully.

For more information on cybersecurity for the financial sector, visit our Financial Services industry page at https://www.paloaltonetworks.com/security-for/industry/financial-services.html

Download
Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, customer stories, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved