Date

By Source

By Technology

By Services

By Audience

Displaying 10951 to 10980 of 11117

Meebo Repeater: An Evasive Extension to an Already Evasive App

ALERT – If you are trying to control IM use and haven’t heard of Meebo, it is very likely your users have. Meebo’s purpose in life is to allow people to continue using IM even at companies that have a policy to block it. It is a web-based multi-protocol IM client that is accessed via HTTP or HTTPS. During early adoption, just being web-based was enough to get out of most networks. However, as administrators started blocking access to Meebo’s web servers, Meebo launched the Meebo Repeater – a repackaged …

Mike,
  • 0
  • 0

Create a Conscious Policy Around Web-based File Sharing

ALERT – Think your users don’t get around email attachment restrictions? Think again. Attachment limitations, while possibly useful for managing resource utilization on an over-burdened mail server, encourage user creativity. In addition, Microsoft, Apple, and Google have jumped into the pool of web-based file-storage/sharing applications. The success of these online applications is driven by users looking for easy ways to get files to partners, customers, vendors, etc. When pushed with a deadline, users won’t bother trying to figure out the access information for the corporate FTP server, they will simply …

Matt Keil,
  • 0
  • 0

uTorrent Becomes the Official BitTorrent Client

ALERT – uTorrent, an extremely popular BitTorrent client, has been re-branded and released as the official mainline BitTorrent client, appropriately named BitTorrrent 6.0. BitTorrent, Inc. acquired uTorrent in December 2006 and gained nearly 50% of all BitTorrent users in the process. The original uTorrent standalone client will continue to exist, but will not include BitTorrent DNA (Delivery Network Acceleration) for improved content download. Corporate administrators should understand that both uTorrent and BitTorrent clients can evade existing network security infrastructure and consume large amounts of bandwidth. Implementing appropriate methods for identifying …

Mike,
  • 0
  • 0

MPack Malware Leverages SSL for Secure Transmission

ALERT – SSL (Secure Socket Layer) is a protocol designed to provide encryption with minimal to no configuration, and has been used extensively to encrypt web communications through HTTPS (HTTP in SSL). Most security devices, including most firewalls, are not able to decrypt the traffic to see what is running inside SSL, and have little choice but to let the uninspected traffic pass. With the rise of legitimate applications using SSL or HTTPS (HTTP in SSL), malware writers are also adopting SSL as another way to avoid detection. A good …

Alfred Lee,
  • 0
  • 0

BitTorrent Releases Streaming Video Application

ALERT – This San Jose Mercury News article covers the recent BitTorrent announcement of their streaming video service, joining the ranks of Joost and Babelgum who are delivering a similar service. It is interesting to see how the use of P2P technology to deliver a legitimate (legal) service, complete with appropriate licensing demonstrates how it has come full circle. Originally used as the heart of the Usenet network for delivering files and news, then applied to music, video sharing (Napster, Kazzaa, etc) and now used in many different, legitimate applications. …

Matt Keil,
  • 0
  • 1

How to Ruin a Good Thing…

ANALYSIS – Used by millions of users, RSS is much like instant messaging in that it is predominantly an end-user driven tool that has become invaluable in helping enterprise employees be more productive. Daily news delivered directly to their desktop via RSS feeds. Now that news (RSS) can be accompanied by viruses or other malicious content. As the ITSecurity.com article points out, security best practices should be applied to RSS in the same manner as other traffic flowing in and out of the network. Additional considerations should include a multi-layered …

Matt Keil,
  • 0
  • 0

Social Networking Permeates the Enterprise

ANALYSIS – This InformationWeek article highlights the opportunity that social networking applications like Facebook have to support their users as they mature and at the same time, establish themselves as an enterprise solution offering. While the number of users categorized as “corporate” is small compared to their 30 million and growing user-base, it is clear that the enterprise market represents significant opportunities for social networking companies like Facebook. With millions of college graduates who have made these and other personal applications part of their daily lives, corporations are rapidly looking …

Matt Keil,
  • 0
  • 0

Let the Deployments Begin

ANALYSIS – Coverage of the Enterprise 2.0 Conference indicates that today’s latest web applications (RSS, Blogs, Wikis, unified messaging, collaboration) are permeating the enterprise faster than predicted. A Social Computing Magazine summary of the activities and excitement around the Enterprise 2.0 Conference, complete with references from large corporations that demonstrates the early adoption of new web applications like RSS, Blogs, Wikis, unified messaging, and collaboration tools is increasing. No doubt there is some bias from Social Computing Magazine, and it is early in the adoption cycle, but large enterprises do …

Matt Keil,
  • 0
  • 0

Skinkers Announces Live TV Broadcasting via P2P

ALERT – Skinkers, a London-based company, is using Microsoft Research’s LiveStation (beta) and Silverlight technologies to stream live television content over a peer-to-peer(P2P) network, which means that users don’t experience the typical client-server architecture and bandwidth issues that impact traditional video streaming quality. However, corporate administrators should understand that Skinkers can still consume large amounts of bandwidth similar to that of other video and P2P applications. Unlike other P2P video applications like Joost, BabelGum, and Veoh, Skinkers is providing live television content. Palo Alto Networks will continue to monitor the …

Matt Keil,
  • 0
  • 1

The First of Many Case Studies to Come…

ANALYSIS – Or an example of a bleeding edge user? Only time will tell, but few things will help drive adoption more than a case study in a leading publication like Information Week. With the goal of reducing the speed with which they bring products to market by improving employee collaboration, the article discusses the struggles and successes that Proctor & Gamble went through as they rolled out their Enterprise 2.0/Web 2.0 tool (Wikis, RSS feeds and collaborative tools). Many aspects of the deployment were covered in the article but …

Matt Keil,
  • 0
  • 0

Web 2.0 Executives Challenge IT Professionals

ANALYSIS – Here you are, sitting in the audience, listening to a panel discussion when a Google exec says IT couldn’t stop instant messaging and they won’t stop other Web apps either. Perhaps it was not meant as a challenge — but given the daily tasks every IT professional faces, did you really need to be verbally smacked? “IT tried ‘feverishly to block instant messaging’ from getting behind the firewall but they were unsuccessful,” issued by Matthew Glotzbach, head of Google’s enterprise business. Every networking and security professional we know …

Matt Keil,
  • 0
  • 0

Web 2.0, Enterprise 2.0 and Security – Oh My!

ANALYSIS – Beyond the buzz and hype associated with Enterprise 2.0 and Web 2.0 there lies a set of tools such as IM, VoIP, Blogs and RSS that can foster collaboration and improve productivity. In the enterprise world, many of these applications are already in use. The debate will rage as to how effective the applications are in achieving their promise of more productivity but there is a strong possibility that left unchecked, these applications may have a negative impact on the business – be it via an attack, increased …

Matt Keil,
  • 0
  • 0

Support for Apple and Microsoft Update Services Released

ALERT – PAN-OS App-ID Update 20 introduces support for the Apple Software Update service. Likewise, App-ID Update 19 included support for the Microsoft update services. These services are critical to keeping enterprise desktops patched and up to date. It is recommended to allow internal computers to access these services as well as the desktop antivirus update services so that software and pattern file updates can be distributed effectively. In addition to Apple and Microsoft updates, PAN-OS includes support for Kaspersky, McAfee, Symantec, and Trend Micro antivirus updates. Click here to …

Mike,
  • 0
  • 0

Enterprises Held Hostage – The List of Demands Is Short…

ANALYSIS – New rank and file employees entering the work force may demand access to social networking sites, wikis, IM and such as part of their employment package. “We’ll have to deal with the reality of people coming in and using tools that aren’t in the firewall,” said De Beer [of IDC]. “Web 2.0 empowers users beyond creating content. It’s about how we interact. For the next generation, it will be about mass collaboration, using social networking.” The key point in this article is that many new applications falling into …

Matt Keil,
  • 0
  • 0

Veoh Networks launches VeohTV

ALERT – On Jun 20th, 2007, Veoh Networks launched VeohTV, an Internet video viewing application. Unlike Joost and other video applications that use P2P networks to distribute controlled content, VeohTV is a video browsing application designed to simplify the task of accessing a wide range of generally available Internet content, including CBS, NBC, Youtube, and others. Palo Alto Networks will soon add an App-ID for this application.

Matt Keil,
  • 0
  • 0

Palo Alto Networks Delivers Next-Generation Firewall For Application Visibility and Control

Industry-First Application Classification Technology Enables Identification and Policy Enforcement of Applications Regardless of Port, Protocol or SSL Encryption

San Jose, Calif.
  • 1
  • 624

Palo Alto Networks Raises $18 Million in Series B Financing

Globespan Capital Partners, Greylock Partners and Sequoia Capital Fuel Expansion of Company as it Delivers Next-Generation Firewall for Application Visibility and Control

San Jose, Calif.
  • 1
  • 355

P2P Programs Share More Than Music

ANALYSIS – Most commonly known for its place in sharing music across vast networks of connected PCs, this article does a great job of summarizing how P2P applications will integrate themselves into the existing applications and folders – often times without the user’s knowledge. “All five P2P programs studied employ a feature that lets users store downloaded files in a folder other than the specified default folder the programs create. However, the programs fail to warn users that all files stored in the selected folder will be shared. In most …

Matt Keil,
  • 0
  • 1

Babelgum Announces 30 Content Partners

ALERT – On June 15, 2007, Babelgum, a new Internet-based TV network, announced that it had signed 30 content partners. Bablegum joins a rash of new companies that are showcasing their P2P-based video networks, with the most attention going to Joost. These up and coming network video providers promise to allow users to download and view full-length TV and video content over the Internet. As with the other video network providers, Babelgum uses a distributed P2P network that relies on end-users to help distribute the content to other viewers. While …

Alfred Lee,
  • 0
  • 0

Employee Records Show Up In P2P Traffic

ANALYSIS – A recent Computerworld article on the appearance of employee records in P2P traffic demonstrates that the risk of P2P applications on corporate networks goes far beyond the copyright lawsuit threats posed by the music industry. The risks are loss of personal and corporate data because of the tentacle-like manner in which P2P applications install themselves, weaving their fingers deep into the folder structure of a users PC. P2P proponents may claim the user mis-configured the application, sharing the wrong folder, a distinct possibility, save for the fact that …

Matt Keil,
  • 0
  • 0

HTTP Tunneling 101

Network administrators are more and more concerned about scrutinizing the traffic that comes in and out of their networks, but applications and attackers know that they won’t block HTTP traffic over port 80. So if you can't beat'em, join'em. Applications and attacks have quickly learned that they can evade firewalls and other security devices via HTTP tunneling. HTTP tunneling is a method of evading network firewalls and access control policies by encapsulating traffic in HTTP headers and sending it over the most open port in the network – port 80. …

Mike,
  • 0
  • 3

Firewall Nowej Generacji: wszystko co musisz wiedzieć

This video is an overview and demo of Palo Alto Networks Next-Generation firewall in Polish.

  • 3
  • 1053

Decrypting SSL for Traffic Inspection

SSL is a growing category of network traffic that delivers private and secure communications. However, it can also be used inappropriately to hide application usage, transfer data to unauthorized parties, and mask malicious activity.

  • 2
  • 1841

WildFire Just Got Better - See What It Means To You (Hebrew)

The WildFire solution detects and blocks targeted and unknown malware, exploits, and outbound command-and-control activity. Quickly turning unknown threats to known and blocked, WildFire delivers near real-time protection globally in as little as 30 minutes. Watch this webcast to learn the new innovations in WildFire for detecting and blocking advanced cyber threats. [Language: Hebrew]

  • 0
  • 179

Palo Alto Networks and Citrix Webinar: Best Practices to Secure Your Virtual Desktop Solutions

Realizing the benefits of desktop virtualization depends on ensuring the security and availability of the virtual desktop infrastructure. Watch this Palo Alto Networks and Citrix webinar to learn the best practices on how to secure Citrix XenApp and XenDesktop deployments using Citrix NetScaler and Palo Alto Networks next-generation firewalls.

  • 0
  • 904

Threat Review Series: What the Enterprise Can Learn From WikiLeaks

The WikiLeaks saga has captured attention world-wide, with the majority of analysis focused on the actual leaked content. Yet while WikiLeaks is certainly the most high-profile breach in recent memory, the techniques used to exfiltrate and hide information are directly applicable to enterprises today. In this session we will summarize the key lessons of WikiLeaks and how security managers can protect their networks today.

  • 0
  • 192

Palo Alto Networks and Plixer

Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.

  • 0
  • 350

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.

  • 0
  • 271

Lightboard Series: VM-Series on Google Cloud Platform Overview

A quick summary of the different ways in which you can deploy the VM-Series next-generation firewall on Google Cloud Platform to protect your applications and data.

  • 0
  • 8
Displaying 10951 to 10980 of 11117