Date

By Source

By Technology

By Services

By Audience

Displaying 9391 to 9420 of 9936

Social Networking Risks Under Little Control

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks.

  • 0
  • 1035

Social Networks Pervasive in Regulated Industries

The spread of social networks in the enterprise is happening at a far greater rate than is generally believed, according to a report just released by network security firm Palo Alto Networks.

  • 0
  • 1047

Security Risks Rise as Enterprises Go Social

Sure, social networks are all the rage on the consumer Web, and industry observers have noted that enterprises aren't far behind. But the rush to embrace social technologies carries a heightened security risk, experts warn.

  • 0
  • 1011

RSA SecurID Ready Implementation Guide

Information on configuring a Palo Alto Networks firewall to use RSA Authentication Manager can be found here: https://community.emc.com/docs/DOC-38286 owner: tramos

nrice,
  • 0
  • 2

New Application Usage and Risk Report Now Available

The latest edition of the Application Usage and Risk Report from Palo Alto Networks is now available. The Application Usage and Risk Report (5th Edition, Spring 2010) provides insight into the applications and associated risks on nearly 350 enterprise networks worldwide. The global view allowed us to look at, for the first time, application usage patterns from both a geographical (EMEA, NAM, APAC) and a vertical market perspective (Healthcare, Financial Services, Universities). Key findings include: Application usage is remarkably consistent, across all regions, and within industries. From a vertical market …

Palo Alto Networks,
  • 0
  • 0

Facebook, Google Apps Use Soars in Enterprises, Security Firm Says

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.

  • 0
  • 1034

Enterprise Networking: Google Apps, Facebook Devour Enterprise Network Bandwidth

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.

  • 0
  • 1047

Security: Shining a Spotlight on Social Media Risks

New reports from Palo Alto Networks and Webroot indicate that security consciousness is growing among social networkers but so are the risks, especially in highly regulated industries. Channel Insider takes a closer look at what this means for the channel.

  • 0
  • 1041

Research Shows Highly Regulated Industries Have No Control Over Social Networking Applications and Risks

Palo Alto Networks PA-4000 Series Next Generation Firewall Focuses on Identifying and Controlling Applications on the Network

San Jose, Calif.
  • 0
  • 202

How to View and Delete Reports from the CLI

Details The following CLI commands can be used to view the report jobs > show report (tab to view list) > custom      custom > directory-listing   directory-listing > id          By id > jobs        All jobs > predefined  predefined   Sample output showing the databases available for custom reports > show report

nrice,
  • 0
  • 0

Brute Force Signature and Related Trigger Conditions

Overview This document lists the trigger condition for each brute force signature.   Details Trigger # Application Name Name Description 40001 FTP Login Brute Force Attempt If a session has the same source and destination but triggers our child signature, 40000, 10 times in 60 seconds, we call it a

nrice,
  • 0
  • 1

How to Configure for a Microsoft NLB Cluster

When using a Microsoft NLB (Network Load Balancing Manager) Cluster behind a Palo Alto Networks device, it is often necessary to add a static ARP entry for the MAC address of the clusters.   An indication that a manual ARP entry needs to be added is when the Palo Alto

rnitz,
  • 0
  • 0

CLI Command to Count the Number of Session that Match Filter

Overview This document describes the CLI command to count the number of session that match filter.   Details The  > show session all filter command includes an option to count the number of sessions that match the filter. The following are examples of the displays are provided below: > show

nrice,
  • 0
  • 1

Next-Generation Firewall Defined By Gartner

Greg Young and John Pescatore just authored an excellent note on next-generation firewalls (see the liner notes/background in Greg’s blog). In the note, “Defining the Next-Generation Firewall,” Greg and John do an excellent job laying out the definition, the requirements, and their recommendations for next-generation firewalls in the enterprise.  Gartner notes that due to their dependence on port and protocol, first generation firewalls are not effective in today’s application and threat environment, and recommends that enterprises should move to next-generation firewalls at their next refresh.  To help organizations understand this …

Palo Alto Networks,
  • 0
  • 3

School District Recovers Most of $3.8M Lost…Banking Trojan to Blame?

A New York school district had US$3.8M pilfered by cyber-criminals, who may have used a common banking trojan to gain valid login credentials to the district’s accounts.  The very same trojan making the rounds on social networks like Facebook.  The district has recovered most of the money, but is still out nearly US$500K.

Palo Alto Networks,
  • 0
  • 0

A Subtle Shift in File Sharing Usage

Since the inaugural Application Usage and Risk Report (Spring Edition, 2008), browser-based file-sharing usage in terms of frequency has steadily increased to the point where it now exceeds that of peer-to-peer file sharing.

Matt Keil,
  • 0
  • 0

Yikes – Employees Are Using Yoics!

No doubt the first question you might have is what is Yoics! Simply put, Yoics! is a remote desktop access application that has been found in many of our customer’s networks. It is a good example of the types of applications being found that are not necessarily endorsed by corporate policy. Let’s take a quick look at what Yoics! is. Yoics! is targeted at end users as a means of accessing or sharing computing resources. It is not targeted at IT or support personnel.

Matt Keil,
  • 0
  • 0

Social Networking for Business Reasons…What About The Risks?

Lots of marketing pundits are pushing their constituents to social networking - potentially accelerating a wave of enterprise social networking adoption. What about the risks associated with these applications?

Matt Keil,
  • 0
  • 0

New Conficker Variants

Conficker is back in the news as there are reports of new variants popping up. I’m sure that you’ve all heard the news and hype about how many endpoints Conficker has infected, and even more speculation on what the bot herder will do with the massive botnet. Here’s some background info on Conficker and what we can do to stop it: Conficker (aka Downadup), is a computer worm that targets the Microsoft Windows operating system. The worm exploits a known vulnerability (MS08-067) in the Windows Server service used by Windows …

Alfred Lee,
  • 0
  • 0

March Madness for IT

The official 2009 NCAA basketball tournament bracket is out and office, friends, and family pools are forming all over the nation. End users everywhere are scoping out what apps and sites they can use to facilitate their need/desire to watch live streaming tourney games at work. The NCAA is again streaming every single tourney game live, and even has a High Quality (“HQ”) option this year that consumes even MORE bandwidth. They even have a March Madness on Demand (MMOD) iphone app that allows for live streaming games directly to …

Alfred Lee,
  • 0
  • 0

“DLP-ing” In The Dark

Looking for data leaks in email, IM and web traffic is easy, but that does not even begin to solve the problem. These are just few applications among the hundreds of application that are capable of file transfer – peer-to-peer applications, skype, online backup services and gmail to name a few. There are many examples of organizations losing data through peer-to-peer networks, such as Walter Reed and the Tokyo Police department.

Palo Alto Networks,
  • 0
  • 0

Microsoft Security Bulletin – November 2008

Microsoft announced their scheduled November security bulletin today at 10am PST which covers 4 Microsoft vulnerabilities. Palo Alto Networks released coverage for the Microsoft vulnerabilities covered in the November security bulletin in content version 94 which was released today at 1pm PST. Here are the vulnerabilities that were released by Microsoft today: Microsoft Windows SMB Authenticate by Replay Host Remote Code Execution Vulnerability Vendor ID: MS08-068 CVE: CVE-2008-4037 Microsoft Internet Explorer MSXML3 Race Condition Memory Corruption Vulnerability Vendor ID: MS08-069 CVE: CVE-2007-0099 Microsoft MSXML DTD Cross-Domain Scripting Vulnerability Vendor ID: …

Alfred Lee,
  • 0
  • 0

Tell Us Why 400% Growth is a Good Thing

ANALYSIS – This ZeroPaid article projects some fairly aggressive growth for the use of P2P technology and in most markets, a 400% increase would be somewhat uplifting, particularly in this dismal economy. You see, 400% growth usually means increased revenue, profits, jobs etc. But in this case, 400% growth is not surprising and unfortunately, it does not mean more profits revenue, profits and so on. Several reasons may account for this. First off, P2P filesharing users would not appear to be the type that would respond to internet ads, which …

Matt Keil,
  • 0
  • 0

An in the Cloud Smackdown?

ANALYSIS – This Lifehacker article, like many others this past week, highlights the long talked about move by Microsoft to make Office available as an in-the-cloud/web service or whatever the latest definition of this category is…. Tools like Google Docs, Zoho and other web-based productivity suites are gaining in popularity for several reasons. They are not Microsoft products, they are easily accessible and they are typically free. The question it poses however is this: will users of Google Docs, Zoho, and other suites move to Microsoft? Those users who chose …

Matt Keil,
  • 0
  • 0

Out-of-Band Microsoft Security Bulletin

Microsoft announced an unscheduled security bulletin today at 10AM PST that they have a critical vulnerability (MS08-067) which affects Windows 2000, XP, 2K3 Server, Vista, and 2K8 operating systems. This vulnerability is a buffer overflow in the Windows Server service. The vulnerability exists in the way the Server service handles Remote Procedure Call (RPC) requests. The vulnerability allows a remote, unauthenticated attacker to send a specially crafted RPC request to take advantage of the vulnerability and gain remote code execution privileges on the victim machine. For systems running Vista and …

Alfred Lee,
  • 0
  • 0

Dogs and Cats Living Together?

ANALYSIS – This SearchSecurity article discusses the need for businesses units to not only talk with security teams but to go so far as to establish a partnership that benefits the company bottom line. Just imagine, business units and security teams working together to enable application usage and move projects forward smoothly and efficiently as opposed to being told NO before the question is even complete. Next thing you know dogs and cats are living together in harmony. The reduction of risk is not all about security. It is about …

Matt Keil,
  • 0
  • 0

Will the Olympics Be Any Fun for Network and Security Admins?

ANALYSIS – Today marks the official start of the 2008 Olympics in Beijing, and will no doubt be watched by millions and millions of people both in the traditional manner (TV) as well as the online manner as outlined in this Wired article. Geographic time gaps, too many events simultaneously and scheduling issues will no doubt push many an employee towards an occasional “non-work related” viewing of their favorite Olympic event. This Olympics comes at an unprecedented time in the electronic age – never before have there been so many …

Matt Keil,
  • 0
  • 0

Got any hot stock tips?

ALERT – If you don’t, your employees probably do. There is a lot of stock discussion that goes on in the financial message boards and there are many examples of well-intentioned employees responding to comments on these boards with “clarifications” to claims made. In this weeks content release, we have added the ability to identify and control the posting of comments to the top financial message boards. These boards are a hotbed for day traders and others seeking the stock tip that will make them rich. They are also a …

Alfred Lee,
  • 0
  • 0

Maybe it’s the name change?

ANALYSIS – While it may not fall into the original, and somewhat ill fated definition of software as a service (SaaS), these two articles highlight the reasons why the new generation of web-based productivity and business applications may actually succeed. Harken back a few years when software vendors were sprinting towards delivery of their applications as a service and the coffins for MS Office and other applications were being built. Guess they did not realize it is a marathon, not a sprint as only a handful actually survived. Fast forward …

Matt Keil,
  • 0
  • 0

We will take over the digital world – resistance is futile

ALERT – In their quest to control all things digital, Google has announced a media server adding to their long list of applications and services. First it was Google Desktop to help organize the PC, then it was Google docs, an alternative to that other, big, controlling software company. Now that they have their fingers firmly planted in the business applications they are moving to the living room. But will it stay there? Not likely. Corporate networks are rife with this type of application. Big pipes mean faster downloads. And …

Matt Keil,
  • 0
  • 0
Displaying 9391 to 9420 of 9936