Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples
Threat Assessment: Ignoble Scorpius, Distributors of BlackSuit Ransomware
Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012 and CVE-2024-9474 (Updated Nov. 21)
See all Unit 42 Threat Research
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials

Whitepaper

Secure the Network through Application Visibility PDF

Jul 18, 2017
asset thumbnail

Both governments and businesses must continuously assess the use of new applications and services that bring efficiencies and improve operations. As such, they must weigh the business benefits from the adoption of newly desired applications against potential risk to the organization, its data and other resources. If applications are not appropriately secured in the business network, today’s attackers can hide within the very communication mechanisms the applications use.

The premise that applications use only a specific set of well-known TCP or UDP ports is misguided, however, as applications are not so well-behaved anymore. They may use encryption, bind to arbitrary ports or even hop ports during a session. Attackers can hide their malicious activities in plain sight by “piggybacking” through existing port- and protocol-based security policies in firewalls. Network security that controls application traffic based only on ports and protocols expose their businesses to greater risk of successful cyberattacks which may culminate in identity theft and data breach.

Palo Alto Networks App-ID™ technology forms a foundation from which to reduce the attack surface, allowing administrators to safely enable applications through policies that allow or deny them contextually by specific users or groups. Attacks that try to evade detection by masquerading as legitimate traffic, hopping ports or sneaking through the firewall using encryption (TLS/SSL or SSH), are seen and stopped.

Download our use case "Secure the Network through Application Visibility" for the benefits of this approach, along with some common concerns over adoption, and read about the experiences of several anonymous customers across different industries who made this transition successfully.

For more information on cybersecurity for the financial sector, visit our Financial Services industry page at https://www.paloaltonetworks.com/security-for/industry/financial-services.html

Download
Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • Network Security Platform
  • CLOUD DELIVERED SECURITY SERVICES
  • Advanced Threat Prevention
  • Advanced WildFire
  • DNS Security
  • Data Loss Prevention
  • IoT Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Strata Cloud Manager
  • SECURE ACCESS SERVICE EDGE
  • Prisma Access
  • Prisma SD-WAN
  • Autonomous Digital Experience Management
  • Cloud Access Security Broker
  • Zero Trust Network Access
  • Code to Cloud Platform
  • Prisma Cloud
  • AI-Driven Security Operations Platform
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Cortex XSIAM
  • External Attack Surface Protection
  • Security Automation
  • Threat Prevention, Detection & Response
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsiblity
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2024 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Twitter
  • Facebook
  • LinkedIn
  • Podcast
  • Select your language