SlideShare a Scribd company logo
Securing the Enterprise
with Application-Aware
Acceptable Use Policy
Jay Klein – VP & CTO
June 2015
Presented at Gartner
Security Summit June
2015
For more info contact
sales@allot.com
Introducing Allot
CloudTrends Report, Key Findings
The Rising Threat of Anonymizers
Application Visibility and Control
Presentation Topics
2
Allot Communications
Leading global provider of intelligent broadband
solutions leveraging network intelligence to
analyze, protect and improve user experience
Network Intelligence – our Core Technology
4
usage by exact
application, end-user &
device
Determine
traffic based on information
layer 3 to 7 OSI model
Classify
permitted from forbidden use
of certain applications
• enabling policy
enforcement at application
and user layers
Distinguish
in detail into data contents
of packets being sent
through an inspection point
Look
security threats not visible
to most network elements
• spam, viruses, worms,
spyware
Identify
5
Get the free
report here
Findings Support our Premise
6
Web security threats are indeed complex
Many Threats use a combination of back-door methods and
unwitting user assistance
Traditional AUP is not enough
Application-aware AUP is needed to complement perimeter and
threat security measures
of blocked web traffic
in large enterprises is due
to a well-defined
Acceptable Use Policy
92%
of malicious traffic
from the web is caused by malware. Spywa
constitutes about 8% and viruses about 1%
90%
Findings: Acceptable Use Policy
7
Spyware
Viruses
Hackers
Phishing
Malware
Blocked
(malicious) 8%
Blocked
(policy) 92%
AUP Blocking vs. Malicious
Blocking 112014-042015
Types of Malicious Traffic
112014-042015
Findings: IM & Social Networks
8
Facebook 54%
Twitter 25%
Google 8%
Others 6%
Soundcloud 4%
Pinterest 3%
Social network
blocked
112014-042015
On average, enterprise
users try more than 6X
per day to access social
networks, half of which
are going to Facebook
Traffic from Instant
Messaging application is
blocked 10X more often
than overall web traffic
due to malicious content
Findings: Anonymizers
9
“Anonymized”
web traffic, when
discoverable, is
likely to be
blocked 3 times
more often than
overall web
traffic due to
malicious
content
Top Anonymizers Blocked 112014-042015
1,000 2,000 3,000 4,000 5,000 6,000
ModVPN book.net
Zenm.com
HideMyAss
VPNunlimited.me
TOR.me
Anonymussurf.us
Hide-ip.us
Hideipproxy.com
Hidemyip.info
ipcloak.us
Ipmask.us
Maskip.info
Unblocker.me
Myipproxylist.com
Hiderealip.net
A1.webproxy.nic.tel
Anonfiles.comels
Psphone.com
What are Anonymizers?
10
Facilitate
incognito
Internet
access
User traffic is
encrypted
Related IP
address
cannot be
observed
Common
use cases:
Privacy
Bypassing
Enterprise/ISP
block policies
(Facebook)
Accessing
media which is
conditioned by
geography
(Netflix)
11
An Anonymizer in Action (TOR)
12
Anonymizers – Threats & Challenges
13
Platform for
illegal activities
Exploited for
Cyber/Security
attacks
Bypassing
Corporate Policy
Anonymizer detection difficulties:
• Anonymizers aren’t just another
website to block
• Related traffic resembles harmless
web transactions
Analytics: Scary Anomalies in Anonymous TOR
14
Snowden leak
PirateBrowser release
Ineffective URL & Port based Policies
15
Real Time Behavioral Analysis
Questionable
candidate?
Possible
Candidate?
Classified activity
New activity
Application Awareness – Key to Efficient Security
16
Users continue to access internet applications
• Regardless of corporate AUPs or Anonymizer use
Application control is required for adequate real time response
Personal & business lifestyles mix up with BYOD
• Whenever content is accessed a vulnerability exists
Application visibility is crucial for identifying underlying threats
• Masqueraded as innocent traffic compliant with dictated AUPs
Report Findings – Online Storage & File Types
17
iCloud 71%
Dropbox 19%
4shared 7%
Others 3%
Top Online Storage
site Blocked
112014-042015
Online storage:
a major security hole?
30%
21%
12%
11%
7%
5%
2%
2%
1%
2%
2%
2%
2%
2%
Common File Types
used by malware
Images – more
than 20% of
Malware
js
aspx
php
jpg
png
gif
xml
ico
html
pdf
cgi
json
swf
css
Report Findings – Risky Services, Inappropriate Content
18
Even when Acceptable Use Policy is in place, there are numerous
attempts to access “risky” applications
Webmail and Instant Messaging Inappropriate Content
Employees on average made 5.5
attempts to access webmail and
Instant Messaging sites and were
blocked per the company’s AUP.
Popular sites include:
Employees at large enterprises
attempt to access inappropriate
content 1.5 times per day on
average. Types of inappropriate
content were varied:
• Bombs
• Dating Sites
• Drugs
• Glamour
• Hackers
• Models
• Pornography
• Weapons
• Violence
• whatsapp.com
• talk.google.com
• skype.com
• mail.google.com
• hotmail.com
• mail.live.com
• outlook.com
• mail.yahoo.com
• gmail.com
Conclusions
19
The enormous cost
of inaction isn’t
eliminated by
deficient measures
AUPs must be coupled
with real-time network
intelligence &
application-level controls
Organizations adopting
such practices would
benefit from a secure and
more productive work
environment
Enforceable AUPs are key
to safeguard enterprises
and SMBs but aren’t
sufficient to cope with
current threat realities
THANK
Jay Klein
CTO & VP
Allot Communications
Email: jklein@allot.com
U
www.allot.com
20

More Related Content

What's hot

5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
Seqrite
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentPrahlad Reddy
 
Website security statistics of 2012
Website security statistics of 2012Website security statistics of 2012
Website security statistics of 2012
Bee_Ware
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
Samvel Gevorgyan
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
IBM Security
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
Priyanka Aash
 
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
Imperva
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
Seqrite
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
Valery Yelanin
 
FireEye
FireEyeFireEye
FireEye
gigamon
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
Seqrite
 
Web application firewall solution market
Web application firewall solution marketWeb application firewall solution market
Web application firewall solution market
SameerShaikh225
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
Veracode
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 

What's hot (20)

5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
BAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise AssessmentBAI Security - Brochure - Compromise Assessment
BAI Security - Brochure - Compromise Assessment
 
Website security statistics of 2012
Website security statistics of 2012Website security statistics of 2012
Website security statistics of 2012
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your EndpointsMalware in a JAR: How Rogue Java Applications Compromise your Endpoints
Malware in a JAR: How Rogue Java Applications Compromise your Endpoints
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
 
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Detect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted AttacksDetect & Remediate Malware & Advanced Targeted Attacks
Detect & Remediate Malware & Advanced Targeted Attacks
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
FireEye
FireEyeFireEye
FireEye
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Web application firewall solution market
Web application firewall solution marketWeb application firewall solution market
Web application firewall solution market
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 

Similar to Securing the Enterprise with Application Aware Acceptable Use Policy

The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
CloudLock
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
IBM Security
 
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Wireless Network Security Palo Alto Networks / Aruba Networks IntegrationWireless Network Security Palo Alto Networks / Aruba Networks Integration
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Aruba, a Hewlett Packard Enterprise company
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Adelaide Hill
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
Zivaro Inc
 
Every cloud cloud risk assessment 2018
Every cloud cloud risk assessment  2018Every cloud cloud risk assessment  2018
Every cloud cloud risk assessment 2018
soniamcpherson11
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
Cloudflare
 
Avr_presentation
Avr_presentationAvr_presentation
Avr_presentationPakky .
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
Forcepoint LLC
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
dianadvo
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
Arnold Antoo
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
Digital Transformation EXPO Event Series
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
Bitglass
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 
WHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
APNIC
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
CipherCloud
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 

Similar to Securing the Enterprise with Application Aware Acceptable Use Policy (20)

The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive DataX-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
X-Force Threat Intelligence: Fight Insider Threats & Protect Your Sensitive Data
 
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Wireless Network Security Palo Alto Networks / Aruba Networks IntegrationWireless Network Security Palo Alto Networks / Aruba Networks Integration
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Every cloud cloud risk assessment 2018
Every cloud cloud risk assessment  2018Every cloud cloud risk assessment  2018
Every cloud cloud risk assessment 2018
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
Avr presentation
Avr   presentationAvr   presentation
Avr presentation
 
Avr_presentation
Avr_presentationAvr_presentation
Avr_presentation
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
WHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 

More from Allot Communications

Securing people and things a monetization opportunity
Securing people and things a monetization opportunitySecuring people and things a monetization opportunity
Securing people and things a monetization opportunity
Allot Communications
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
Allot Communications
 
How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...
Allot Communications
 
Allot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer Enagagement
Allot Communications
 
Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have? Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have?
Allot Communications
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues
Allot Communications
 
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network PerformanceCMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
Allot Communications
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos Mitigation
Allot Communications
 
Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare
Allot Communications
 
Allot Optenet Parental Control: Solution Brief
Allot Optenet Parental Control: Solution BriefAllot Optenet Parental Control: Solution Brief
Allot Optenet Parental Control: Solution Brief
Allot Communications
 
Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)
Allot Communications
 

More from Allot Communications (11)

Securing people and things a monetization opportunity
Securing people and things a monetization opportunitySecuring people and things a monetization opportunity
Securing people and things a monetization opportunity
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...How to make virtual network services a winner rather than an integration disa...
How to make virtual network services a winner rather than an integration disa...
 
Allot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer EnagagementAllot Real Life Use Cases for Customer Enagagement
Allot Real Life Use Cases for Customer Enagagement
 
Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have? Network Security - Luxury or Must Have?
Network Security - Luxury or Must Have?
 
How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues How to Use Actionable Insights to Increase Revenues
How to Use Actionable Insights to Increase Revenues
 
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network PerformanceCMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
CMTS Channel Awareness and Congestion Mitigation - Optimize Network Performance
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos Mitigation
 
Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare Allot Cloud/Trends H2/2014 Slideshare
Allot Cloud/Trends H2/2014 Slideshare
 
Allot Optenet Parental Control: Solution Brief
Allot Optenet Parental Control: Solution BriefAllot Optenet Parental Control: Solution Brief
Allot Optenet Parental Control: Solution Brief
 
Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)Allot Content Delivery Networks (CDN)
Allot Content Delivery Networks (CDN)
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Securing the Enterprise with Application Aware Acceptable Use Policy

  • 1. Securing the Enterprise with Application-Aware Acceptable Use Policy Jay Klein – VP & CTO June 2015 Presented at Gartner Security Summit June 2015 For more info contact sales@allot.com
  • 2. Introducing Allot CloudTrends Report, Key Findings The Rising Threat of Anonymizers Application Visibility and Control Presentation Topics 2
  • 3. Allot Communications Leading global provider of intelligent broadband solutions leveraging network intelligence to analyze, protect and improve user experience
  • 4. Network Intelligence – our Core Technology 4 usage by exact application, end-user & device Determine traffic based on information layer 3 to 7 OSI model Classify permitted from forbidden use of certain applications • enabling policy enforcement at application and user layers Distinguish in detail into data contents of packets being sent through an inspection point Look security threats not visible to most network elements • spam, viruses, worms, spyware Identify
  • 6. Findings Support our Premise 6 Web security threats are indeed complex Many Threats use a combination of back-door methods and unwitting user assistance Traditional AUP is not enough Application-aware AUP is needed to complement perimeter and threat security measures
  • 7. of blocked web traffic in large enterprises is due to a well-defined Acceptable Use Policy 92% of malicious traffic from the web is caused by malware. Spywa constitutes about 8% and viruses about 1% 90% Findings: Acceptable Use Policy 7 Spyware Viruses Hackers Phishing Malware Blocked (malicious) 8% Blocked (policy) 92% AUP Blocking vs. Malicious Blocking 112014-042015 Types of Malicious Traffic 112014-042015
  • 8. Findings: IM & Social Networks 8 Facebook 54% Twitter 25% Google 8% Others 6% Soundcloud 4% Pinterest 3% Social network blocked 112014-042015 On average, enterprise users try more than 6X per day to access social networks, half of which are going to Facebook Traffic from Instant Messaging application is blocked 10X more often than overall web traffic due to malicious content
  • 9. Findings: Anonymizers 9 “Anonymized” web traffic, when discoverable, is likely to be blocked 3 times more often than overall web traffic due to malicious content Top Anonymizers Blocked 112014-042015 1,000 2,000 3,000 4,000 5,000 6,000 ModVPN book.net Zenm.com HideMyAss VPNunlimited.me TOR.me Anonymussurf.us Hide-ip.us Hideipproxy.com Hidemyip.info ipcloak.us Ipmask.us Maskip.info Unblocker.me Myipproxylist.com Hiderealip.net A1.webproxy.nic.tel Anonfiles.comels Psphone.com
  • 10. What are Anonymizers? 10 Facilitate incognito Internet access User traffic is encrypted Related IP address cannot be observed Common use cases: Privacy Bypassing Enterprise/ISP block policies (Facebook) Accessing media which is conditioned by geography (Netflix)
  • 11. 11
  • 12. An Anonymizer in Action (TOR) 12
  • 13. Anonymizers – Threats & Challenges 13 Platform for illegal activities Exploited for Cyber/Security attacks Bypassing Corporate Policy Anonymizer detection difficulties: • Anonymizers aren’t just another website to block • Related traffic resembles harmless web transactions
  • 14. Analytics: Scary Anomalies in Anonymous TOR 14 Snowden leak PirateBrowser release
  • 15. Ineffective URL & Port based Policies 15 Real Time Behavioral Analysis Questionable candidate? Possible Candidate? Classified activity New activity
  • 16. Application Awareness – Key to Efficient Security 16 Users continue to access internet applications • Regardless of corporate AUPs or Anonymizer use Application control is required for adequate real time response Personal & business lifestyles mix up with BYOD • Whenever content is accessed a vulnerability exists Application visibility is crucial for identifying underlying threats • Masqueraded as innocent traffic compliant with dictated AUPs
  • 17. Report Findings – Online Storage & File Types 17 iCloud 71% Dropbox 19% 4shared 7% Others 3% Top Online Storage site Blocked 112014-042015 Online storage: a major security hole? 30% 21% 12% 11% 7% 5% 2% 2% 1% 2% 2% 2% 2% 2% Common File Types used by malware Images – more than 20% of Malware js aspx php jpg png gif xml ico html pdf cgi json swf css
  • 18. Report Findings – Risky Services, Inappropriate Content 18 Even when Acceptable Use Policy is in place, there are numerous attempts to access “risky” applications Webmail and Instant Messaging Inappropriate Content Employees on average made 5.5 attempts to access webmail and Instant Messaging sites and were blocked per the company’s AUP. Popular sites include: Employees at large enterprises attempt to access inappropriate content 1.5 times per day on average. Types of inappropriate content were varied: • Bombs • Dating Sites • Drugs • Glamour • Hackers • Models • Pornography • Weapons • Violence • whatsapp.com • talk.google.com • skype.com • mail.google.com • hotmail.com • mail.live.com • outlook.com • mail.yahoo.com • gmail.com
  • 19. Conclusions 19 The enormous cost of inaction isn’t eliminated by deficient measures AUPs must be coupled with real-time network intelligence & application-level controls Organizations adopting such practices would benefit from a secure and more productive work environment Enforceable AUPs are key to safeguard enterprises and SMBs but aren’t sufficient to cope with current threat realities
  • 20. THANK Jay Klein CTO & VP Allot Communications Email: jklein@allot.com U www.allot.com 20