Web Application Security
In-Depth Application Visibility and Control
Because most Web traffic runs through port 80, it is difficult—if not impossible—for basic firewall technology to apply meaningful security policies to the expanding traffic loads. Social media sites—such as Facebook® and MySpace®—and other Web application security vulnerabilities are hosts to an increasingly broad array of multimedia services—such as chat, IM, voice and video— that appear as basic Web traffic to typical firewalls. In order to protect themselves, businesses need to implement Web application security measures to perform ongoing Web application and website monitoring.
Advanced Application Control protects the network by allowing or denying application usage based on the specific type of application running over the Web. Enterprise applications, databases, Web mail, social networking applications, IM/P2P, and file transfer protocols can all be identified accurately by sophisticated detection signatures.
Typical examples of these applications include:
|Application Categories||Descriptions||Most Common Applications|
|Instant Messaging (IM)||The IM category consists of instant messaging software and online chatting applications that can establish real-time text-based communication between two or more people over a network.||
|Peer-to-Peer (P2P)||The P2P category consists of peer–to-peer applications and associated P2P protocols that can establish a P2P network to provide fast data sharing.||
|Voice over Internet Protocol (VoIP)||The VoIP category consists of voice communication software using voice over Internet protocol technologies (SIP, H.323, etc.) that can deliver voice over a network.||
Advanced Application Control enables you to define and enforce policies for thousands of applications, regardless of the port or the protocol used for communication. Application classification and control is essential when managing the current explosion of Web-based applications.
- Allows or denies application usage based on application type
- Uses sophisticated detection signatures to correctly identify Enterprise applications, databases, Web mail, social networking applications, IM/P2P, and file transfer protocols
- Provides complete visibility into Web traffic
- Offers granular control of specific applications
- Enables appropriate use policy enforcement
- Preserves network bandwidth
MegaPath is a registered trademark of MegaPath Inc. MySpace is a registered trademark of MySpace, Inc. All other trademarks, service marks, registered trademarks, or registered service marks mentioned in this website are the property of their respective owners.