INSTANT MESSAGING SECURITY
|
|
|
- Lenard Barker
- 10 years ago
- Views:
Transcription
1 INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express permission of the Government of the HKSAR. Disclaimer: Whilst the Government endeavours to ensure the accuracy of the information in this paper, no express or implied warranty is given by the Government as to the accuracy of the information. The Government of HKSAR accepts no liability for any error or omission arising from or related to the use of the information.
2 TABLE OF CONTENTS Summary... 2 I. What is Instant Messaging?... 3 Usage Trends of IM in Business... 4 II. Potential Threats... 5 III. Considerations When Choosing an enterprise IM Solution... 7 IV. Best Practices... 8 Tips for Enterprise Users... 8 Tips for End-Users Instant Messaging Security Page 1 of 10
3 SUMMARY Instant messaging (IM) is a fast growing communications medium popular with both home and corporate users. Though IM is an effective and easy means of networkbased communication, it introduces a number of security risks if proper security measures are not applied. This paper discusses the security risks associated with using this popular communication channel, and provides a set of best practices that can be implemented when deploying the technology in a business environment. Instant Messaging Security Page 2 of 10
4 I. WHAT IS INSTANT MESSAGING? Instant Messaging (IM) is a form of electronic communication enabling ad hoc and live collaboration through sending and receiving messages almost instantaneously across a network connection 1. With the introduction of messaging tools such as ICQ 2 and MSN Messenger 3, more and more people are enjoying the convenience and ease provided by real-time messaging systems in their day-to-day life. IM has also found a place in business, for services such as communicating with customers and partners, offering customer support, receiving real-time alerts, as well as management and project coordination. IM tools support any process where quick response and rapid problem solving are needed, and where faster communication than s or telephones is useful. In general, the user needs to download and install an IM client on his or her client device (which can be a desktop computer, smartphone or PDA) and set up a user account before he or she can communicate. An IM server acts as a database where contact points are located. For public IM services such as ICQ and MSN Messenger, the servers are hosted on the Internet. For corporate IM systems, IM servers might be hosted within the organisation s internal network Instant Messaging Security Page 3 of 10
5 USAGE TRENDS OF IM IN BUSINESS According to an instant messaging trend survey conducted in , IM is not only popular with home users, but is also increasingly common in the workplace. More than 27 percent of those surveyed responded that they used instant messaging at work. About 19 percent of IM users indicated that they sent more instant messages than s to co-workers and colleagues, whereas 55 percent of teenagers now get help with their homework through IM. In addition, half of the at-work IM users said they believed IM makes them more productive at work. However, nearly 79 percent of workers using IM in the office indicated that they have used IM for personal matters. 4 Instant Messaging Security Page 4 of 10
6 II. POTENTIAL THREATS Public IM services are rapidly becoming an alternative channel for the spread of viruses and malicious code. Common public IM services usually lack native encryption to protect information being transmitted, and they also allow bypassing of corporate content inspection filters. Furthermore, the lack of a comprehensive audit trail might not meet certain security or regulatory compliance requirements. The following are potential threats when using IM services: 1. A Vehicle for the Spread of Malicious Code Enterprise use of IM is growing in both volume and importance. IM users report that they can benefit from a faster decision-making process, higher productivity and lower telecommunication costs. Concurrently, IM threats (typically viruses), are rapidly gaining attention as attackers begin to shift their focus from better-protected systems to IM networks. Spam messages can also be spread via IM. The spam that a user receives via an Instant Messaging Services is referred to as spim IM software Vulnerabilities Just like any other software application, popular IM clients have a history of common security vulnerabilities. Installing an IM client may introduce new vulnerabilities to a computer system. 3. Leakage of Sensitive Information Confidentiality is a major concern when using a public IM service for communication. In public IM networks, messages exchanged between users are often routed through IM server farms controlled by the service providers themselves. If client IM software has a peer-to-peer capability, users can communicate with each other without passing through IM servers. No matter 5 Instant Messaging Security Page 5 of 10
7 which mode is being used, IM traffic is vulnerable to eavesdropping because most public IM clients do not possess any encryption capability. Therefore, it is possible that sensitive information can be read or sniffed by unauthorised users. The situation can be even worse when public IM services are used to communicate with individuals outside an organisation. The protocols used by public IM services are often considered rogue protocols, because they are specifically designed to evade standard security controls. Not only can IM clients be configured to connect through SOCKS or web proxy servers, but the protocol is also capable of finding its way out through the firewall on its own by looking for an open port, such as TCP port 80, or by tunnelling its traffic inside HTTP requests, making it unrecognisable from standard web traffic. The scripting and file transfer capabilities of IM systems might also expose an organisation to leaks of sensitive information. Therefore, organisations should establish proper policies and controls on the use of IM. 4. Monitoring and Retention Headaches Monitoring IM messages and retaining messages for business records is no easy task. Deciding which instant messages need to be logged and recorded is probably more difficult in the IM environment because an entire thread of messages is needed to provide meaningful context for a particular message. 5. Accountability In a public IM network, the identities of IM senders and receivers cannot be verified. Public IM accounts are vulnerable to hijacking or spoofing, allowing an intruder to impersonate a conversation with legitimate users. Instant Messaging Security Page 6 of 10
8 III. CONSIDERATIONS WHEN CHOOSING AN ENTERPRISE IM SOLUTION There are now a number of enterprise IM solutions available in the market that give organisations the ability to build and manage their own internal IM service. The following security features should be considered when choosing an enterprise IM (EIM) solution 6 : 1. Authentication Controls: Any enterprise IM solution should integrate with the company s existing authentication mechanisms, such as interfacing with a Microsoft Active Directory. 2. Confidentiality Controls: Because sensitive information such as budget or sales volume data might be transmitted within an enterprise IM system, EIM products should provide strong encryption to protect all messages travelling within company networks. 3. Anti-virus Controls: An EIM product should offer close integration with an anti-virus solution, so as to ensure that all files transferred over EIM channels are virus free. 4. Logging / Auditing Controls: All communication within the organisation might need to be logged to ensure employees aren t abusing the service, or to satisfy certain regulatory requirements. The selected EIM product should also meet the organisation s logging requirements. In addition, the organisation needs to define an acceptable IM usage and privacy policy, and communicate to all employees the risks of using IM in business. If IM communications are to be logged and monitored by the company, this policy should also be clearly disseminated to employees. 6 Instant Messaging Security Page 7 of 10
9 IV. BEST PRACTICES TIPS FOR ENTERPRISE USERS Given that there are a number of potential security risks in deploying an IM system, the use of instant messaging should be restricted to business purposes only, and prior approval should be obtained before any system (public or private) is deployed. If an organisation decides to use an IM system, the following security controls should be implemented: 1. Observe all Security Procedures As the rule of thumb, all relevant security requirements [including the Security Regulations, Baseline IT Security Policy and IT security Guidelines (the blanketed text is for ITGInfoStation version only] should be observed when using IM. 2. Develop an IM Usage Policy and Clearly Disseminate to all Users of IM An IM usage policy should clearly state whether the use of IM is acceptable within the organisation and, if it is, what the restrictions are. The IM usage policy should be technology and product neutral. Messages generated via IM should be regarded as business records, irrespective of whether they are generated on a public system or on an internal enterprise system. If the use of IM is for business purposes, an internal retention policy or external regulations should be followed. 3. Implement IM Hygiene Solutions IM hygiene solutions are a collection of services that allow organisations to enforce IM usage policies by monitoring usage, managing IM traffic and filtering content to block unwanted messages, computer viruses and offensive materials, as well as logging all IM messages for audit purposes. 4. Educate Users on the Best Use of IM and Strengthen Desktop Protection Instant Messaging Security Page 8 of 10
10 One of the major threats posed by IM in the corporate network is IM-based malicious code attacks. IM viruses are usually transmitted either as executable file attachments or as hyperlinks in IM text, directing victims to malicious web servers. In most cases, these viruses are not automatically executed. Rather, they exploit social engineering tactics to convince victims to open unknown files or click on suspicious links. Dedicated IM hygiene products are one solution for protecting and managing IM usage. By filtering active hyperlinks as well as all file attachments, these products can effectively eliminate a large portion of the attack vectors used by IM viruses. Desktop anti-virus products can also help detect most of these threats. Training end-users to be more sceptical about incoming instant messages, even those from their own buddy lists, should also be part of an overall strategy. The usual precautions of quickly patching software vulnerabilities, running anti-virus software and personal firewalls are all effective against IM threats. In view of the above, user education and desktop protection should be taken into account when planning the deployment of IM in the enterprise. 5. Implement an Enterprise IM (EIM) Solution Instead of Using Public IM Clients If IM services are required for business purposes, organisations should explore the possibility of deploying their own Enterprise IM architecture within the network environment. This will allow comprehensive monitoring and storage of data, and help provide reassurances regarding internal user identities. In addition, a closed system can still be made available to key customers and vendors on the outside, but all external IM should go through a gateway where it can be monitored and managed. Enterprise IM solutions provide organisations with their own clients and servers that have built-in enterprise security features including blocking, logging, auditing, monitoring, routing and encryption. 6. IM Client Protection Instant Messaging Security Page 9 of 10
11 Users should disable all network services provided by the IM service, enable all notifications when incoming messages/calls/files are received, disable sharing of resources, and disable remote activation of microphones and video cameras. TIPS FOR END-USERS The following tips are designed for end-users using IM as regular communication tool 7 : 1. Do not set your IM client to automatically accept file transfers. If you do, you place yourself at very high risk of automatically accepting virus-infected files unknowingly. 2. Before opening any file received via IM, you should verify with the sender that he or she did actually send that file to you. In addition, make sure the file has been scanned by anti-virus software before opening it. 3. Never click URL links within an IM that is sent from untrusted / unknown contacts. There have been reports of viruses being spread by users clicking on an IM URL Never send personal or sensitive information by IM. Even if there are compelling reasons to do so, ensure sensitive information is encrypted. 5. Keep your IM software (and other system components) up-to-date with the latest patches, enable personal firewall protection, and install anti-virus software with the latest virus signatures, and malicious code definitions, as well as detection and repair engines Instant Messaging Security Page 10 of 10
PEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
AN OVERVIEW OF VULNERABILITY SCANNERS
AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole
SHORT MESSAGE SERVICE SECURITY
SHORT MESSAGE SERVICE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
MUNICIPAL WIRELESS NETWORK
MUNICIPAL WIRELESS NETWORK May 2009 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
IT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
WEB 2.0 AND SECURITY
WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Inspection of Encrypted HTTPS Traffic
Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
OPEN SOURCE SECURITY
OPEN SOURCE SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Best Practices for Controlling Skype within the Enterprise > White Paper
> White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
White Paper Instant Messaging (IM) HIPAA Compliance
White Paper Instant Messaging (IM) HIPAA Compliance - 1 - Statement of Purpose This document is focused on providing health care companies, and all others bound by HIPAA regulations, with an eye opening
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES
FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
REPORT & ENFORCE POLICY
App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Uncover security risks on your enterprise network
Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)
Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Seven for 7: Best practices for implementing Windows 7
Seven for 7: Best practices for implementing Windows 7 The early reports are in, and it s clear that Microsoft s Windows 7 is off to a fast start thanks in part to Microsoft s liberal Windows 7 beta program
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
WEB APPLICATION SECURITY
WEB APPLICATION SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Stopping secure Web traffic from bypassing your content filter. BLACK BOX
Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
AccessEnforcer. HTTPS web filter overview
AccessEnforcer HTTPS web filter overview A web filter is essential to keeping hazards and distractions away from businesses. To stay safe, productive, and compliant, every organization must block certain
App-ID. PALO ALTO NETWORKS: App-ID Technology Brief
App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
In-House Vs. Hosted Email Security. 10 Reasons Why Your Email is More Secure in a Hosted Environment
In-House Vs. Hosted Email Security 10 Reasons Why Your Email is More Secure in a Hosted Environment Introduction Software as a Service (SaaS) has quickly become the standard delivery model for critical
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Cisco ASA 5500 Series Business Edition
Cisco ASA 5500 Series Business Edition Cisco ASA 5500 Series Business Edition Provides an All-in-One Security Solution The Cisco ASA 5500 Series Business Edition is an enterprise-strength comprehensive
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM ENTERPRISES
SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM ENTERPRISES Security threats are becoming increasingly sophisticated and harder to detect. Many small and medium-sized enterprises are still convinced that
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
