Medindia

X

Research Shows Highly Regulated Industries Have No Control Over Social Networking Applications and Risks

Wednesday, March 31, 2010 General News J E 4
Advertisement
SUNNYVALE, Calif., March 30 The intensity of Enterprise 2.0 application usage is on the rise globally - especially in the most highly regulated industries, according to the latest study conducted by Palo Alto Networks(TM), the network security company. While social media is pervasive in organizations worldwide, usage has far outpaced controls. The degree of associated risk varies dramatically across industries and geographies, depending upon factors such as regulations and cybercrime. IT professionals must consider the heterogeneity of risk in their application usage policies, compliance needs and security profiles.

Available today, the Application Usage and Risk Report (5th Edition, Spring 2010) from Palo Alto Networks is a semi-annual study that assesses real-world application traffic in hundreds of organizations worldwide. This edition of the report shows that barriers to accessing applications are at an all-time low, accelerating the adoption of applications regardless of geography or vertical industry. While financial services and healthcare workers increasingly rely on social media for business collaboration, they often ignore the associated risks such as non-compliance, data loss and threat propagation. These risks can jeopardize the company's network as well as the integrity of the entire business operation.

For example, the report showed that 94 percent of the healthcare and financial services organizations included in the study use an average of 28 social networking applications, including Facebook, Twitter and LinkedIn. Both industries have regulations (such as HIPAA and FINRA) that require organizations to control and monitor information flow across social networking applications in order to protect the confidential data they manage. However, because social networking apps use port 80 or port 443, all traffic appears to be browser-based traffic. This lack of visibility into social networking traffic could be a violation, or lead to violations, of compliance with industry rules and regulations.

As a result, many IT managers are faced with the daunting task of banning social media applications altogether. But is this really feasible?

"IT managers cannot simply block Enterprise 2.0 applications since they deliver clear business value. Nor can they simply allow these apps to run amok on their networks. IT needs to safely enable Enterprise 2.0," said Rene Bonvanie, vice president of worldwide marketing at Palo Alto Networks. "By defining and enforcing policies that safely enable these apps, IT can enhance business productivity while mitigating security risks and compliance violations."

Other findings from the report include:

Information on the more than 950 applications that are identified by Palo Alto Networks can be found in Applipedia, part of the company's Application and Threat Research Center. Visit the online resource to find the latest news, commentary, and discoveries on applications and threats at http://www.paloaltonetworks.com/researchcenter/.

About Palo Alto Networks

Palo Alto Networks(TM) is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content - by user, not just IP address - at up to 10Gbps with no performance degradation. Based on patent-pending App-ID(TM) technology, Palo Alto Networks firewalls accurately identify and control applications - regardless of port, protocol, evasive tactic or SSL encryption - and scan content to stop threats and prevent data leakage. Enterprises can for the first time embrace Web 2.0 and maintain complete visibility and control, while significantly reducing total cost of ownership through device consolidation. For more information, please visit http://www.paloaltonetworks.com.

Palo Alto Networks, "The Network Security Company," the Palo Alto Networks Logo and App-ID are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

-- Of the 41 different email applications found, 26 browser-based variants were detected in both healthcare and financial services industries, consuming 220 GB and 152 GB respectively. Widespread use of webmail portends a variety of business and security risks, from compliance violations and data leakage to malware propagation. -- Two-thirds of the 750 applications tracked, even client server and peer-to-peer (P2P) applications, can pass as Web traffic by hopping ports, using port 80, or hiding within SSL. This debunks the myth that ports 80 and 443 are reserved for browser-based traffic only. If P2P file sharing applications look like Web traffic, then they are difficult to detect and control. This dramatically increases the risk of inadvertent data leakage. -- Use of browser-based file sharing applications consumes 399 GB of bandwidth in financial services organizations, and 143 GB in healthcare firms. The one-to-one delivery nature of these applications minimizes the risk of inadvertent data loss or leakage, but does not prevent the purposeful movement of confidential data unless strict policy controls are in place. -- The bandwidth consumed by social networking applications doubled in the last 18 months to 9GB per organization.

SOURCE Palo Alto Networks
Advertisement


Advertisement

You May Also Like

Advertisement
View All

Post your Comments

Comments should be on the topic and should not be abusive. The editorial team reserves the right to review and moderate the comments posted on the site.
User Avatar
* Your comment can be maximum of 2500 characters
I agree to the terms and conditions
s
Sanofi Pasteur Chooses Intercim for Mastering Manu...
S
Wellesse(R) Liquid Vitamin D Recommended in 'The V...