(WWW/HTTP) took the lead in the second quarter, when its attack traffic nearly doubled to 15 percent but, interestingly, was not the most targeted port among any of the top 10 countries/regions.
With so many IP ports available, this might sound a small IP profile to deal with from a security perspective, but the problem is that there are a growing number of nonstandard applications that use Port 80
across the Internet, meaning that a Web browser client must be able to support these features, he explained.
Only half of enterprises believe they are handling the port 80
problem - Approximately 56% of IT professionals surveyed think they are adequately handling port 80
security, citing Web-based viruses, unproductive Web surfing and bandwidth-intensive content as the greatest dangers to their enterprise security infrastructure.
Because many of today's P2P applications use port 80
(HTTP) to bypass firewalls and access rules, BWM further ensures stability of the network by limiting P2P bandwidth.
Of the more than 1,400 actual attacks monitored, most were aimed at port 80
, which is used for Web traffic.
A new installer package makes deployment even easier - new installation package will automatically set up SuperContainer with FileMaker Server Advanced and Apache/IIS on port 80
- eliminating custom setups for dealing with firewalls and SSL setup.
The solution is Linux-based, and offers configurable communication traversal paths to use TCP or UDP; default communication is via TCP port 80
, meaning that existing security policies can be used in most scenarios.
This relates specifically to port 80
, where more network traffic resides today.
Palo Alto Networks today announced that Sonic Solutions (NASDAQ: SNIC) has selected Palo Alto Networks' PA-4000 Series for user-based visibility and control over all port 80
The hardware and software solution can be equipped with individual security engines or in layered, all-in-one bundles, such as solutions for network access (combining firewall with intrusion detection and prevention), mail (combining firewall, SPAM and content scanning, and antivirus) and Web content (combining firewall, Port 80
control and antivirus).
Through proprietary processes and the company's WebCatcher feature--by which uncategorised Web sites accessed by customers are sent back to Websense for review--Websense is able to identify spyware servers and block employees from unknowingly sending data to them via back-channel port 80
The new communications stack allows admins to automate disk-image distribution of FontAgent Pro software to client machines across large networks, as well as the use of custom ports for tighter security control, including http-standard port 80