Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Applications Are Evolving, So Too Must Application Control

Employees are increasingly turning to web-based or web-enabled applications to help get their jobs done. To combat the risks associated with these applications, one of the most significant evolutions in network security over the last few years has been the advent of application control. This technology gives administrators visibility and control over each application that is allowed to communicate on the network.

Employees are increasingly turning to web-based or web-enabled applications to help get their jobs done. To combat the risks associated with these applications, one of the most significant evolutions in network security over the last few years has been the advent of application control. This technology gives administrators visibility and control over each application that is allowed to communicate on the network.

Historically, administrators controlled applications through the firewall, setting policies based on the source and destination IP addresses, ports and protocol. Since each application had its own port, this was a fine way to control which applications were and were not allowed on the network.

Controlling Web Applications for UsersBut applications and threats have changed dramatically and this static approach to application control is now inadequate. A “Global Survey on Social Media Risks” released by the Ponemon Institute in September 2011 found that more than 50 percent of the 4,640 respondents in 12 countries report an increase in malware due to social media use in the workplace, yet only 29 percent report having the necessary security controls in place to mitigate it.

Applications are no longer identified solely by IP address, port or protocol. Many of today’s applications, such as video streaming, peer-to-peer (P2P) file sharing or instant messaging (IM), are designed to work over multiple ports which increases chances they won’t be blocked by firewalls. Configuring defenses to traditional ports is no longer an effective means of managing application usage.

Related White Paper: The Five Key Benefits of Application Control & How to Achieve Them

With this new reality, the time has come to evolve your application control strategy. In so doing you’ll be able to achieve a host of benefits including:

Gain visibility, protection and control of applications, regardless of port or protocol. Today’s applications are evasive and ‘firewall aware.’ Being able to analyze and control applications regardless of their trickery is critical.

Reduce Bring-Your-Own-Device (BYOD) risk through enforcement of mobile applications. Controlling the applications used on devices owned by employees or partners may not be possible. However, you can control which applications can access your corporate network and which corporate resources are available to the BYOD user.

Limit the exposure created by social media applications. Social media introduces new inbound and outbound security threats. In both instances policies that block or constrain social media, for example ‘view but do not execute files or send information,’ can help prevent malicious executable files from entering and compromising the IT environment, and keep sensitive information from exiting.

Advertisement. Scroll to continue reading.

Reduce attack surface and inspection requirements. By limiting the number and types of applications that are allowed to communicate on the network, administrators can reduce the number of vectors that attackers could use to access sensitive information and can block advanced malware attempting to communicate covertly.

Reclaim bandwidth from streaming/sharing applications. Identifying and stopping the use of low business-relevant applications, such as P2P file sharing and music and video streaming, can help administrators not only increase security, but also reclaim wasted bandwidth and even increase employee productivity.

To keep pace with today’s changing environment, application control solutions are evolving to give organizations greater visibility, protection, control and choice of deployment. When evaluating solutions, consider asking IT security vendors the following questions:

1. What are my deployment options? Application control has come primarily with Next-Generation Firewalls (NGFWs), Next-Generation Intrusion Prevention Systems (NGIPSs) or other Web security gateway. Particularly for large enterprises with many firewalls and those who have not reached the end of their firewall lifecycle, ripping and replacing the existing firewall infrastructure is infeasible. Considering that application control is essentially an inspection function, in these cases deploying application control as part of the NGIPS infrastructure can be more efficient and cost-effective.

2. Can the solution inspect applications? Picking up on the last point, many applications are essential to facilitate network communications and, therefore, must be deeply inspected for threats. Integration with advanced intrusion prevention capabilities is increasingly important.

3. How does the solution handle encrypted applications? An increasing number of applications leverage Secure Sockets Layer (SSL) encryption for privacy. Overall, this is a good security practice; although it poses some unique challenges for security technologies. The ability to decrypt, inspect and re-encrypt traffic is essential to gain visibility and control over applications.

4. Does the solution support URL filtering? While URL filtering alone is not a substitute for application control, it can provide an important additional layer of security, reduce legal exposure and improve business productivity. Because so many applications are web-based, look for solutions that integrate URL filtering seamlessly alongside application control.

5. How granularly can I control policies? Application control and URL policy enforcement must be flexible and granular to be relevant. Heavy-handed approaches that simply block access can stymie business productivity. Granular control can enable business-relevant access by department, group, user, network location, etc.

6. How easy is the solution to manage? With thousands of applications and potentially hundreds of control policies that will initially change frequently per application, if not per user or user group, administrators must be able to quickly search applications and create and change policies easily.

Applications are key targeted points of entry for hackers. Evading traditional defenses, attackers are taking advantage of the sheer volume of applications, the BYOD trend, social media, and other opportunities to glean information and penetrate networks. Improving network security through better application control is critical. With limited resources and increased pressure to reduce attack vectors, the time has come to take a fresh look at the application control solution landscape.

Related White Paper: The Five Key Benefits of Application Control & How to Achieve Them

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...