According to Gartner, through 2023, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.
NEXT QUESTIONAll of the above.
To effectively address data compromise with a firewall solution, organizations should:
Simplifying security means fewer security tools and firewall technologies, not more. To simplify your security, you need a firewall platform that offers:
True. North-south traffic refers to the traffic passing between the private corporate network and the public internet.
NEXT QUESTIONFalse. East-west traffic refers to traffic between systems and applications inside the data center.
NEXT QUESTIONFalse. Remote access tools can be both good and bad. They’re valuable productivity tools for IT administrators and support technicians, but also prone to being exploited by attackers in order to control systems. Although many are clearly good (low risk, high reward), and others are clearly bad (high risk, low reward), most are somewhere in between. Moreover, applications can vary from one scenario to the next and from user to user or from session to session.
More than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications as opposed to weaknesses in networking components and services. Together with the implicit trust that users place in their applications, all these factors combine to create a “perfect storm” for attackers.
NEXT QUESTIONEncryption is increasingly used to secure not just sensitive or private information, but practically all traffic traversing enterprise networks. According to 2019 Google findings on encrypted traffic, 87% of browsing time is spent on pages that use HTTPS, and 70% of pages are loaded on HTTPS. Organizations are essentially left blind to any security threats contained inside encrypted traffic. Attackers exploit this lack of visibility and identification to hide within encrypted traffic and spread malware. Even legitimate websites that use encryption can be infected with malware.
According to Forrester Research, at least 80% of data breaches today involve compromised privileged credentials. Credential theft has become so prevalent in attackers’ playbooks that it’s often said attackers no longer hack into target networks; they simply log in. The primary techniques that attackers use to steal credentials include social engineering, credential phishing and spam, and reusing stolen passwords or shared credentials.
URL filtering is a tool used to classify content. An integrated, on-box URL database allows administrators to monitor and control web surfing activities of employees and guest users. Used with user identification, web usage policies can be set on a per-user basis, further safeguarding the enterprise from security risks.
Zero Trust is a strategy designed around the concept that users, applications and data should never be trusted - that their actions should always be verified in an environment. The primary goal of the Zero Trust model is to eliminate inherent trust in a system and prevent attackers from exploiting vulnerabilities hidden in trusted applications. The approach involves limiting the scope of an attack and blocking lateral movement by taking advantage of microsegmentation based on users, data and location.
© 2020 Palo Alto Networks, Inc. All rights reserved.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.