sponsored by Palo Alto Networks
Posted:  24 Jan 2014
Published:  21 Mar 2014
Format:  PDF
Length:  5  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

With so many varying devices being used for business, do you truly know all of the applications that are passing through your networks, and if they’re even safe?

In this white paper, discover a firewall traffic classification solution that uses 4 technologies to identify every single application traversing the network: Port, protocol, evasive tactic, and SSL transcription. Read on to learn how you can better equip your team with the knowledge they need to pinpoint potential risk factors and enforce more secure application enablement policies. Featured topics include:

  • The technology behind firewall traffic classification
  • Application identity: The heart of policy control
  • Application function control
  • And much more.





BROWSE RELATED RESOURCES
Firewall Appliances | Network Appliances | Network Architectures | Network Infrastructure | Network Management | Network Managers | Network Monitoring | Network Security | Network Security Appliances | Network Security Hardware | Network Traffic Analysis | Risk Management | Security | Security Management | Security Managers | Security Policies | Security Systems | Security Threats

View All Resources sponsored by Palo Alto Networks

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement