2013 CHECK POINT ANNUAL SECURITY REPORT
        
        
          03
        
        
          _ APPLICATIONS IN THE ENTERPRISE WORKSPACE
        
        
          028
        
        
          
            Different Users have Different Needs
          
        
        
          Different users in the organization have different needs, and
        
        
          the security policy should support the business, not interfere
        
        
          with it. For example, a sales person may use Facebook to stay
        
        
          in touch with customers and partners, whereas an IT staff
        
        
          member may use Facebook to get the latest industry news.
        
        
          So how do we make sure users get the access they need? Is it
        
        
          practical to expect the security manager to know what each
        
        
          user or group should or shouldn’t be accessing?
        
        
          A practical solution needs to have granular user-, group- and
        
        
          machine-awareness to easily distinguish between employees
        
        
          and others (i.e., guests and contractors).
        
        
          Another important aspect is the capability to educate and
        
        
          engage end-users real-time when they use applications.When
        
        
          a user goes to a questionable site or starts a questionable
        
        
          application, a pop up message can ask the user to justify the
        
        
          business case for doing so, his or her response is logged and
        
        
          monitored, while the message can also educate the user on
        
        
          business use policy, and make him or her aware that usage of
        
        
          such applications are being audited.
        
        
          
            ‘Understanding’ is a Critical Component of Web
          
        
        
          
            Control
          
        
        
          Administrators must have an overall view of web security
        
        
          events to ensure web control. A security solution that can
        
        
          provide clear and broad visibility into all Web Security
        
        
          events is needed. The solution should provide visibility and
        
        
          monitoring capabilities such as a timeline of events and
        
        
          a comprehensive list of these events that can be filtered,
        
        
          grouped and sorted by user, application, category, risk level,
        
        
          bandwidth usage, time and more. It is also important to be
        
        
          able to generate offline reports to show top categories, apps,
        
        
          sites and users to allow trend and capacity planning.
        
        
          
            Summary
          
        
        
          The rules of the game have changed. Securing Web 2.0 is no
        
        
          longer as simple as blocking an inappropriate URL. It is not
        
        
          just stopping an application from running. Securing Web 2.0
        
        
          requires an integrated approach of multi-layer protection:
        
        
          URL filtering, application control, malware protection
        
        
          and bot protection - all incorporating user awareness, user
        
        
          education, sophisticated monitoring and event analysis tools
        
        
          for keeping administrators in control at all times.
        
        
          
            SECURING WEB 2.0
          
        
        
          TAKES AN
        
        
          INTEGRATED APPROACH OF URL
        
        
          FILTERING, APPLICATION CONTROL,
        
        
          USER AWARENESS, USER EDUCATION
        
        
          AND A WAY OF HAVING ALL
        
        
          WEB CONTROL VISIBLE TO THE
        
        
          ADMINISTRATOR.