2013 CHECK POINT ANNUAL SECURITY REPORT
03
_ APPLICATIONS IN THE ENTERPRISE WORKSPACE
028
Different Users have Different Needs
Different users in the organization have different needs, and
the security policy should support the business, not interfere
with it. For example, a sales person may use Facebook to stay
in touch with customers and partners, whereas an IT staff
member may use Facebook to get the latest industry news.
So how do we make sure users get the access they need? Is it
practical to expect the security manager to know what each
user or group should or shouldn’t be accessing?
A practical solution needs to have granular user-, group- and
machine-awareness to easily distinguish between employees
and others (i.e., guests and contractors).
Another important aspect is the capability to educate and
engage end-users real-time when they use applications.When
a user goes to a questionable site or starts a questionable
application, a pop up message can ask the user to justify the
business case for doing so, his or her response is logged and
monitored, while the message can also educate the user on
business use policy, and make him or her aware that usage of
such applications are being audited.
‘Understanding’ is a Critical Component of Web
Control
Administrators must have an overall view of web security
events to ensure web control. A security solution that can
provide clear and broad visibility into all Web Security
events is needed. The solution should provide visibility and
monitoring capabilities such as a timeline of events and
a comprehensive list of these events that can be filtered,
grouped and sorted by user, application, category, risk level,
bandwidth usage, time and more. It is also important to be
able to generate offline reports to show top categories, apps,
sites and users to allow trend and capacity planning.
Summary
The rules of the game have changed. Securing Web 2.0 is no
longer as simple as blocking an inappropriate URL. It is not
just stopping an application from running. Securing Web 2.0
requires an integrated approach of multi-layer protection:
URL filtering, application control, malware protection
and bot protection - all incorporating user awareness, user
education, sophisticated monitoring and event analysis tools
for keeping administrators in control at all times.
SECURING WEB 2.0
TAKES AN
INTEGRATED APPROACH OF URL
FILTERING, APPLICATION CONTROL,
USER AWARENESS, USER EDUCATION
AND A WAY OF HAVING ALL
WEB CONTROL VISIBLE TO THE
ADMINISTRATOR.
1...,17,18,19,20,21,22,23,24,25,26 28,29,30,31,32,33,34,35,36,37,...50