Improve Network Policy Management by Filtering Traffic Based on Application Operations

Network policy management and enforcement depends on gathering intelligence and exerting control across a variety of dimensions. In the industry today, the policy management de facto standard spans four dimensions. These include threats, content, applications, and identity. In this blog post we will talk about applications. Enabling network policy management [...]

2021-04-28T15:00:49-06:00April 28th, 2021|Solutions, Technical Brief|

The URL and Web App Safety

Many attacks on web-based applications rely on the attacker's ability to feed programs unexpected input from parameters that are very often passed in the URL string. The first line of defense is having well-written web applications that validate inputs and protect themselves against attack; that's pretty obvious. If you are [...]

2020-07-01T20:09:17-06:00January 14th, 2014|Solutions|
Go to Top