Allot CloudTrends Report Q2/2015: Malware can get into your network through backdoors!

With the growth of enterprise mobility and cloud migration, enterprises and SMBs are facing complex security issues. Despite being quite effective in warding off known threats, it’s the tide of unknown and backdoor threats that put organizations under pressure.

We at Allot have just published a thought-provoking report, based on real data of malicious traffic blocked in enterprises due to online risks. We collected data from several large Enterprises as well as Communication Service Providers (CSPs) that provide security services to Enterprises and SMBs. Our findings, based on online access attempts in hundreds of businesses, show that even organizations that have a well-communicated and enforceable Acceptable Use Policy (AUP) in place, still need it to be granular and specific. Mere filtering of online threats is just not enough!

Let’s have a look at some of our key findings:

  • 92% of blocked web traffic in large enterprises is due to a well-defined Acceptable Use Policy. This is in contrast to popular belief that detected malicious traffic is the main cause for blocking.
  • If we look at crime ware, we see that malware counted for 90% of malicious traffic being blocked. Only 8% of the blocked traffic was due to spyware and about 1% due to viruses.

Graph-AUP vs Malicious Blocking

  • We found that enterprises also have Anonymizer traffic in their networks, though they may not even be aware of it. An Anonymizer is a proxy that hides a user’s real IP address such as a company’s IP address from the Internet. “Anonymized” web traffic is blocked 3 times more often than overall web traffic due to malicious content, clearly a significant security threat.

Graph-Top Anonymizers Blocked

It is clear that all organizations, regardless of nature and size, are facing significant online threats, and that these in many cases enter through backdoors. Having a comprehensive and enforceable Acceptable Use Policy in place is a must, and it should include real-time network intelligence and application-level controls. It’s the optimal way for enterprises to detect existing, and prevent future, security breaches. Once those measures are in place, the enterprise will enjoy a secure and more productive work environment. Furthermore, the use of cloud applications and resources (such as cloud storage) will be far more effective. By embracing an Application-aware Acceptable Use Policy and controls, organizations can better guard against online threats.

To learn more, download our Allot CloudTrends Report Q2/2015 here.

For the full infographic, click here.


Office 365: Maximize Your Business Productivity & Security
Notes from RSA APAC and Japan – what an event it was

Leave a Comment

Your email address will not be published. Required fields are marked *