The volume of unexpected and dangerous applets, microbes, content, and attacks that use port 80
as an expressway into the enterprise speaks to the problem that Blue Coat is solving for companies.
Our existing security infrastructure was completely blind to what was tunneling over port 80
," said Roger Blakely, Vice President of Information Security for Sonic Solutions.
The types of sites and applications needing this special treatment ranged from external websites with specific incompatibilities to commonly used protocols like Real Media streaming over TCP/IP port 80
, which was often incompatible with proxy authentication.
6 are a new image-based spam engine, multi-LDAP support, verification of port 80
(to confirm the system is communicating with PineApp's center), the ability to automatically add users to white lists when sending them mail from within the organization, and an improved recovery mechanism.
To a Layer 4 load-balancing device, for instance, Web applications are indistinguishable from HTTP traffic because the applications appear to be using TCP port 80
, the typical TCP port for HTTP traffic.
Enterprises are frustrated with their traditional perimeter firewalls, because firewall ports increasingly are opened up to allow business traffic, particularly over Port 80
," Network World explained.
The certification means that Check Point customers can now take full advantage of ScanSafe's security services by simply redirecting all Port 80
traffic for real-time malware scanning and enforcement of policy," said Dan Nadir, vice president, product strategy, ScanSafe.
This really posed a problem since we began to see traffic masquerading as a Port 80
application which could not be effectively detected.
The Genesys VoIP Softphone can utilize HTTP over port 80
, the default port for most Internet traffic, and easily bypass customer firewalls.
What is needed is a basic port 80
front-line defense for Web Services -- easy, basic, high-performance, and universally deployable.
NASDAQ:BCSI), formerly Cacheflow Inc, is a Web security company that delivers security appliances designed to combat the increasing number of Web-based threats targeting port 80
"holes" in the enterprise security infrastructure.
We've seen a huge increase in serious application attacks targeting port 80
," says Tim Goodwin, Vice President of F5 Japan.