What Is an Application Visibility and Risk (AVR) Report?

https://i0.wp.com/blog.ens-az.com/image.axdMany of you have been asking about our Application Visibility and Risk (AVR) Reports. In this article we’ll cover what they are, how they work, why they’re important and how to get one of your own.In the past, it was easy for firewalls to control applications because traffic could easily be classified based on ports and protocols using stateful inspection technology. But today’s modern Internet applications are no longer tied to specific ports or protocols, and often use encrypted SSL tunnels or other tactics to avoid detection. These applications bypass traditional firewalls with ease, resulting in increased business risks.

Find Out What Applications And Threats Are On Your Network

Let Namtek provide you with a 1-day evaluation of a Palo Alto Networks™ next-generation firewall. In a few hours you will see analysis of all application traffic on your network, the capacity impact of these applications, and the relative security risks observed. Additionally, we can enable our new Wildfire™ Anti-Malware solution to analyze the executables entering your network and determine if they are infected with malware and which applications are transporting them.

Non-obtrusive: No change control or downtime required for evaluation.
Complete perspective: Analyze traffic behind your existing security devices.

How It Works
We will visit your office in the AM and set up the device to passively inspect your traffic. We will return around noon—with lunch in hand for you and your colleagues. Over lunch we can review the findings with you and leave you with a complete Application Visibility and Risk Report (AVR).

We just need 2 things to run the evaluation:

  1. A SPAN port on your network that mirrors the inside interface of your perimeter firewall.
  2. An IP address on your network to allow us to communicate to a Palo Alto Networks device.

Visibility You Will Receive

  • Top Applications and High Risk processes on your network
  • Applications that can use HTTP / Port 80 to communicate
  • Top URL destination categories being visited by your employees
  • Geographic distribution of your internet traffic—both inbound and outbound—sorted by country
  •  Use of non-standard ports by any application—FTP, SSH, RDP, Telnet, etc.
  • Top Exploits and Malware—Intrusions, Virus, Spyware, Botnets, etc.
  • Top Attackers and Top Victims
  • Sensitive data leaving your network
  • Top File Types being transmitted on your network

We’re certain this exercise will provide you a perspective on your network that you have never seen before!

Contact us Today to schedule.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of the author. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided "as-is". The author shall not be liable for any damages whatsoever arising out of the content or use of this blog.
%d bloggers like this: