HTTP proxy, used both as a security component and to evade controls, exhibited the 7th highest volume of malware logs.
René Bonvanie, chief marketing officer at Palo Alto Networks, said: “Correlating threats with specific applications allows security teams to directly see and control risks in their networks.”
Matt Keil, senior research analyst at Palo Alto Networks and author of the report said:”The volume of exploits targeting business critical applications was stunning and serves as a data centre security wake-up call. These threats will continue to afflict organisations until they isolate and protect their business applications by bringing threat prevention deeper into the network.”
Custom or unknown applications are defined as either TCP or UDP based applications that are custom (internal to the organization), unrecognised commercially available, or a threat.
Link: http://www.iwr.co.uk/information-management-and-technology/3011498/Fresh-evidence-on-IT-security-threat