by Joerg Sieber
Most companies have it deployed somewhere in their networks. It is most often thought off as a productivity tool to stop employees from wasting time with social media, shopping, porn, gambling, or many other sites during working hours: URL Filtering.
URL filtering certainly has other benefits; it can stop employees from stumbling across known malware sites. Unfortunately, in today’s world of advanced threats, URL filtering has received a reputation for being outdated technology that cannot adequately protect against modern attacks. But is that really the case?
Truth be told, when deployed independent of other security technology, URL Filtering can not protect a company against modern, persistent attacks. But when deployed in combination with the right complementary technology, URL filtering becomes a crucial component of today’s security architecture. How URL filtering is deployed is the key difference.
At Palo Alto Networks we have combined URL Filtering with our Application Identification (App-ID) and our user identification capabilities. Together these technologies are part of the next generation security platform, along with many more capabilities I invite you to review. URL Filtering in combination with App-ID can protect against a full spectrum of legal, regulatory, productivity, and resource utilization risks. While App-ID provides control over what applications employees can access, URL filtering provides control over related web activity. When combined with user identification, you can also apply these controls based on users and groups.
Here is just one example of the benefits of this technology combination: You can control access to Facebook or LinkedIn using URL filtering, but on its own URL filtering cannot block the use of all related applications, such as email, chat or other new applications introduced after you implemented your policy. App-ID fulfills that functionality in great granularity by identifying each app and applying it to your policies. Content ID, another part of the next generation security platform then looks at the content within applications and documents to find possible threats.
It is easy to see how URL filtering natively built into a next generation security platform can play a crucial part in today’s security environment far beyond a stand-alone URL filtering deployment. And the best thing about it is, you no longer require a third party, stand-alone URL filtering solution.
Read more about how Palo Alto Networks URL Filtering integrates into the next generation security platform and how it eliminates the need for a stand-alone URL Filtering solution: https://www.paloaltonetworks.com/products/features/url-filtering.html
How have you used URL filtering effectively? Where have you gotten creative? Share your thoughts and experience in the Fuel Discussion Forums.