{"id":24522,"date":"2017-02-22T13:00:21","date_gmt":"2017-02-22T21:00:21","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=24522"},"modified":"2017-02-22T11:36:29","modified_gmt":"2017-02-22T19:36:29","slug":"pan-os-8-0-cover-saas-securing-applications","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2017\/02\/pan-os-8-0-cover-saas-securing-applications\/","title":{"rendered":"PAN-OS 8.0: Cover Your SaaS By Securing Your Applications"},"content":{"rendered":"<p>The adoption of software-as-a-service (SaaS) applications in the enterprise continues to rapidly accelerate, given the collaboration and productivity benefits. However, ungoverned use of SaaS creates new risks for data misuse and information leakage that must be addressed. The fact remains that it\u2019s very difficult to gain visibility into and control over SaaS applications with a traditional security implementation composed of layered, \u201cbolted-on\u201d point products.<\/p>\n<h3><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Cover_saas_1.png\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-24525 alignright lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Cover_saas_1.png\" alt=\"cover_saas_1\" width=\"500\" height=\"285\" \/><\/a>The Overlay Approach Is Insufficient<\/h3>\n<p>In a bolt-on approach, enterprises keep adding products, one on top of another, just to get insight into the traffic that has been moved to or deployed in SaaS applications in the cloud. Some of those moves include:<\/p>\n<ul>\n<li>Placing a proxy in the cloud (e.g., forward proxy or reverse proxy)<\/li>\n<li>Deploying a device on premises, perhaps a log forwarder, to gain some basic, limited visibility from the existing firewall<\/li>\n<li>Using a traffic forwarder to redirect traffic to the cloud<\/li>\n<li>Adding an active directory (AD) connector to understand who users are<\/li>\n<li>Deploying VPN agents or PAC files onto the endpoints<\/li>\n<\/ul>\n<p>This process is extremely complicated, insufficient in terms of security, and doesn\u2019t scale. If you are an enterprise with several sites, you must repeat this process for each of your individual sites. And even with all components in place, there are still plenty of malicious tools available to criminals that are specifically designed to bypass proxy-based models, such as Tor or UltraSurf.<\/p>\n<h3><\/h3>\n<h3><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Cover_SaaS_2.png\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignright wp-image-24528 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2017\/02\/Cover_SaaS_2.png\" alt=\"cover_saas_2\" width=\"500\" height=\"298\" \/><\/a>It\u2019s Time to Get Serious About Securing Your SaaS<\/h3>\n<p>At Palo Alto Networks we\u2019re addressing the SaaS security dilemma from an entirely new perspective \u2013 the platform perspective, to provide an integrated, comprehensive approach to SaaS security. Here\u2019s how:<\/p>\n<ol>\n<li>Our Next-Generation Firewall (NGFW) already provides visibility and control of all applications within the network perimeter. Insights gained from the combination of App-ID, User-ID and Content-ID technologies enables security for content and data going into SaaS applications from the enterprise network.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li>GlobalProtect network security for endpoints extends the visibility, control and protection of next-generation network security to the mobile workforce by connecting a user\u2019s device to the closest NGFW, virtualized form factors included, so that full network security can be performed, regardless of physical location. This enables organizations to apply consistent security policy.<\/li>\n<li>Aperture, our SaaS security service \u2013 essentially a SaaS application itself \u2013 connects directly to sanctioned SaaS applications via APIs to provide granular visibility and control within the applications to prevent data exposure and threat risks.<\/li>\n<li>WildFire, our cloud-based threat analysis service, prevents new insertion points for malware and threats by identifying known and unknown malware across the network, the cloud and the endpoints.<\/li>\n<\/ol>\n<p>Learn more by visiting our resources page, <a href=\"https:\/\/www.paloaltonetworks.com\/products\/innovations\/saas-visibility-and-control\">Securely Enabling SaaS Adoption<\/a>. You\u2019ll find a host of SaaS security\u2013focused materials, ranging from informational videos and in-depth demos to detailed spec sheets and user guides.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cover your SaaS: protect your organization from data misuse and information leakage.<\/p>\n","protected":false},"author":249,"featured_media":21531,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1229],"tags":[3188,149],"coauthors":[2745],"class_list":["post-24522","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-platform","tag-pan-os-8-0","tag-saas"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/11\/blog-generic-banner-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/24522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/249"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=24522"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/24522\/revisions"}],"predecessor-version":[{"id":24537,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/24522\/revisions\/24537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/21531"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=24522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=24522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=24522"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=24522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}