{"id":7701,"date":"2014-12-16T14:00:44","date_gmt":"2014-12-16T22:00:44","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7701"},"modified":"2015-10-07T15:19:41","modified_gmt":"2015-10-07T22:19:41","slug":"2015-predictions-web-security-cloud-applications","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/12\/2015-predictions-web-security-cloud-applications\/","title":{"rendered":"2015 Predictions: Web Security and Cloud Applications"},"content":{"rendered":"<p><em>As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 predictions content\u00a0<\/em><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/2015-predictions\/\" target=\"_blank\"><em>here<\/em><\/a><em>.)<\/em><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7442 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg\" alt=\"2015 Predictions Image-01\" width=\"500\" height=\"295\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-230x135.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-510x300.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>The global market for public cloud services is approaching $50 billion in 2014 and is expected to grow more than 20 percent annually through 2018. According to analyst firm IDC, the vast majority -- almost 90 percent -- of this revenue is generated by cloud software.<\/p>\n<p>It\u2019s not just the big applications such as Salesforce.com or ADP that are growing. According to cloud specialist Skyhigh, the fastest cloud application adoption in 2014 came from applications that are somewhat unknown, such as ProofHQ, QlickView, or Yandexdisk. With no hardware to build, software to install, or databases to manage, it\u2019s not surprising that cloud app usage is growing so fast. With these barriers to adoption removed, companies can quickly deploy the best applications that meet their needs.<\/p>\n<p>In 2015, all this growth will be both a blessing and a curse. Here\u2019s why.<!--more--><\/p>\n<p>The blessing: Cloud applications offer quick integration, empower business, offer convenience reduce IT requirements, and enable employees to access data wherever they are. As a result, cloud apps are experiencing unparalleled acceptance in the business world.<\/p>\n<p>The curse: This unparalleled growth generates a breeding ground for cyber criminals, and provides access into companies\u2019 networks, making network security more crucial than ever before.\u00a0 Many new apps are using uncommon port numbers far beyond the common ports for HTTP and SSL traffic, creating a security nightmare for IT and security professionals.<\/p>\n<p>Plenty of existing security solutions are good at monitoring apps that use common ports such as port 80 for HTTP or port 443 for HTTPS. \u00a0As a result, many apps that use uncommon ports simply bypass inspection. Proxies, for example, manage to inspect traffic coming through common channels, but are often inadequate at inspecting traffic coming through many other ports. Applications using uncommon ports, and there are hundreds of them often simply bypass inspection.<\/p>\n<p>The solution: An Enterprise Security Platform\u00a0that eliminates compromise by natively classifying all traffic, identifying the application regardless of port; determining the content, malicious or otherwise; and mapping the traffic to the user, regardless of location or device type. This allows you to achieve the following objectives:<\/p>\n<ul>\n<li>Gain unprecedented visibility into the applications, the related content and users for actionable intelligence for policy setting, forensics and reporting<\/li>\n<li>Safely enable applications, allowing only those you need to run the business and implicitly denying all others<\/li>\n<li>Prevent known threats by eliminating unwanted applications to reduce your threat footprint and applying port-agnostic threat prevention to allowed traffic<\/li>\n<li>Block unknown threats that could potentially come through newly developed cloud applications with real-time sandbox-based behavioral analysis and automated signature delivery<\/li>\n<\/ul>\n<p>With Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/products\/platforms.html\" target=\"_blank\">Enterprise Security Platform<\/a>, the elements that run your business - the application, content, and user \u2013 can become integral components of your Internet gateway policy, resulting in tighter alignment between your security and key business initiatives.<\/p>\n<p>-------------<\/p>\n<p>Join us Thursday, December 18 for a new webinar, \u201c<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/12\/heres-web-security-wish-list\/\" target=\"_blank\">Web Security Wish List<\/a>,\u201d in which we discuss how the Palo Alto Networks Enterprise Security Platform can help deliver what legacy, proxy-based alternatives don\u2019t. Register now.<\/p>\n<p><em>Web security is\u00a0among many industry-specific topics planned for\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\" target=\"_blank\">Ignite 2015<\/a>, where you will tackle your toughest security challenges, get your hands dirty in one of our workshops, and expand your threat IQ.\u00a0<a href=\"https:\/\/ignite2015.paloaltonetworks.com\/portal\/createAccount.ww\" target=\"_blank\">Register now<\/a>\u00a0to join us March 30-April 1, 2015 in Las Vegas \u2014 the best security conference you\u2019ll attend all year.<\/em><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7354 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg\" alt=\"PAN_IC15_web_logo-1\" width=\"500\" height=\"138\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-230x63.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-145x40.jpg 145w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 &hellip;<\/p>\n","protected":false},"author":111,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[113,229,744],"tags":[925,454],"coauthors":[980],"class_list":["post-7701","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-2","category-predictions","category-web-security","tag-2015-predictions","tag-enterprise-security-platform"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/111"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7701"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7701\/revisions"}],"predecessor-version":[{"id":7702,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7701\/revisions\/7702"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7701"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}