Report: Web gateways fail to stop malicious outbound communications

In a recent study of a million client devices over the course of 10 months in 2015, every web gateway allowed outbound malicious communications — though some gateways did better than others.

The report, released in mid-February by Seculert, showed that 40 percent of attempted malicious communications were able to make it out past the gateways, though some gateways allowed only 5 percent to get through while others failed to stop more than 90 percent.

“This isn’t just the gateway failing in a short-term fashion,” said Richard Greene, CEO at Seculert. “This is a consistent hole in the back end of people’s organizations. We’re dealing with some awful results.”

To read this article in full or to leave a comment, please click here