Check Point Advisories

Security Best Practice: Blocking BitTorrent

Check Point Reference: SBP-2009-27
Date Published: 22 Dec 2009
Severity: Medium
Last Updated: Thursday 01 January, 2009
Source: IPS Research Center
Protection Provided by:
Who is Vulnerable? BitTorrent users
Vulnerability Description BitTorrent is a peer to peer file sharing protocol used for distributing large amounts of data. It is one of the most common protocols for transferring large files.

The use of BitTorrent may circumvent the organizational security policy.
Vulnerability DetailsPeer to peer Internet traffic, such as BitTorrent, lowers employee productivity as they take time away from their work to download music and videos.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK