The company=92s electronic data protection covers more protoc= ols than any other iSecurity solution, including email, instant messenger, P2P applications, and Port 80
The softphone is both secure and firewall friendly, can utilize HTTP over port 80
, bypass customer firewalls, and allows any combination of VoIP and PSTN on any given call.
The ProxySG appliances can differentiate between SSL traffic and other encrypted traffic that uses the firewall's fully open port 80
(HTTP) or 443 (HTTPS).
This is because IM uses popular communication ports to access networks, such as TCP port 80
which is also used by browsers.
RemotePass has a server-based HTTP connection with its own coding, running via port 80
, which according to the company ensures a problem-free connection structure despite firewalls, proxy-servers, routers or any other security system.
This type of attack defeats many firewalls and antivirus solutions because port 80
, through which Web traffic flows, is typically open, and much of the malicious code is new, so no antivirus signatures exist.
For example, by default, guest access is limited to port 80
for Web surfing.
Further, when it is installed, it installs with minimal functionality (just the port 80
listener for the technophiles reading), leaving the additional components to only those organizations that specifically want that functionality.
is the only port that should be open on the Web server.
Web server traffic will be directed to the Web server IP address on TCP port 80
The analysis shows that more than half of the nearly 500 unique applications found enable accessibility by hopping ports or using port 80
or 443 (typically open to enable web browsing or SSL traffic).
Attack Traffic and Security: Port 80
overtakes Port 445 to become the most targeted port