Security Policy Validation

Is anyone using non-standard ports on my network?


Shadow IT or outside attackers may use non-standard ports to hide their traffic from your IT organization; a practice known as port obfuscation. This typical violation of security policies is difficult to detect and constitutes a threat to your organization.


For example, an attacker might establish a connection on port 443 using a custom encrypted protocol, instead of standard HTTPS, encrypted with SSL. Disguised as a common connection to a secure website, the attacker could gather sensitive information without being discovered.


Through a dedicated dashboard, L7Viewer identifies which applications use non-standard ports. In our example, L7Viewer can detect that traffic on port 443 is not standard HTTPS. IT administrators can then immediately block non-authorized traffic and investigate the potential threat.

Find the perfect plan for your business

Choose one of our purchase plans