What is the most effective way to protect unsupported and undocumented applications?
When defining and implementing a protection policy, knowing the operating logic of an application or service is valuable information. It is still not uncommon today, however, to have multiple applications developed over the years by different suppliers and with different logics.
Especially within large organizations, such as large banks or public administrations, it is crucial to protect legacy and little-known applications and services that have been developed over time by different suppliers and with different logics. This represents a limitation in terms of service protection.
Due to lack of deep knowledge about one’s applications, it is difficult to apply timely protection policies that limit the risk of attack as much as possible