{"id":1239,"date":"2010-09-02T13:48:57","date_gmt":"2010-09-02T21:48:57","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=1239"},"modified":"2010-10-04T07:41:18","modified_gmt":"2010-10-04T15:41:18","slug":"putting-bittorrent-under-the-spotlight","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2010\/09\/putting-bittorrent-under-the-spotlight\/","title":{"rendered":"Putting BitTorrent Under the Spotlight"},"content":{"rendered":"<p>We have added a new <a href=\"http:\/\/www.paloaltonetworks.com\/literature\/video\/ent20\/bittorrent.html\">video<\/a> that introduces the key security concerns swirling around BitTorrent and specifically how to manage the risks that this incredibly popular application brings to your networks. We will cover how BitTorrent has evolved to avoid detection by traditional firewalls and IPS, how hackers are using BitTorrent to control malware, and why in some geographies BitTorrent can account for <a href=\"http:\/\/torrentfreak.com\/bittorrent-still-king-of-p2p-traffic-090218\/\" rel=\"nofollow,noopener\" >more than half<\/a> of all combined enterprise and consumer internet traffic.<\/p>\n<p><a href=\"http:\/\/www.paloaltonetworks.com\/literature\/video\/ent20\/bittorrent.html\">View the video<\/a><\/p>\n<p>As always, we love to hear your feedback, so take a look and let us know if you have any questions or have an application that you would like to see profiled.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have added a new video that introduces the key security concerns swirling around BitTorrent and specifically how to manage the risks that this incredibly popular application brings to your networks. We &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[31,40],"coauthors":[889],"class_list":["post-1239","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-application-control","tag-file-sharing"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"predecessor-version":[{"id":1287,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1239\/revisions\/1287"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1239"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}