Narrowing the gap Across the line
Transcription
Narrowing the gap Across the line
FEBRUARY 2011 • WWW.SCMAGAZINEUS.COM REVIEWED IN GROUP TESTS DragonSoft P55 Sourcefire P65 GFI P56 Launches scans from a simple interface Provides IDS/IPS functions at nice price point. Solid scanning and analysis tool. FEATURES: INTERNAL REVIEW Some in the security industry are working to stem the malicious insider threat, says Dawn Cappelli of Carnegie Mellon P20 Narrowing the gap The $1 trillion cybercrime industry is expertly - and competitively - run, but the good guys aren’t sitting on their hands P28 Across the line Canada and the United States will shortly announce a new agreement on border security involving biometrics P32 VOLUME 22 NO. 2 • February 2011 • WEBSITE WWW.SCMAGAZINEUS.COM • EMAIL SCFEEDBACKUS@HAYMARKETMEDIA.COM REGULARS PRODUCT REVIEWS 4 51 Products section 8 Editorial An accounting of the insiders This month we are looking at two groups that, at first blush, don’t look as if they belong together: vulnerability assessmant and IDS/IPS Threat report The Peoples Liberation Front has taken responsibility for an attack that shut down a county website in California 52 Group Test 1: Vulnerability assessment With the evolution in today’s array of tools, the enterprise can now have vulnerability assessment any way it wants 11 Threat stats Fraudsters are using hijacked websites to host attacks 14 Update An email management provider was hacked 60 Group Test 2: IDS/IPS 15 Debate The model of ‘trust but Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are evolving in capabilities to deliver protection against more sophisticated threats verify’ is effective at mitigating the insider threat 16 Two minutes on… The evolution of the DDoS 66 First Look: ActivIdentity 17 Skills in demand Mobile threats 4TRESS Authentication Appliance for Banking v 7.0 present job openings 18 From the CSO’s desk Think like Dawn Cappelli P22 Nessus ProfessionalFeed P59 a chess player, says Zynga’s Ward Spangenberg FEATURES 20 Opinion The great malware coverup, by Marc Maiffret, chief security architect, FireEye 21 Letters From the online mailbag 22 Internal review Some in the security industry are working to stem the malicious insider threat, says Dawn Cappelli of Carnegie Mellon. 68 Calendar A guide to upcoming courses, shows and IT security events 70 Last word Smart mobile app development, by Sean Martin 28 Narrowing the gap The $1 trillion cybercrime industry is expertly – and competitively – run, but the good guys aren’t sitting on their hands. 32 Across the line Canada and the United States will shortly announce a new agreement on border security involving biometrics McAfee Network Security Platform v6.0 P62 SC Magazine™ (ISSN No. 1096-7974) is published 12 times a year on a monthly basis by Haymarket Media Inc., 114 West 26th Street, 4th Floor, New York, NY 10001 U.S.A.; phone 646-638-6000; fax 646-638-6110. Periodicals postage paid at New York, NY 10001 and additional mailing offices. POSTMASTER: Send address changes to SC Magazine, P.O. Box 316, Congers, NY 10920-0316. © 2011 by Haymarket Media Inc. All rights reserved. Annual subscription rates: United States: $98; Canada and Mexico: $110; other foreign distribution: $208 (air service). Two-year subscription: United States: $175; Canada and Mexico: $195; other foreign distribution: $375 (air service). Single copy price: United States: $20; Canada, Mexico, other foreign: $30. Website: www.scmagazineus.com. www.facebook.com/SCMag Michael Singer P17 A. N. Ananth P15 Cover photo by Karen Myers www.twitter.com/scmagazine Editorial who can turn security into “know” instead of “no”? An accounting of the insiders N o matter your view of Julian Assange – First Amendment hero or unapologetic traitor – his WikiLeaks controversy is the story that just keeps on giving. As U.S. government officials in late January looked to close out their assessments of how they handle classified data, which likely will result in the strengthening of existing but questionable security practices, still more fallout is coming. This time, the targets play in the private sector though. The British magazine New Statesman reports in a recent Assange interview that the WikiLeaks founder has additional classified files from both the government and some media outlets that will be made public if something happens to him or WikiLeaks. Meantime, he says data files from another private entity, likely Bank of America, are next in line to be revealed on the WikiLeaks site [data from Swiss bank Julius Baer was reportedly given to WikiLeaks on Jan. 17]. So now the plot thickens, bringing into the mix corporations, their electronic communications and subpar information security practices. Insider risks have been ever-present, but attention only seems to be given to them during economic downturns when layoffs result in intellectual property thefts or lingering disgruntled employees expose customer information. However, the importance of having both robust end-user security policies in place, which are then enforced and supported by strong technologies within the corporate infrastructure, can neither be overstated nor ignored. Check out this month’s h’s cover story by our Executive Editor Dan Kaplan to get the latest information on whatt works best in dealing with both malicious us insiders and error-prone employees. Moving on from the potential tial problems wrought by some internal al staff, I wanted to call out the tremendously ndously positive contributions the strongest ongest among them can make – especially cially those of one respected industry ry player we lost too soon. Justin Peltierr was a longtime contributor to SC Magazine, testing countless products in our SC Lab. After starting his inforormation security career at a large ge consultancy, he began teaching various classes, including popular courses on pen testing, for CSI and institutions like Norwich University. His work with our publication was stellar and “his knowledge of various product types and individual products was encyclopedic,” says our Technology Editor Peter Stephenson. on. We here at SC Magazine were re privileged to know Justin. Hiss wit, intelligence, humor and the vast ast technological experience he openly shared with the entire IT security urity community will be sorely missed. sed. Saying “no” to unauthorized access is important. But “know” is far more important. Content-Aware Identity and Access Management from CA Technologies brings the power of “know” to IT environments—virtual, physical or cloud—all the way down to the data level. Identities. Access. Information. Compliance. A smarter, more secure solution. That’s the power of know. To put the power of know to work for you, visit www.security.com we can This time, the [WikiLeaks] targets play in the private sector...” Copyright ©2011 CA. All rights reserved. Previous 4 • February 2011 • www.scmagazineus.com Next WHAT IS SCWC 24/7 SC MAGAZINE EDITORIAL ADVISORY BOARD 2011 SC Magazine has created a free virtual environment that is open year-round. Each month we host an event focused on a subject that you as an IT security professional face on a regular basis. Rich Baich, principal, security & privacy, Deloitte and Touche THIS MONTH Jaime Chanaga, managing director, CSO Board Consulting Greg Bell, global information protection and security lead partner, KPMG Christopher Burgess, senior security adviser, corporate security programs office, Cisco Systems Rufus Connell, research director information technology, Frost & Sullivan Dave Cullinane, chief information security officer, eBay JAN. 25: INSIDERS WITH ACCESS IT administrators and information security professionals can use their power for evil by accessing confidential information that’s not pertinent to their duties. Given that they oversee corporate systems, their abilities to access human resources data, for example, or the personally identifiable information of customers can be virtually unlimited. How should organizations ensure they’re keeping in check even privileged users and what, overall, should they do to combat insider threats? We take a look at the trends. UPCOMING WEB APPLICATION SECURITY We talk to experts about the trials and tribulations of safeguarding web applications, finding out practical steps for protecting this too-often-used entré into business networks. MANAGING DATA AGAINST INSIDER THREATS Whether their actions are intentional or accidental, insiders are a risk and companies must protect their critical assets against them. We learn from experts. FOR MORE INFO For information on SCWC 24/7 events, please contact Natasha Mulla at natasha.mulla@haymarketmedia.com For sponsorship opportunities, please contact Mike Alessie at mike.alessie@haymarketmedia.com. Or visit, www.scmagazineus.com/scwc247-environment/section/1223/ Mary Ann Davidson, chief security officer, Oracle Dennis Devlin, chief information security officer, Brandeis University Gerhard Eschelbeck, chief technology officer and senior vice president, engineering, Webroot Software Gene Fredriksen, senior director, corporate information security officer, Tyco International Maurice Hampton, information security & privacy services leader, Clark Schaefer Consulting Paul Kurtz, partner and chief operating officer, Good Harbor Consulting Kris Lovejoy, director of Tivoli strategy, IBM Tim Mather, board member at Cloud Security Alliance REAL-TIME LOG ANALYSIS - WHY SETTLE FOR JUST FORENSICS? Stephen Northcutt, president, SANS Technology Institute Marc Rogers, associate professor and research scientist, The Center for Education and Research in Information Assurance and Security, Purdue University Randy Sanovic, former general director, information security, General Motors * Howard Schmidt, cybersecurity coordinator, U.S. White House; president and chief executive officer, Information Security Forum Justin Somaini, chief information security officer, Symantec; former director of information security, VeriSign Craig Spiezle, chairman, Online Trust Alliance; former director, online safety technologies, Microsoft Hord Tipton, executive director, (ISC)2; former CIO, U.S. Department of the Interior Amit Yoran, chief executive officer, NetWitness; former director, Department of Homeland Security’s National Cyber Security Division * emeritus WHO’S WHO AT SC MAGAZINE EDITORIAL EDITOR-IN-CHIEF Illena Armstrong illena.armstrong@haymarketmedia.com EXECUTIVE EDITOR Dan Kaplan dan.kaplan@haymarketmedia.com MANAGING EDITOR Greg Masters greg.masters@haymarketmedia.com REPORTER Angela Moscaritolo angela.moscaritolo@haymarketmedia.com TECHNOLOGY EDITOR Peter Stephenson peter.stephenson@haymarketmedia.com SC LAB MANAGER Mike Stephenson mike.stephenson@haymarketmedia.com DIRECTOR OF SC LAB OPERATIONS John Aitken john.aitken@haymarketmedia.com SC LAB EDITORIAL ASSISTANT Judy Traub judy.traub@haymarketmedia.com PROGRAM DIRECTOR, SC WORLD CONGRESS Eric Green eric.green@haymarketmedia.com CONTRIBUTORS Deb Radcliff, Beth Schultz, Stephen Lawton, DESIGN AND PRODUCTION ART DIRECTOR Brian Jackson brian.jackson@haymarketmedia.com VP OF PRODUCTION & MANUFACTURING Louise Morrin louise.morrin@haymarketmedia.com SENIOR PRINT AND DIGITAL CONTROLLER Krassi Varbanov krassi.varbanov@haymarketmedia.com SC EVENTS SENIOR EVENTS MANAGER Natasha Mulla natasha.mulla@haymarketmedia.com EVENTS COORDINATOR Anthony Curry anthony.curry@haymarketmedia.com U.S. SALES EASTERN REGION SALES MANAGER Mike Shemesh (646) 638-6016 mike.shemesh@haymarketmedia.com WESTERN REGION SALES MANAGER Matthew Allington (415) 346-6460 matthew.allington@haymarketmedia.com SENIOR SALES EXECUTIVE Brittany Thompson (646) 638-6152 brittany.thompson@haymarketmedia.com NATIONAL ACCOUNT MANAGER - EVENT SALES Mike Alessie (646) 638-6002 mike.alessie@haymarketmedia.com SALES/EDITORIAL ASSISTANT Brittaney Kiefer (646) 638-6104 brittaney.kiefer@haymarketmedia.com UK ADVERTISEMENT DIRECTOR Mark Gordon 44 208 267 4672 mark.gordon@haymarketmedia.com LICENSE & REPRINTS SALES EXECUTIVE Kathleen Merot (646) 638-6101 kathleen.merot@haymarketmedia.com EMAIL LIST RENTAL EMAIL SENIOR ACCOUNT MANAGER Frank Cipolla, Edith Roman Associates (845) 731-3832 frank.cipolla@epostdirect.com CIRCULATION GROUP CIRCULATION MANAGER Sherry Oommen (646) 638-6003 sherry.oommen@haymarketmedia.com SUBSCRIPTION INQUIRIES CUSTOMER SERVICE: (800) 558-1703 EMAIL: Haymarket@cambeywest.com WEB: www.scmagazineus.com/subscribe MANAGEMENT CHAIRMAN William Pecover PRESIDENT Lisa Kirk DEPUTY MANAGING DIRECTOR Tony Keefe “ The recent intrusions...are a wake-up call to those who have not taken this problem seriously. New cyber security approaches must continually be developed, tested, and implemented to respond to new threat technologies and strategies - Dennis C. Blair, Director of National Intelligence 2/2/10 ” Real-Time Log Analysis for Proactive Network Defense Logs have to be analyzed. Regulations such as PCI, HIPAA, NERC CIP, SOX and GLBA require it, but let’s face it - traditional log analysis is reactive. You have a choice: You can pick a product that is forensically focused: gathering logs, storing them in a database and offering search and reporting, OR you can choose TriGeo SIM. TriGeo SIM is the ONLY log analysis solution that combines real-time log analysis with active response for true Proactive Network Defense. Real-time, in memory, analysis is the key. TriGeo’s enterprise-wide view of the network makes it possible to capture, correlate and actively respond to network attacks and insider threats - at network speed. For proactive network defense, there is only one choice. 2010 Seeing is believing... OVERALL RATING Group Test: SIEM Find out why this award-winning technology is so highly rated by reviewers and loved by customers. Join us for a live webinar where you’ll see TriGeo SIM in action under real-world conditions. Watch as we capture, correlate and respond to network attacks and policy violations - all in real-time. Register today at www.TriGeo.com or call 1-866-664-9292. © 2010 TriGeo Network Security, Inc. All rights reserved. TriGeo SIM is a trademark of TriGeo Network Security, Inc. Previous 6 • February 2011 • www.scmagazineus.com Next DataBank ThreatReport Cybercriminal activity across the globe, plus a roundup of security-related news Colored spots on the map indicate levels of spam delivered via compromised computers (spam zombies). Activity is based on the frequency with which spam messaging corresponding with IP addresses is received by Symantec’s network of two million probes with a statistical reach of more than 300 million mailboxes worldwide. HIGH-LEVEL ACTIVITIES MEDIUM-LEVEL ACTIVITIES LOW-LEVEL ACTIVITIES IRELAND – The hacker group Anonymous is believed responsible for hacking the website belonging to one of the nation’s largest political parties, Fine Gael, resulting in the exposure of email and IP addresses and phone numbers belonging to at least 2,000 registered site users. ROCHESTER HILLS, MICH. – A 33-year-old man is facing up to five years in prison after being charged with hacking into his now ex-wife’s Gmail account to discover she was having an affair. Leon Walker, was charged with felony computer misuse. CHINA – An online auction site removed ESTONIA – The Baltic Region state formed the Cyber Defense League to serve as a volunteer army in the event of internet war. Volunteers train on weekends and are tasked with protecting the country from things such as DDoS. SANTA CRUZ, CALIF. –The People’s Liberation Front took responsibility for an attack that shut down the Santa Cruz County government website. The group said it launched the attack to object the prosecution of demonstrators who protested a city ordinance that bans sleeping outdoors. the listings of some 50,000 hacked iTunes accounts, many belonging to U.S. users. Winning bidders were able to buy media, such as music and movies, at the expense of the original account holder. The stolen accounts urged prospective buyers to act quickly. GERMANY – The country is plan- COLUMBUS, OHIO – A 22-year old DENVER – A recent audit of state computers turned up thousands of records containing personal information, including Social Security numbers, birth dates and income levels. Though auditors said the Centennial State is at “high risk” of a cyberattack, the governor’s IT office disagreed. student recently paid $12,500 to settle a copyright claim with Conde Nast after hacking into the publishing giant’s computer system and downloading hundreds of files. The student, Ross Ulrich, confessed to the intrusion to FBI agents. ning a cyberwarfare center that will help defend against espionage attacks. The center will be staffed by government and intelligence experts, who also will work with the business community to protect the country from attack. SOUTH KOREA – Two men running an illegal gambling website on behalf of the mafia were charged with launching distributed denial-of-service attacks against rival sites. Prosecutors said the men, ages 32 and 37, leveraged a 50,000-node botnet in November and December to take down more than 100 competitor sites. BRASILIA, BRAZIL – Hackers attempted to disrupt the government’s website a day after President Dilma Rousseff was sworn in last month. The attack caused the website to become unstable, but it was not knocked offfline. No confidential information was compromised. The Netherlands was top producer of zombie IPs During the past month, the EMEA region (Europe, Middle East, Africa) was the leading source of all zombie IP addresses. Of the countries making up the EMEA region, the Netherlands was the top-producing country. For the other regions, the top-producers were Brazil in South America, the United States in North America and India in the Asia-Pacific region. Source: Symantec Previous 8 • February 2011 • www.scmagazineus.com February 2011 • www.scmagazineus.com • 9 Next DataBank ThreatStats The biggest increases in month-over-month zombie activity occurred in India Top 10 malicious programs Kido still tops BALANCE Risk with Reward Position Name Change Number of infected computers 1 Net-Worm.Win32.Kido.ir 0 468,580 2 Net-Worm.Win32.Kido.ih 0 185,533 3 Virus.Win32.Sality.aa 0 182,507 4 Trojan.JS.Agent.bhr 0 131,077 5 AdWare.Win32.HotBar.dh New 122,204 6 Virus.Win32.Sality.bh 1 110,121 7 Virus.Win32.Virut.ce -2 105,298 8 Packed.Win32.Katusha.o 0 100,949 9 Porn-Tool.Win32.StripDance.b New 92,270 10 Worm.Win32.FlyStudio.cu -4 88,566 ('/@KK\c\Zfddle`ZXk`fej ('+I\kX`cN_fc\jXc\ 0)>fm\ied\ek //9Xeb`e^=`eXeZ\ -0?\Xck_ZXi\ ' ,' ('' (,' )'' ),' *'' Phishing A slight drop Top breaches of the month Data loss Earn ISACA’s Certified in Risk and Information 17,935 16,813 16,782 16,756 TM 16,274 16,000 Apply for grandfathering until March 2011. 15,000 July August Sept. Oct. Nov. Dec. During December, the global volume of phishing attacks remained unchanged, decreasing by a mere 0.2 percent compared with November. December marks the sixth consecutive month through which no proxy-based phishing attacks were launched. It appears fraudsters do not invest in fastflux infrastructures, but rather use hijacked websites to host attacks. Source: RSA Anti-Fraud Command Center Previous Number of records Name Type of breach deviantART, Silverpop Systems (Hollywood, Calif.) Hackers exposed the email addresses, 13,000,000 usernames and birth dates of the entire deviantART database. Ohio State University (Columbus, Ohio) Students, professors and other university affiliates were notified that their information may have been accessed by a hacker. 750,000 Western Colo. Drug Task Force (Grand Junction, A former employee accidentally posted sensitive information in a place that was publicly accessible on the internet. 200,000 16,047 rewards of recognition and career advancement. www.isaca.org/crisc-scmagazine The right balance for your career. (-)=ff[9\m\iX^\ The chart above reflects the encounter rate of web malware across a selection of industry verticals. Rates above 100 percent reflect a higher-thanmedian rate of encounter and rates below 100 percent reflect a lower-thanSource: Cisco ScanSafe median rate. 17,000 Systems Control (CRISC ) designation and gain the ),+<[lZXk`fe There were no major malware incidents to talk about in December. However, throughout the month, 209 million network attacks were blocked, 67 million attempted infections via the web were prevented and, 197 million malicious programs were detected and neutralized Source: Kaspersky Lab 18,000 TM Malware Vertical encounter rate Total number of records containing sensitive personal information involved in security breaches in the U.S. since January 2005: 511,134,665 (as of Jan. 4) Source: Privacy Rights Clearinghouse (data from a service provided by DataLossDB.org, hosted by the Open Security Foundation) February 2011 • www.scmagazineus.com • 11 Next DataBank Zombie IPs Global distribution Top 5 attacks used by U.S. hackers 1. Torpig trojan @e[`X(-%+ Fk_\i<lifg\(.%) 2. Koobface 3. TDL3 trojan 4. Rustock trojan Iljj`X('%0 Fk_\i8j`X (/%+ 5. Clampi trojan Top 5 attacks used by foreign hackers 9iXq`c.%. GXb`jkXe)%- K_X`cXe[*%* :_`eX*%. 1. Torpig trojan 2. Koobface LbiX`e\,%) M`\keXd,%( 3. TDL3 trojan 4. Butterfly bot The biggest increases in month-over-month zombie activity occurred in India, Russia, Ukraine and Thailand, while the largest decreases occurred in Brazil, Vietnam and other Asian nations. Source: Commtouch Software Online Labs 5. ZeuS trojan There were 864 attacks in the United States last month, primarily originating from Farley, Iowa; New York; Garden City, N.Y.; Scranton, Pa.; and Woodstock, Ill. There were 15,738 foreign attacks last month, primarily originating from Taipei, Taiwan; Beijing; and Shanghai, Nanjing, and Guangzhou, China. Source: SecureWorks Spam rate Compared to global email -' Top 10 spyware threats Win32 still wins ;\k\Zk\[XZk`m`kp ,' Threat name +' *' 1 Trojan.Win32.Generic!BT: A generic risk that covers a wide variety of unwanted and malicious apps. 2 Trojan-Spy.Win32.Zbot.gen: A generalized description of a password-stealing trojan. 3.79% 3 Trojan.Win32.Generic.pak!cobra: A generic detection for a wide variety of malware. 3.14% 4 Trojan.Win32.Generic!SB.0: Generic detection for password-stealing trojan programs. 2.78% 5 Exploit.PDF-JS.Gen (v): A detection for threats that exploit a security flaw in PDF files. 1.79% 6 INF.Autorun (v): Uses Autorun.inf files to automatically launch backdoors and trojans. 1.63% 7 Worm.Win32.Downad.Gen (v): A detection for the Downadup worm. 1.27% The world’s leading SSL now gives you even more protection. 8 Trojan.ASF.Wimad (v): A detection for a group of trojanized Windows media files. 0.77% 9 FraudTool.Win32.FakeVimes!delf (v): An heuristic detection for the FakeVimes family. 0.73% VeriSign® SSL, now from Symantec, includes more than just industry-leading authentication and encryption. You can add a daily website malware scan for increased protection. You can make your customers feel more protected and generate more site traffic by displaying the VeriSign seal in search results. All at no extra cost. Chosen by over 93 percent of the Fortune 500®, VeriSign SSL is setting a whole new standard for online security and trust. See for yourself with a 30-day free trial at verisign.com/ssl/free-30day-trial Trojan.Win32.Meredrop: A generic detection for a number of trojans that install and run malware. 0.72% )' (' ' ((&))&(' ((&)0&(' ()&-&(' ()&(*&(' ()&)'&(' Received spam Top five spam regions ;\k\Zk\[XZk`m`kp^cfYXc LJ80%*. =iXeZ\0%(( AXgXe-%.. KX`nXe*%// @kXcp*%'* ' ) 10 + - / (' Spam rate indicates the accumulated emails tagged as spam. Source: Fortinet Threatscape Report Previous Percentage 21.93% The majority of these threats reported last month propagate through stealth installations or social engineering. Source: Sunbelt Software 12 • February 2011 • www.scmagazineus.com Next Shouldn’t you be demanding more from your SSL solution than just encryption? Copyright © 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign, VeriSign Trust, and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other countries and licensed to Symantec Corporation. Other names may be trademarks of their respective owners. Update 2 minutes on... Me and my job Skills in demand DDoS attacks have gotten slicker over time P16 Managing endpoints should be a top priority P17 Mobile threats present job openings P17 Data pop replicated a botnet to study its behaviour, infecting 3,000 virtual machines with the Waledec malware. The research, led by a team at the École Polytechnique de Montréal, involved collaborators at Carlton University, Canada. It also enlisted the help of researchers at Nancy University, France, along with antimalware company ESET. Scientists used a $1 million, 98-machine server cluster as a platform to create 3,000 virtual machines, each of them simulated with a different IP and email address. They then infected the machines with Waladec to measure statistics including how quickly it spread. The project, described in MIT’s Technology Review, was carried out earlier last year and discussed in December in a paper entitled “The case for in-the-lab botnet experimentation: Creating and taking down a 3,000-node botnet. One significant finding from the experiment was that the Waledac botnet’s weak cryptographic protection in the wild was a necessity. The botnet’s command-and-control infrastructure used the same Advanced Encryption Standard session key for all bots for 10 months. Hackers compromised the email addresses of millions of Honda Motor Co. customers. The incident is believed to be related to a database breach at Silverpop Systems, a third-party firm that provides marketing services to more than 105 corporate clients. Seperate announcements by McDonald’s and Walgreens that customer data was compromised also is believed related to the Silverpop breach. Previous Personal data of Honda customers was exposed, though no financial data. THE QUOTE We’re scared to death of the man in a black suit and briefcase – the auditor.” – James Arlen, principal, Push Stack Consulting, on the over-reliance on compliance versus security when the games were awarded in 2002, eventually cost the Canadian taxpayer nearly $854 million. Twelve departments contributed to security at the games, which included an elaborate computer security mechanism operated by contractor Atos Origin. National Defence spent $231 million, while the Canadian Security and Intelligence Service (CSIS) spent $11 million to help screen officials. Canada Post spent $652,000 screening the mail, while Public Health was allotted $900,000 for health surveillance. Significantly, the Royal Canadian Mounted Police (RCMP), which spent the lion’s share of the security budget at $522 million, felt considerably pressured by a lack of resources, according to U.S. diplomatic cables obtained this month by the whistleblower site WikiLeaks. 14 • February 2011 • www.scmagazineus.com “Law enforcement representatives working at the U.S. Consulate in Vancouver are reporting that more and more of their contacts are being pulled to work on Olympics security issues,” said the cable, quoting Consul General Philip Chicola, a year before the Olympics opened. The security bill for the Olympics, which were held in March 2010, was significantly revised last year to $900 million, meaning that the final bill came in under the revised budget. The Vancouver Olympics Organizing Committee claimed to have broken even in its final budgetary analysis of the Olympic games, although critics pointed out that it had returned for more money since the games were awarded, inflating its budget. The budget for the Olympics games eventually cost $1.8 billion. Photo by Stan Honda/AFP/Getty Images »Scientists in Canada have ver Olympics ballooned almost five times over the course of the games’ preparation, according to a report issued in the Canadian parliament last month. Security, originally estimated at $175 million effective at mitigating the insider threat. The emergence of WikiLeaks has focused attention on the insider attack, yet it is not a new problem. While not as common as external attacks, insiders can be highly destructive to an enterprise’s credibility and security. Completely disabling functionalA. N. Ananth CEO, ity (e.g., removable media) in the Prism Microsystems name of hardening is impractical, inefficient and eventually noncompetitive. Ignoring the issue is just as bad. It is not a question of “if” the insider attack will happen; it is only a question of “when.” Responsible organizations should “trust but verify” when it comes to insiders – trust that employees are doing what is right, but verify that information is handled correctly. Insider threats must be balanced with information needs by following several key steps. First, identify critical assets and establish access control based on need. Second, publish acceptable-use policies and educate users. Last, enforce these policies with effective monitoring of all access. Ideally, use behavioral analysis to identify variations and abnormalities from a running baseline. FOR NEWS BRIEFS »Security costs for the Vancou- Debate» The model of ‘trust but verify’ is sanct mantra of modern infosec – has failed our profession. It is a joke – literally. It comes from President Reagan’s speech commemorating the signing of a historic nuclear weapons treaty between the United States and John Kindervag senior analyst, the former Soviet Union: Forrester Research President Reagan: We have listened to the wisdom in an old Russian maxim. And I’m sure you’re familiar with it, Mr. General Secretary, though my pronunciation may give you difficulty. The maxim is: Dovorey no provorey — trust, but verify. Gorbachev: You repeat that at every meeting. Reagan: I like it. Our profession misunderstood the joke and implemented trust and forgot to verify, thereby opening the door for numerous insider breaches, with WikiLeaks/Bradley Manning being the most prominent. Trust is not a concept that should be anthropomorphized down to the packet level. We must quit trusting and start verifying. Until then, the joke is on us. Dovorey no provorey. THE STATS How do you expect your information security staff to change in 2011? (0%)* C\jjjkX]] IE zero-day AGAINST Trust, but verify – the sacro- THE SC MAGAZINE POLL ,' JkXpk_\ jXd\ 69% increase in information security jobs compared to last year 47% of hiring managers say they are seeking recruits who are well versed in information risk management *'%.. Dfi\jkX]] To take our latest weekly poll, click on www.scmagazineus.com THREAT OF THE MONTH Source: Dice.com (above)/(ISC)2 2010 Career Impact Survey February 2011 • www.scmagazineus.com • 15 What is it? An unpatched vulnerability in Microsoft Internet Explorer is currently being actively exploited. The vulnerability was initially reported via public mailing lists as a browser crash (DoS). However, it was quickly determined by various researchers, including internally at Secunia, that the vulnerability allows execution of arbitrary code on a user’s system when viewing a specially crafted web page. How does it work? Internet Explorer supports CSS style sheets, which may be included via an @ import CSS command. However, a use-after-free error within mshtml.dll when handling recursive CSS style sheet references (i.e., when a CSS style sheet references itself) can be exploited to de-reference already-freed memory in a manner that makes it possible to gain control of the program flow. How can I prevent it? Microsoft has yet to patch. However, in the meantime, a temporary Microsoft FixIt solution has been made available. This implements a check in mshtml.dll to prevent recursive loading of CSS style sheets. Source: Carsten Eiram, chief security specialist, Secunia Next Update 2 MINUTES ON... The evolution of the DDoS T he temporary takedown in December of a handful of websites that cut ties with controversial website WikiLeaks, including Visa and MasterCard, made national news. The reality, though, is that similar attacks, motivated by a variety of reasons, occur thousands of times each day, thanks in part to the ease by which website disruptions can be accomplished. Hackers have been carrying out distributed denial-ofservice (DDoS) attacks for more than a decade, and their potency steadily has increased over time, said Jose Nazario, senior security researcher at Arbor Networks. Due to internet bandwidth growth, the largest such Briefs attacks have increased from a modest 400 megabytes per second in 2002 to 100 gigabytes per second recently, according to Arbor Networks. Massive flooding attacks in the 50 Gbps range are powerful enough to exceed the bandwidth capacity of almost any intended target, but even smaller attacks can be surprisingly effective. “There has been a dramatic increase in the past five years of easy-to-use tools in the DDoS attack space,” Nazario said. The vast majority of DDoS attacks occur in the world of online gaming, where individuals use tools to boot competitors from the game to gain an advantage, Nazario said. Attacks also have widely been 102% Growth in DDoS attack size year-overyear since 2002. Source: Arbor Networks Sixth Annual Worldwide Infrastructure Security Report JOBS MARKET Me and my job Michael Singer executive director of security technology for AT&T Services How do you describe your job to average people? The work that I do with my team centers around protecting our network and customers. We help customers solve their security problems in a variety of ways. We have made many security features available within the network. In other cases, we manage dedicated security solutions for customers, whether it is on their premises or in one of our hosting centers. Why did you get into IT security? I wanted to work in an area where there would always be new challenges. I have a great deal of confidence that there will be new security challenges every step of the way going forward. There are so many threats to deal with. Cyberattacks are increasing not only in volume, but also in sophistication. In my opinion, what we find when solving security problems is far more interesting than the stuff people make up. What was one of your biggest challenges? I had to fi nd a way to take billions of event logs and make sense out of them. First, we developed a method to “de-duplicate”. I was able to lean on the great minds down the hall from me in AT&T Labs Research. We leveraged their experience with data compression and mining techniques. We now have the ability to pick the needles out of the haystack, using the equivalent of a security event metal detector. What keeps you up at night? Administration of the endpoints. That is the great burden that we all face not only for our enterprises and our customers, but also in our own homes. What is scanned and cleaned, patched and hardened can become vulnerable and compromised overnight. I think that it will stay that way unless we can move to endpoints that are much simpler. Of what are you most proud? I am a co-inventor on two U.S. patents. Skills in demand With more workers using mobile devices, companies are becoming increasingly concerned about the security of these smartphones and tablets. So, it is no surprise that we are noticing more positions opening up in mobile security. I would not be surprised to see these needs explode in companies that have intellectual property or compliance concerns. What it takes Experience developing security interfaces with apps that work on iPhone, BlackBerry and Android. At least three to five years in internet security with exposure to mobile security. Compensation Pay for security architect with a focus on mobile secrutiy ranges from $95k to $135k. – Michael Potters, CEO, The Glenmont Group, www.glenmontgroup.comcom Company news »Verizon has named Marcus Sachs vice president for national security policy. He will be tasked with leading the telecom giant’s policy development and advocacy, focusing on issues ranging from critical infrastructure asset protection to emergency preparedness. He will work with Congress and administration officials. Sachs previously served as Verizon’s executive director for national security and cyber policy. He takes over for Michael Hickey, who is retiring. www.verizon.com Previous used in extortion schemes against gambling and pornography sites. Meanwhile, a rapidly growing subset of attacks are politically or ideologically motivated, such as those targeting WikiLeaks and the ensuing retaliatory attacks against web properties that stopped doing business with the site. While large organizations may have the funds to pay for costly DDoS mitigation services or enlist the assistance of a hosting provider, smaller businesses, such as human rights and independent media outlets, often lack the tools and resources to deflect attacks, according to The Berkman Center for Internet & Society at Harvard University. The burden of responsibility also falls on individual users, whose unpatched machines are sometimes infected to amass botnets used to flood websites with unwanted traffic. “I do not see a real solution to this problem right now,” Jonas Frey, owner of Probe Networks, a German security firm, recently wrote on the North American Network Operators Group mailing list. “There’s not much you can do about the unwillingness of users to keep their software/ OS [up to date] and deploy anti-virus/anti-malware software.” – Angela Moscaritolo a collaborative and open environment for global supply chain players to create and promote guidelines for manufacturing, sourcing and integrating trusted and secure technologies. The objective is to shape procurement strategies and best practices. www.opengroup.org/ogttf Marcus Sachs, vice president for national security policy, Verizon »The Open Group, a vendorand technology-neutral consortium, has formed the Trusted Technology Forum to provide »Aveksa, provider of enterprise access governance and management solutions, has named Vick Vaishnavi president and CEO. He will lead all business operations and work 16 • February 2011 • www.scmagazineus.com with senior management to grow the company’s worldwide strategy. Previously, he served as VP at BMC Software. www.aveksa.com »Gazzang, a cloud infrastructure software firm, has secured $3.5 million in Series A venture capital funding to create management solutions to secure opensource software, such as Linux and Apache, and promote adoption of public, private and hybrid cloud environments. www.gazzang.com »Lee Parrish has joined Parsons, an engineering and construction firm, as VP and CISO. He will be charged with leading the Pasadena, Calif.-based company’s information security program. Parrish recently served as director of information assurance for a defense contractor. www.parsons.com »Johannes Ullrich has been named director of the SANS Internet Storm Center, an all-volunteer service that detects and analyzes global security Marcus Sachs, who has served as director since 2003. isc.sans.edu »Blue Coat Systems, pro- Steve Daheb, chief marketing officer and senior VP, Blue Coat Systems threats. Ullrich, the chief research officer of the SANS Institute and former CTO of the Storm Center, will take over for vider of web security and WAN optimization, has appointed Steve Daheb as chief marketing officer and senior VP. He will oversee global marketing initiatives, corporate branding, communications and marketing. Most recently, Daheb served as CMO of Emulex, a storage networking business. www.bluecoat.com February 2011 • www.scmagazineus.com • 17 » ThreatMetrix, provider of fraud prevention solutions, has appointed Phil Steffora as CSO and VP of global networks. He previously served as CIO and VP at Collarity, provider of onsite behavioral segment targeting for web publishers. www.threatmetrix.com Follow us on Facebook and Twitter Next From the CSO’s desk Think like a chess player Ward Spangenberg, T he media reported on several DDoS attacks against credit card providers, search companies, government agencies and independent organizations in 2010. We also heard about a number of organizations that lost sensitive information that ultimately helped to support a thriving stolen data market. We cannot eliminate the attacks and stop all malware, but somewhere along the line, we should have stopped and reminded ourselves to “be prepared!” We build firewalls, deploy IDS, review and check for compliance, but are we really prepared? Have we built a significant knowledge set to protect us against a major outage? A flooded data center? Lost power? Zombie attack? How do you prepare for something you don’t even know is coming? Let us look at how I define being prepared. To begin with, we must know the most significant vectors for attack and know strategy. Imagine how you I would att attack the infrastructure. What Wh would you break? Occasionally, you are going Occasi to discover that all the soludiscove tions you have deployed are worthless. worthles It is important to remember this: An attacker remem may have access to limith less people, machines p and bandwidth, while you only have what has been bee engineered into supporting day-to-day sup operations with some ope growth potential. This grow is where good plans come whe into play. Know how to shut pla off and p protect resources – disabling sections of the network, shutting down access to shu critical resources, and slowing re and mitigating as much dammitig age as possible will guarantee po that after the attack subsides, the busin business can return to normal operation. op Your last la line of defense will be your yo people – exercises, trainin training and the occasional cold beer with your team to see what you are missing will fill in those tho last few holes. Be that leader. leade that all the security technolnology won’t stop all the attacks. acks. Next we must ensure that at the support team has reviewed wed and practiced handling attacks with defined processcesses across the known vectors. tors. Additionally, we must ensure nsure that users are educated to o look and report things that hat don’t look right. Understanding significant vectors for attack k could be an column in itself, but there are somee areas that are continually highlighted every year. ar. Code needs to be reviewed wed – whether it is examined d for SQL injections, cross-sitee scripting or proper authorizaorization and access from accounts ounts and services. Patching vulnerulnerabilities remains high on n everyone’s list – vendors are constantly looking for models to help get information to o us more quickly. A good chess player will ill l tell you that they can see several eral moves into the game based ed on their opponent’s moves. es. Adopt this philosophy with ith regard to your own security rit iy ´<RXVSHOOHG¶FRQÀGHQWLDO·ZURQJµ Photo by Bob Adler director, security operations, Zynga 3M™ Privacy Filters offer you a crisp, clear view of your laptop, desktop computer or mobile device screen while blocking wandering eyes from seeing sensitive data. To learn why visual privacy is an important part of any data security plan, download the white paper at: 3MPrivacyFilters.com/security 30seconds on... »Know thy vectors »No silver bullet »Damage control »Leader of the pack Build secure code, Spangenberg says, to prevent attackers from taking advantage of vulnerable holes in your perimeter. If you can’t build it in, then don’t forget to patch. More important than leveraging a particular solution is quantifying risk, he says. That means thinking ahead to understand your enemy’s expected next move. There is no way for an organization to stop all breaches, Spangenberg says, so a security pro’s job also is to know how to respond if something does happen – to minimize the fallout. Gain the trust of your team by teaching and training them. And spend time with them – maybe out of the office – to learn where the gaps are in the business’ security posture. 3M Privacy Filters. Display good judgment. © 3M 2011 Previous 18 • February 2011 • www.scmagazineus.com Next Opinion Letters Got something to say? Privacy laws must change C onsumers have adopted personalized applications of all varieties, yet the way things stand, they must be prepared to sacrifice something at least as valuable: their privacy. Congress is just beginning the complex process of developing legislation to protect consumer privacy, while nurturing innovation in products and services. An important way to achieve the delicate balance between encouraging technology and preserving privacy is for Congress to expand the capabilities of the Federal Trade Commission (FTC) to ensure that it can keep up with the rapidly evolving marketplace. In the mid- to late-1990s, the FTC began reviewing how websites collected and managed consumers’ personally identifiable information. This led to the creation of a set of self-regulatory rules, known as the Fair Information Practice Principles, which created four basic obligations, such as that consumers must be notified as to whether their online information is being collected. Now, the FTC should be provided with the discretion and flexibility to adapt, update and strengthen the Fair Informa- Todd Thibodeaux and David Valdez, CompTIA tion Practice Principles, as well as its own role in safeguarding consumer privacy in response to changing technologies and consumer needs. The FTC, in partnership with the private sector, should create privacy notices that are easy to read and understand, in conjunction with an education campaign to inform consumers about their rights. Congress, meanwhile, should provide the FTC with the resources to create an online consumer protection bureau that focuses exclusively on online crimes. As policymakers continue to deliberate the best path for balancing the various stakeholder interests around the issue of online privacy, they must remember that any proposed legislation should not be absolute. The current set of privacy principles adopted by the FTC has worked well for over a decade and should serve as a framework for any new legislation. Todd Thibodeaux is CEO and president, and David Valdez is senior director of public advocacy at CompTIA. The great malware cover-up M Marc Maiffret, chief security architect, FireEye There is a growing gap between security defenses and modern malware attacks.” Previous alicious software, or malware, has become a very sophisticated weapon in illegal cyber businesses. The steady flow of news about data breaches and lost identities shows there is a clear and growing gap between conventional security defenses and the reality of modern malware attacks. So what does the $4 billion network security industry do when a new attack, such as Operation Aurora, is exposed? It plays “the great malware cover-up.” After the attack has been uncovered by victims and/or the media, vendors gather samples of the malware and spend resources analyzing the threat. After a few days/weeks, these vendors release out to customers new (often untested) signatures. Following that, they put senior executives into the field to offer commentary and discuss the dangers of malware. But, this achieves little other than distracting the user base from the fact that anti-virus and intrusion prevention products did not secure their customers during the outbreak – when it counted. They are sure to point out, however, that they offer customer protections now that the outbreak is over. Meanwhile, criminals have moved on to exploit the next undisclosed vulnerability. An examination of the communication plan will show critical details left out, such as any claim that customers were protected before the new malware was exposed. Also missing is any meaningful discussion of evolving past signatures, which would provide true protection against modern malware. As well, post-exposure signatures are too late to stop the attack. Today’s security products are designed to fight a conventional cyberwar, when, in reality, the criminals have moved on to modern malware attacks. The great malware coverup will continue until more of us call these outdated technologies out and then move on to re-investing the time, money and effort to truly modernize IT security. 20 • February 2011 • www.scmagazineus.com Send your comments, praise or criticisms to scfeedbackUS@ haymarketmedia.com. We reserve the right to edit letters. SC World Congress On behalf of Online Trust Alliance, I want to thank you for a very well-run event and for allowing OTA to participate. The level of discussions both in the sessions and on the floor was outstanding. One of the points which resonated very well is the need for greater public, private and non-governmental organization collaboration and sharing of best practices. The SCWC delivered on this promise and I am happy to have participated. of American freedom and the need, in a democracy, for a government that obeys our Constitution including our Bill of Rights. Erik [“Shining the spotlight on social media,” special issue, Nov. 2010, available as download on scmagazineus.com]. This is very valuable content to share with management regarding aspects of social media that many companies are dealing with from a policy and use perspective. The research and statistics are especially helpful when presenting to management to obtain support and understanding of the associated risks. Linda Williamson, Michelin North America Social media issue I just wanted to pass along a big “thank you” for excellent material on this topic The opinions expressed in these letters are not necessarily those of SC Magazine. Craig Spiezle, executive director, Online Trust Alliance We wanted to reach out and say thanks. We are thrilled with our results in the Security Innovators Throwdown and believe that the trip turned out to be quite valuable for us. Thanks again for all your support. Rama Moorthy, CEO, Hatha Systems editor’s note: Hatha Systems (software analysis) and Silver Tail Systems (fraud prevention) were each runners-up in the 2010 Security Innovators Throwdown, a competition produced by SC Magazine and held during SC World Congress. The event is designed to judge and recognize those fledgling vendors with the most robust business plans and tools to attract buyer interest and financial investment. WikiLeaks aftermath In response to a Dec. 16 blog post by Dan Kaplan on the website, Save the U.S. anti-hacking law for the real hackers, not Assange: I agree with you, Dan. And to those in the U.S. who say Assange should be assassinated because he is a “terrorist,” I advocate a refresher course on the principles February 2011 • www.scmagazineus.com • 21 Next Some in the security industry are working to stem the malicious insider threat, says Dawn Cappelli of Carnegie Mellon. Dan Kaplan reports. Photo by Karen Meyers B ruce Wignall, CISO of Teleperformance, operator of 300 call centers spanning some 50 countries, nicknames his largest torment “Fraud 2.0.” Thanks to robust perimeter technologies and stringent legislation and industry guidelines that have forced organizations to become better equipped to handle the external attacker, cybercriminals have begun shifting their modus operandi to leveraging insiders to perpetrate data heists. Combine this new hacker strategy, Wignall says, with a sputtering economy that has some people desperate for a buck – and for a 120,000-employee company such as Teleperformance that serves hundreds of clients, many in the banking and health care verticals, a particularly dangerous prospect emerges. “Frankly, it is frightening,” Wignall says. “It has forced to me say, ‘We’ve got some pretty good technologies and laws that we comply with, but it is certainly not enough. Let’s start predicting how bad things can happen and what we can proactively do to either prevent it or detect it early.” The last two years, really, have been a perfect storm for the insider threat risk. With the economy still in tatters, the rise of sophisticated cyberespionage rings and the arrival of WikiLeaks as, love it or hate it, a viable outlet for sensitive information exposure, never before have organizations had so much reason to care about the motives of their employees, contractors and partners. Most studies, in fact, now point to security professionals being more concerned about internal threats than external attackers. According to the 2010 Verizon Data Breach Investigations Report, which studied some 900 cases of data leakage incidents, 48 percent were attributed to users who, for malicious purposes, abused their right to access corporate information. Studies also conclude that these types of breaches typically are more costly than an outside attack. “Definitely people are very concerned about insiders,” says Dawn Cappelli, technical manager of the Computer Emergency Response Team (CERT) Insider Threat Center, a federally funded research-and-development entity at Carnegie Mellon University’s Software Engineering Institute in Pittsburgh. “The technology has become really good at keeping outsiders out, but your insiders walk right in every day,” she says. For more than a decade, she and her team have been studying the problem, beginning when the U.S. Secret Service approached CERT to be a partner on securing a number of major public events, such as political conventions, the presidential inauguration and the 2002 Olympics in Salt Lake City. “Traditionally, they had looked at gates, guards and guns, and then they realized they had to start looking at cyber issues,” says Cappelli. “We realized that insiders are a big threat. If you wanted to bring down an event, you could use a disgruntled insider or financially motivated insider to do that.” Cappelli says she and her team embarked on a project never done before in the cyber era: studying the insider threat from both a technical and behavioral standpoint. “We worked with the Secret Service to find every insider threat case we could find,” she says. “We tracked everything we could think of about those cases.” The group divided the caseload – believed to comprise only a small fraction of the actual numbers because many intentional insider incidents go unreported or undiscovered – into four categories: IT sabotage, theft of intellectual property, fraud and national security espionage. “We’ve talked to some vendors out there,” Cappelli says, “and from what we’ve seen, nobody has really done a functional requirement analysis for insider threat detection. Different vendors have their niche…but we’re looking across 550 cases in our databases. So based on what has happened in the past, if we could stop the crimes that already have happened, that would go a long way to stopping and detecting the insider threat.” A deeper analysis By 2008, the Insider Threat Center was ready to offer countermeasures. CERT developed its fi rst model for IT sabotage, defi ned as an incident when a employee intentionally attacks IT systems. The culprits are almost always disgruntled employees with a deep technical skill set, usually system administrators. INTERNAL REVIEW Previous 22 • February 2011 • www.scmagazineus.com February 2011 • www.scmagazineus.com • 23 Next Photo by Joel Saget/AFP/Getty Images Insider threat French trader Jerome Kerviel (right), who faces up to four years in prison for covert stock trades that Société Générale bank says cost it almost five billion euros, arrives for his verdict hearing. Sometimes they plant “logic bombs,” which are pieces of malicious code set to execute on a specific date. Other times, they set up unknown access points, which allow them entry to the network even after their privileges have been revoked. On still other occasions, they devise backdoor accounts or password crackers. CERT’s model determined that most of these cases carry a “distinct pattern”: Usually the employees either have announced their resignation or have been formally reprimanded, demoted or fired, Cappelli says. In other words, the ZERO-TRUST: A network overhaul When it comes to battling the insider threat, part of the reason organizations have been so unsuccessful is that they are treating the symptoms, not the disease, says John Kindervag, senior analyst at Forrester. For example, he says, businesses are often quick to take drastic measures, such as eliminating removable media usage, but fail to recognize that an aging network model is the underlying cause of the prob- human resources department is aware of these high-risk personnel. “We try to tell organizations,” Cappelli says. “You need to recognize that when someone is on the HR radar, you need to have controls in place to look at what they’ve been doing. You can’t look at everything everyone does, but when you have someone on the HR radar, you need to go in and say, ‘What has this person been doing?’” The center also has devised a model investigating those employees who steal intellectual property. In these cases, Cappelli says, the offenders typically are lem. But many information and security professionals don’t care to investigate, choosing to take a “plausible deniability” mindset by ignoring what goes on in their network. “In all my years of being an engineer and consultant, I’ve never been in a network where people adequately looked at their internal traffic,” Kindervag says. “Everyone wants to solve this on the edge, and you have to solve it on the center.” To stem the risk of malicious insiders, organizations must drop their dependence on perimeter controls, such as network ac- scientists, engineers, programmers or salespeople whose motive is not sabotage, but belief that they are the owners of the data on which they have worked. Traditionally, they strike within 30 days of resignation – either a month before or after leaving the organization, Cappelli says. The malefactors can fall into two groups: either those who are moving to a new job and want to take their work with them or, more maliciously, those who are part of a wellcoordinated spy ring bent on ripping off the crown jewels, such as entire product lines, usually for the benefit of a foreign government or organization. The CERT Insider Threat Center Lab, which opened last year, is working on offering technology that can assist organizations in their efforts against IT vandalism and intellectual property pillaging. The lab leverages CERT’s caseload to simulate actual events. At this month’s RSA Conference in San Francisco, lab representatives plan to demonstrate “how configuration management controls could have detected and thwarted an insider’s attempt to plant a logic bomb in critical systems and modify logs in order to conceal his activity,” Cappelli says. The lab also has previously created scripts that can be integrated with email logs within an account management system to detect incidents of intellectual property theft. cess control, and invoke a network refresh – known as zero-trust – that encapsulates accessing all resources securely, inspecting all traffic and gaining situational awareness for analysis and visibility, Kindervag says. “We can do it with existing technology,” he says. “[It’s about] taking building blocks off our network and putting them in more logical places so your network is more structurally sound and secure so we can solve some of these problems before they actually become problems. It’s all vendor neutral and essentially technology agnostic.” Trust Matters Who do you trust to safely enable applications on your network? Palo Alto Networks Check Point Next-Generation Firewall App Blade Years of Trusted Deployment Enterprises Trusting the Solution Number of Safely Enabled Apps 3+ 0 3,000+ 0 Countless 0 Would you trust your critical network security infrastructure to a vendor with no experience? We are the trusted vendor to thousands of enterprises worldwide. We are Palo Alto Networks, the Network Security Company. Visiting the RSA Conference in San Francisco? the network security company tm Stop by the Palo Alto Networks booth #2145 to get your free copy of the “Next-Generation Firewalls for Dummies” book. Copyright © 2011, Palo Alto Networks. All rights reserved. Other names are the trademarks of their respective owners. Previous 24 • February 2011 • www.scmagazineus.com Next Insider threat “The last thing we want to do is tell an organization they have to go out and spend millions of dollars on a new tool,” Cappelli says. “You already have these technologies in place. Here’s how you can use them differently.” Another academic organization, the Institute for Information Infrastructure Protection (I3P), part of Dartmouth College in New Hampshire, recognizes that the insider threat is a complex problem that no silver-bullet policy or technology can solve, and that empirical studies are the only ways to unearth answers. “We don’t think there is a one-size-fitsall approach to the insider threat without understanding the nature of the threat,” says Shari Lawrence Pfleeger, I3P’s director of research. “Without understanding the nature of the threat, we don’t know what an appropriate response is.” Specifically, the 27- member consortium, consisting of universities, national laboratories and nonprofits, has developed a taxonomy used to classify the nature of insiders and the undesired actions they may commit. This has allowed I3P to come up with hundreds of insider threat scenarios. Among their current efforts, consortium members are studying the effec- tiveness of awareness and training and researching how to design non-security systems so that security fits “naturally into the functionality of what users need in the first place,” Lawrence Pfleeger says. In addition, I3P partners at Columbia and Cornell universities are devising a language that specifies certain actions security teams want to know about if they happen on their networks. To complement this, the researchers are creating software that can record when these actions take place. “A lot of existing [commercial leakage technologies] generate so much data, so the problem becomes: How do you find the needle in the haystack,” Lawrence Pfleeger says. “They are trying to specify what the needle looks like.” Perhaps most interestingly, the organization is now turning to social scientists for help. “Employees have misbehaved for a lot longer at work than computers have existed,” Lawrence Pfleeger says. “We’re just trying to shed more light on the nature of the insider threat and find solid ways to evaluate the technologies and the approaches so we have some science underpinning the decision-making about how to deal with the insider.” Profiling the insider At Teleperformance, one of Wignall’s most proud accomplishments has not been the implementation of a particular solution. Instead, it has been his introduction of a fraud risk assessment conducted for each prospective call center. “I don’t think you’re going to catch people with technology,” he says. “You need to go out and be part of your business and understand what’s going on.” The assessments have turned up some major vulnerabilities, including internal banking applications that can be accessed publicly or ones that allow call center employees to drop money – pennies at a time – on their own debit cards. The investigations also have enabled Wignall and his team to implement what he believes is the most effective antidote to the insider threat – policy and procedure changes that force employees to fear punishment should they act maliciously. For example, at call centers in which employees deal with warranty exchanges, Wignall says there have been instances where workers have delivered new products to their own homes if the application they are using failed to “tie warranty replacements back to the original purchasers.” “If there is a flaw in our client’s applications and controls, you can count on not-so-honest employees to eventually find it,” he says. As a result, Teleperformance managers now sit down with employees each week to review each warranty exchange they have processed. “I want them to immediately think that on Friday, they are going to be questioned about that particular transaction,” he says. “I’m proud to have people quit that are fraudulently minded.” A new type of insider But it is not just the employee desiring riches with whom businesses must be concerned. Whistleblower website WikiLeaks has forced organizations to look beyond the traditional profile of a malicious insider. In a way, Bradley Manning, the U.S. Army private who leaked roughly 250,000 secret U.S. State Department diplomatic cables to WikiLeaks, revealed a new type of high-risk insider: the one with morals that can’t be repressed. “Nobody assumed that anybody in the military would have a conscience, a different kind of motivation,” says John Kindervag, a senior analyst at Forrester Research. “Everybody assumed [Man- ning] would do the right thing because he was a trusted user. People might have a different morality than you. They might see trust and righteousness differently than you.” Indeed, in a partial release of chat logs between Manning and Adrian Lamo, the hacker whom the Army soldier confided in, but who later turned him in, Manning explains his reasons for lifting the data to which he had access. “[I] want people to see the truth… regardless of who they are…because without information, you cannot make informed decisions as a public,” wrote Manning, according to Wired. Ted Julian, principal analyst at the Yankee Group, says the WikiLeaks episode has created a new channel for data leakage, one that nearly all security professionals had never considered. “It can really turbocharge data loss,” he says. “You now have WikiLeaks and others like them that can get this out to a mass market incredibly quickly. There is no putting the genie back in the bottle now.” Julian, meanwhile, says he expects to see “dramatic spending” this year on technologies, such as data leakage prevention [DLP], that are designed to sniff out and prevent information exposure. DLP, in particular, has matured to the point where most solutions now offer discovery and categorization functionality. Back at the CERT Insider Threat Center, lab personnel are trying to create solutions that make life easier on businesses. In addition, researchers have published a best-practices guide and recently began maintaining a blog devoted entirely to the threat. “Our mission is to raise awareness of the risks of insider threat and to help identify the factors influencing an insider’s decision to act, the indicators and precursors of malicious acts, and the countermeasures that will improve the survivability and resiliency of the organization,” Cappelli wrote in an introductory post. ■ INSIDER STRIKE Global dilemma: Four recent instances of when trusted users, for various motives, abused their privileges to cause big headaches for their employers. LOS ANGELES: A former UCLA Health System employee, apparently disgruntled over an impending firing, was sentenced to four months in federal prison after pleading guilty to illegally snooping into patient records, mainly those belonging to celebrities. BALTIMORE: A former Fannie Mae programmer was sentenced to 41 months in prison after he sought to destroy more than 4,000 company servers by planting a malicious script that was scheduled to activate roughly three months after he was fired. Previous 26 • February 2011 • www.scmagazineus.com FRANCE: A mid-level trader at Societe Generale managed to lose more than $7 billion on bad stock bets but used his knowledge of the bank’s computer security system to temporarily conceal the losses through fake transactions. He was sentenced to three years in prison. IRAQ: A U.S. Army private Bradley Manning accessed secret U.S. diplomatic cables and download them onto rewritable CDs. A portion of the documents have been released by whistleblower website WikiLeaks and several media partners. Manning is awaiting trial and faces 52 years in prison. February 2011 • www.scmagazineus.com • 27 Next Underground NARROWING THE GAP The $1 trillion cybercrime industry is expertly - and competitively - run, but the good guys aren’t sitting on their hands. Deb Radcliff reports. W hile monitoring botnet traffic and controllers back in mid2009, volunteers working for The Shadowserver Foundation noticed a new tactic being taken among the Waledac family of bot trojans that would usher in a new era of criminal sophistication. Waledec was exploiting DNS (domain name system) providers to self-register sites with names that seemed associated with legitimate service provider Blizzard Image Hosting. Then it used Blizzard’s real addresses and URLs to blast the spam that also included links to the malicious, preregistered domains. “At this point we immediately suspected that Blizzard either bought sleazy advertising from the spammers behind Waledac, or else they were being Joe Jobbed,” says Steven Adair, Shadowserver volunteer and co-author of Malware Analysis Cookbook. “Joe-Jobbed means Blizzard upset someone who started blasting out their website and services in order to cause a lot of grief.” SOS postings from Blizzard on its site and in multiple online forums seemed to confirm the latter theory. Blizzard claimed it was under a distributed denial-of-service (DDoS) attack and was not the one actually doing the spamming. Shortly after, Blizzard went offline. This leveraging of legitimate businesses to lure people into clicking malicious links shows a new level of criminal planning and sophistication that would dominate 2010, says André DiMino, one of the founding members of Shadowserver.org, Previous whose volunteers have been analyzing botnet behaviors since 2004. Fortunately, he adds, the good guys are getting more automated and organized as well – with better information-sharing and legal channels at their disposal. For example, in the Waledac case, Microsoft in February 2010, received a federal injunction demanding registrars to shut down 277 .com domains used to control more than 75,000 Waledac-infected computers, effectively putting the botnet operation out of business. The other good news is that, unlike the good guys, there is no honor among thieves: Crimeware developers are pirating and modifying each other’s malware for their own nefarious uses. Criminal operators providing cloud services for hosting servers to hold stolen data are stealing the data their clients are collecting. And herders continue to take over each other’s botnet power, say experts. Cutthroat bad guys In 2010, the cybercrime industry hauled in about $1 trillion, says Joseph Menn, in his book Fatal System Error. So it is no surprise that advancements in cybercriminal organization and sophistication have everything to do with getting a larger slice of that pie, says Noa BarYosef, senior security strategist for application security firm Imperva. “The point is to increase revenues while lowering costs,” she says. “As a result, there is a pyramid scheme that is emerging in these criminal roles where 28 • February 2011 • www.scmagazineus.com only the master hacker really makes any money.” Last July, Imperva researchers observed how a master hacker created and tested a new, undetectable phishing kit and advertised it on forums, claiming “No need for storage,” because the master hacker would store all data collected in the cloud. Two clicks and the “proxy hackers” (front-end hackers) could get the phish site, start obtaining credentials and send them to their cloud storage provider. However, the master hacker put a back door on the phishing kit, giving access to every credential the proxy hackers collected. “Thousands of proxy hackers taking the risk, doing the dirty work, getting credentials and giving the data they collected back to the master hacker — that’s certainly efficient from a cost perspective,” says Bar-Yosef. “This pyramid scheme is an example highlighting the technical extremes hackers are deploying.” This cutthroat mentality is creating more discord than normal among criminals, say experts. Accusations are hurtling back and forth among underground forums, adds Alex Cox, senior security researcher at NetWitness. “Messages including ‘This guy’s a ripper,’ or ‘Don’t use this one, it is a ripoff,’ or ‘This one’s backdoored,’ are common postings where malware kits are being shared,” Cox says. “A lot of times, criminals can get this exploit for free and install it, but the coder has backdoored it. So criminals create botnets and, in effect, give access to those bots to the guy they bought this software from.” Another dog-eat-dog tactic happening among malware producers is that developers are also stealing each other’s zero-days to customize and use for their own purposes, says Derek Manky, projecet manager for cybersecurity and threat research at Fortinet. For example, he points to a Slovenianbuilt botnet kit called Butterfly, a zero-day that was later re-engineered to create the Mariposa botnet long after the original developer was sent to jail. The toolkits eventually lose value and are given away for free for re-engineering, he continues, and are given away to anyone smart enough to run a compiler and push a few buttons to get started, he adds. In addition to developers, there are also providers that often sell their botnet services as “affi liate programs,” Manky said. The affi liate will pay $40 per 1,000 compromised machines, for example. Top earners in these programs make upward of $140,000 a month on volume, he adds. Turning stolen data into money is the final process in these cybercriminal syndicates. This, too, has become so efficient that criminals can go from stolen credentials to ATM card withdrawals in a matter of hours, rather than days and weeks, as in the past. According to a report by internet security firm Trusteer, 60 percent of stolen credentials are harvested within 60 minutes of when phishing emails are received by victims. Within five hours of email receipt, more than 80 percent of stolen credentials are usable by criminals. One such example is the RBS WorldPay heist, in which several Russian defendants are accused of siphoning at least $9.5 million in less than 12 hours from the time of the data breach. In that The criminal chain DXjk\i_XZb\iZi\Xk\j ]i\\nXi\n`k_YXZb[ffi N_\e]ifekc`e\_XZb\ik_\eki`\jkfdfe\k`q\f]]k_Xk[XkX#gfc`Z\ Xi\Xci\X[pnXkZ_`e^Y\ZXlj\`e`k`Xc]iXl[YpDXjk\i_XZb\i% =ifekc`e\_XZb\i]\\cjk_\_\Xk&DXjk\i_XZb\ijc`gjXnXp =i\\nXi\XmX`cXYc\kf `e\og\i`\eZ\[&]ifek c`e\Zi`d`eXcj @e\og\i`\eZ\[&]ifekc`e\ Zi`d`eXcj[\gcfpk_\YfkjXe[ Zfekifcc\ij#jkXikjZfcc\Zk`e^[XkX LeY\befnejkkf]ifekc`e\_XZb\i#DXjk\i_XZb\i Zfcc\Zkj[XkXk_ifl^_YXZb[ffiXe[dfe\k`q\j f]][XkXljlXccpk_ifl^_dlc\j_\_`i\j February 2011 • www.scmagazineus.com • 29 Next Underground Some hacker forums (right), offer phishing kits for sale, while others, such as the Ethical Hacker Network from NetWitness (above) provide threat analysis and frank discussion. time, they were able to create 44 counterfeit cards and hire cashers to use the cards in 2,100 ATMs around the world. “You still have the coders, the operators, those who draw the data and those who monetize the data,” says Fred Touchette, senior security analyst for AppRiver. “Now, the RBS case shows how quickly all these people can be orchestrated to create the plastic cards, recruit the money mules to hit the ATMs, take their cut and give the rest to their managers standing on the corner.” Leading the pack “Deloitte led the pack because of its maniacal customer focus and deep technical expertise”. -The Forrester Wave™: Information Security and Risk Consulting Services, Q3 2010, Forrester Research, Inc., August 2010 For more information, visit the Center for Security and Privacy Solutions online at www.deloitte.com/us/securityandprivacysolutions or email us at centersps@deloitte.com. As used in this document, “Deloitte” means the member firms of Deloitte Touche Tohmatsu Limited. Please see www.deloitte.com/about for a detailed description of Deloitte Touche Tohmatsu Limited and its member firms. The good guys The level of automation, optimization and distributed architectures of these criminal operations makes shutting them down more difficult. For example, DiMino points to redundancies, proxies, domain name generation algorithms and other technologies that make cybercriminal networks extremely resilient and therefore persistent. Cybercriminals are also making it more difficult to observe and learn from them, says Dmitry Samosseiko, senior manager of Sophos Labs Canada. “Cybercriminals used to operate in more open forums that researchers and law enforcement could browse and observe to find out what the crime networks and their affi liates are up to,” he says. “Now that activity is happening in closed chat rooms and it is harder to get into forums and infi ltrate their networks.” It is also harder to protect against cybercriminal activity with traditional signature and behavior-based monitoring technologies, say experts. For example, zero-day attacks, which typically are undetectable to signaturebased monitoring, are on the rise, according to an endpoint risk survey by the Ponemon Institute, released in December, of 564 U.S. IT security practitioners. In the survey, 34 percent of respondents reported frequent zero-days in their networks and 35 percent said zero-days were their biggest headache. “Zero-days, plus lack of patching on increasingly mobile endpoints [where many attacks enter from] is where much of the operational challenge comes in,” explains C. Edward Brice, senior vice president at Lumension (which sponsored the survey). Fortunately, the good guys have been forming partnerships to combat cybercrime, DiMino says. Grassroots moni- CYBERCRIMINAL: Structure In an article about the industrialization of hacking, Noa Bar-Yosef, senior security strategist at Imperva, discusses the three pillars of cybercriminal industrialization: The supply chain: consisting of malware researchers, botnet farmers, dealers, monetizers and the cybercrime lord; Automation: using Google to find vulnerable systems, malware packages, cloud services providers, and more; and Optimization: more computing power under control, dashboards, the co-joining of malware tools. – Deb Radcliff toring groups, such as Shadowserver and the Anti-Phishing Working Group, along with law enforcement and legal communities, the security community, as well as public-private partnerships across all verticals – are established and expanding their outreach. “Like never before, we’re seeing experts in the community for malware analysis mixing with those who understand routing and architectures, those who understand criminal enterprises, those who work in law enforcement, and those who work with external network service provider,” says DiMino. By sharing information and providing remediation and protection recommendations, the good guys are becoming more nimble at response communications, remediation and notification to law enforcement, say experts. And as a result of improved response and enforcement, says Bar-Yosef, criminals are indeed “feeling the heat.” ■ Copyright © 2010 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited Previous February 2011 • www.scmagazineus.com • 31 Next Border policy ACROSS THE LINE Canada and the United States will shortly announce a new agreement on border security involving biometrics. Danny Bradbury reports. Previous Photo by Alex Wong/Getty Images B order relations between Canada and the United States have been a source of contention for years. Now, the two countries look set to announce a new policy on border integration, provisionally termed “A New Border Vision”. Exact details have yet to be revealed, but policy-watchers are hoping for a significant normalization of border security between the two countries. What would that look like – and how far have we come already? The September 11 attacks kicked off a pivotal period in U.S. security policy. Canada and the United States came together three months later to create the Smart Border Declaration (SBD), which was an agreement to normalise border security. The 30-point plan included a joint approach to biometric identifiers, along with a single inspection system. Some of these plans have already played out. In 2008, British Columbia established an enhanced driving license that included biometric information, and which enabled BC residents to travel across the border by road. This became Early this month, U.S. Sen. Joseph Lieberman (I-Conn.) and Sen. Susan Collins (R-Maine) discuss a report that says less than one percent of the 4,000-mile U.S.-Canada border is monitored by U.S. border officials. an exception to a U.S. mandate which required a passport rather than a driving license to enter the country. However, concerns have been raised about cards such as these. Researchers at the University of Washington hacked enhanced driver’s licenses used in that state with off-the-shelf RFID readers. And Canada’s Federal Privacy Commissioner has argued against the use of a national ID card. Some regard the BC driving license as a stepping stone toward such a possibility. “The privacy commissioner asks in the introduction of any new technology, is this proportional to the threat?” 32 • February 2011 • www.scmagazineus.com argues Stuart Trew, trade campaigner at the Council of Canadians “Even for something as innocuous as an enhanced drivers license, I’d say no.” The inspection systems outlined in the SBD are also in place. Nexus is a fast-track clearance system for frequent travelers between Canada and the United States, administered by the border agencies in each country. The SBD also mandated sharing of Advance Passenger Information and Passenger Name Records, so that high-risk passengers travelling between the two countries would be known by the other party pre-flight. Other measures in the SBD included a plan to develop approaches for customs and immigration clearance away from the border, to speed up transit at what remains the longest unprotected border in the world. And, notably, they vowed to speed up commercial transit using an initiative called Free and Secure Trade (FAST) that remains in place today. Under that scheme, shippers who pass a risk assessment process can be expedited across the border by using dedicated lanes at crossings. With that level of harmonisation, what still remains to be done? A lot, according to Jane Moffat, executive director of the Canadian American Business Council (CABC). Pre-clearance and expedited commercial trade are still largely pipe dreams at present. “Right now, trucks are lined up at the border,” she says. “Getting pre-clearance before goods leave the facilities where they’re manufactured would be great. Such activities are still relatively limited.” So, what’s the problem? “It is one border and the infrastructure is old, and the same border crossings are used for both trade and for people,” she explains. Moffat also laments the patchy implementation of shared biometric data. “The East Coast still hasn’t got its act together,” she says, referring to the enhanced driving license. Some of these problems could be addressed by the new deal. Documents describing the New Border Vision call for an integrated cargo security strategy with pre-clearance measures, and a joint screening mechanism for people including biometric technology. Crossborder sharing of information on serious offenders would also be put in place, and the two countries would share the task of modernizing border facilities. Such measures would please Birgit Matthiesen, special adviser to the president, U.S. government relations at Canadian Manufacturers & Exporters. In spite of schemes such as FAST, a program that helps speed along commercial shipments at the northern and southern borders of the continental United States, the U.S. Trade Act of 2001 stymied crossborder trade by imposing heavy audit requirements on components and goods crossing U.S. borders, she says. “Every 1.2 seconds, a truck goes over the border northbound or southbound,” she says. “That is a vast distinction compared to a huge container arriving from the Pacific Rim, and yet these 1.2 second, 24/7 transactions are subject to the same compliance and data reporting requirements,” says Matthiesen. Alexander Moens, professor of political science at Simon Fraser University in Vancouver, and a senior fellow in American policy at the Fraser Institute, calls for separate border crossings altogether for pre-cleared goods. Moens wants deeper market integration with the United States as a means of increasing prosperity. “It is not undoable,” Moens says, but admits that attempts at ‘deep integration’ failed under a prior initiative, the Security and Prosperity Partnership of 2005. That initiative died in 2009, leaving a yawning gap in U.S./Canada security relations. One of its failures was that it failed to improve cross-border traffic. One problem, says Moens, is that the doctrine advanced by the SPP focused February 2011 • www.scmagazineus.com • 33 on a continental security perimeter, crippling itself by trying to encompass Mexico and Canada – countries with very different security issues – in the same security partnership with the United States. In 2005, the Independent Task Force on the Future of North America (a committee created by the U.S. Council on Foreign Relations) encouraged the creation of a continental security perimeter by 2010, with a common border pass. Thomas Tass, executive director of the World Border Organization, disagrees. The WBO is an international nonprofit comprising border security professionals. “The operation and the law is exactly the same on the Mexican border as it is on the Canadian border,” says Tass, adding that the border policy will not diverge. Neither will the agreement extend beyond a core goal of improving commercial pre-clearance, Tass warns, arguing that easing individual passage is not on the U.S. agenda. “It will not make the border thinner than it is now, and this is something that most Canadians don’t understand,” he says. “The United States could care less about what Canadians think of what they have to do to get into the U.S.” More information will emerge when the New Border Vision is officially announced, but the two countries look set to put measures in place that will help to continue some of the original goals set out by both the SBD and the SPP. The question is, can the countries appease businesses with new technological and policy measures while also satisfying the worries of privacy and human rights advocates? ■ Next ADVERTISEMENT ADVERTISEMENT Technology Report The evolution of malware, security technologies and services There are few who are unaware of the malware landscape changing since the release of the first few viruses decades ago. But it seems there are just as few people outside the computer security industry who understand the nature of that change. No longer is malware as ethereal a threat as an urban legend, and no longer is the virus outbreak of the day making the evening news. Threats now come not by ones and twos but by the many tens of thousands each day with the known total hovering in the tens of millions. And threats come quietly, remaining as far below the radar as possible to maximize their stay on an affected machine. Corporations are now victims of targeted attacks, as well as the regular masses of malware, and have specific needs for the protection of corporate information assets. Lysa Myers, Director of Research at West Coast Labs. Lysa can be contacted at lmyers@ westcoast.com While malware activity has increased, security budgets certainly have not. Many corporate security staff find themselves facing a tidal wave of new threats without extra personnel or resources. They need security software to work faster, harder and require less manual interaction while providing detailed reports as to what actions have been taken. Machines which are infected need to be cleaned completely to get systems back up and running quickly and painlessly. Anti-malware software is only as good as its research and support departments. They are vital in order to have excellent response times to new threats and to provide topnotch customer assistance. As focus in corporate networks shifts away from the desktop into mobile, cloud and virtual computing resources, security software needs to protect these environments too. The way malware spreads has also changed – there is less concern for infecting oneself with a floppy disk VP US Sales: Scott Markle - smarkle@westcoast.com US Sales: Rochelle Carter - rcarter@westcoast.com UK/Europe Sales: Sebastian Stoughton - sstoughton@westcoast.com China/Japan Sales: Jesse Song - jsong@westcoast.com India/ROW Sales: Chris Thomas - cthomas@westcoast.com 1 Technology Report or via poorly worded and spelled mass-mailer viruses. When malware authors discovered there was profit to be had in spreading their malicious wares, they began to take many of the tactics used by Search Engine Optimizers and improved their social engineering craft, placing files where people were most likely to run across them. Consequently, the web is now where the majority of people become infected with malware and, given the extent to which the internet is such an integral part of all corporations’ business activities, the web is a potent threat vector. Company’s websites are regularly targeted for defacement or infected to spread malware to the site’s visitors. Given that the internet is operating system agnostic and because current scripting languages allow for queries of the specific browser version of each visitor, malware can be spread in a manner which infects any particular visit. In the last few years, this has been a tactic which has proved increasingly popular with malware authors, increasing their reach as the market share of new technology increases. Obviously, anti-malware products had to change with the times as the onslaught of malware has increased and the tactics of malware authors has shifted. The first anti-malware products were designed strictly as signature scanners, which only ran when a user specifically initiated a scan. In short order, this was changed to allow the scanner to run continuously in the background so that each file was examined as it was accessed, without users having to think about it. This approach has become more widespread, so that products require little interaction – users can automatically have the most up-to-date protection running at all times. No longer are anti-malware products simply signaturebased scanners. They now include advanced heuristic technologies and generic signatures which can proactively detect new variants of existing families and new malware families. The best products include a variety of security features, such as web or spam filtering, behavioral analysis or a firewall technology which can help protect against brand new threats. With these new, intensive scanning technologies, vendors have come up with many ways to decrease the overall www.westcoastlabs.com processing load, so that scanning will not noticeably decrease access times or interrupt workflow. As both the malware landscape and anti-malware products have changed, so has the security testing industry. When products under test were updated periodically, used on-demand scanning and the total known malware was in the thousands, it made sense to have only a single pass or fail test which was performed a few times a year over a static test-bed of samples. This is no longer the reality of the current user experience. While it can be a meaningful baseline test of anti-malware functionality, it is far from a complete picture of overall product performance. In order to accurately reflect a user’s experience with malware, it is important to gather the full spectrum of malware from a variety of sources from throughout the internet, which circulate on various protocols. This means including not just email-based malware, but malicious files on P2P networks, as well as on the web and other attack vectors. Because malware does not stop when the work day ends nor does it recognize geographic boundaries, threats must be collected all day from around the world. As anti-malware products have begun to include more wide-ranging technologies, including ones which are initiated upon execution of a file, testing must incorporate dynamic functionality by running threats on test machines. This naturally takes more time than scanning an immobile directory of files, so one must take care to select the most relevant sample set which a customer is most likely to encounter. This takes into account not just prevalence, but attack vector popularity on which it’s spread, potential for damage on an infected system, as well as geography. Malware authors are always abreast of technology trends – where do people share their information, how do people share files? At West Coast Labs, we’ve already begun to see an increase of attacks on things like digital picture frames, USB thumb drives, mobile phones and on popular Web 2.0 sites. So, suffice to say, if you know a few people who use one or other or all – malware authors are looking to exploit them for financial gain. Likewise, anti-malware vendors are developing technologies to protect them and testers like West Coast Labs are developing methodologies to mirror the user’s risk and potential infection experience. In order to keep up to date on the evolving malware landscape, one need only see which new widgets are being used in home and business network environments. www.westcoastlabs.com “As both the malware landscape and anti-malware products have changed, so has the security testing industry.” But in the corporate world, keeping updated on the latest threats and technologies is not enough – TCO and ROI need to be considered. How well do advanced technologies proactively detect? How quickly are new threats added? How is customer support response? How easily can the solution be managed remotely? How much CPU time is used for scanning? To find the answers to many of these questions, take a look at product performance data from leading independent test organizations, such as West Coast Labs, and the performance validation programs they deliver – such as Real Time Testing. You can also take a close look at how individual vendors are responding to the changing threat landscape and the implications for the security of corporate networks. Nowadays, vendors are defining ‘protection’ differently. No longer is it just product performance-related, but also related to business and customer service issues, delivering a higher value overall service to meet not just security, but also business needs. When considering product performance in a corporate network environment, ‘protection’ is more than current malware detection capabilities, it’s also about the extent of a vendor’s product research and development strategy that anticipates threats and trends to ensure proactive network protection. It can be further defined as the extent to which malware protection is delivered for a multiplatform infrastructure through efficient and easily managed solutions with wide interoperability capabilities. ‘Protection’ is also about the extent to which business interests are protected through vendor service strategies that now include optimized and cost-effective security plans tailored to individual corporations’ needs for maximizing business productivity, lowering the total cost of ownership and maximizing the return on investment. Also, given that corporations are operating in a worldwide ‘e-economy’ all this needs to be supported by trusted and responsive global support plans. Yes, the threat landscape is continuing to evolve with new malware threats spawned at an alarming rate, but no longer is malware protection and information security in general just a technical issue – it’s a business issue. That’s why vendors’ product and service solutions are evolving to suit these changing needs and West Coast Labs is developing independent product performance programs that ensure that these products and services are tested and validated accordingly. ■ Technology Report 2 ADVERTISEMENT ADVERTISEMENT Technology Report Kaspersky Lab Corporate Security Solutions WEST COAST LABS' EXECUTIVE SUMMARY REPORT The launch of the Kaspersky Lab’s range of anti-malware products for the corporate network environment provides security managers with an extended choice of effective solutions for dealing with threats in attack vectors across multiple operating systems. West Coast Labs’ independent testing and performance validation of the products confirm that they combine ease of use and management with high levels of performance, all of which is driven by Kaspersky Lab’s own research, development and customer support programs. Kaspersky Lab has made a significant commitment to the independent validation of its products’ efficacy and performance through West Coast Labs’ Checkmark Certification System. This provides a range of static, dynamic and real-time tests which make these Kaspersky solutions possibly the most intensively tested corporate anti-malware solutions available anywhere in the world today. Details of the specific tests to which the products are exposed are published elsewhere in this report, but the overall outcome of the certification testing is the achievement of the Platinum Product Award for these products, which is the highest level of independent validation possible for an anti-malware solution from West Coast Labs. This is complemented by very respectable malware detection test results which position the performance of Kaspersky Lab products very favorably alongside more widely recognized corporate security solutions. The specific malware detection capability testing of both Kaspersky Lab and a number of competitive anti-malware solutions was carried out in September and October 2010 while the Checkmark Certification testing of its products is performed on an ongoing basis with confirmation of the results available at www.westcoastlabs.com. ■ Kaspersky Security 8.0 update process In a heterogeneous network situation it is important to know that a security solution is both compliant and compatible. Throughout the comparative test program for ISA/TMG, Linux, Lotus Domino and WSEE, WCL utilized the following network configuration to simulate a corporate network environment: Kaspersky Security 8.0 for Microsoft Exchange Servers (Kaspersky Security 8.0) Kaspersky Security 8.0 provides antimalware and anti-spam protection for mail traffic on corporate networks. Its integration with Exchange allows for detection and removal of malware and spam at the gateway level. The product is easy to install and its userfriendly interface, flexible administration and straightforward configuration and reporting system does not place excessive demand upon administrator’s time. No extra setup is required on Exchange and malware protection began immediately. Management of the solution is simple as Kaspersky Security 8.0 employs a Microsoft Management Console (MMC) snap-in, providing an intuitive interface with full access to all features. Database and signature updates run automatically, as often as every two hours, but if required may be run on-demand. Although there are fewer options available compared to other corporate products on the market, it can be argued that all the necessary options are available thus leading to a streamlined user experience. ▼ DEVELOPER'S STATEMENT Kaspersky Lab has developed highly-effective anti-malware solutions for use in medium and large-scale corporate networks with complex topologies and heavy loads. Combining ease of use with high standards of performance across multiple attack vectors, the products are cost-effective solutions which meet both business and technical needs worldwide. Test Networks and Methodology In the ongoing Checkmark Certification Static and Real Time tests, like all the Kaspersky products, this solution has achieved consistently high standards of performance. For the comparative performance testing to measure the product’s detection capability of malware known to propagate over SMTP, Kaspersky Security 8.0 achieved 100% detection rate of the 8,042 malware samples used in the test. This performance is equivalent to and matches that of the competitor products included in the test. We also test HTTPS. ■ Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition Kaspersky Anti-Virus 8.0 sits on top of Microsoft Forefront TMG 2010. While TMG acts as a standalone security solution in its own right, the addition of Kaspersky Anti-Virus 8.0 provides a multilayered security solution. Installation of Kaspersky Anti-Virus 8.0 is simple, using a standard Windows Installer and settings imported from TMG during the install process. The default settings provide fast protection, but a more tailored installation can be achieved if required. The solution is managed via MMC with an additional central monitoring screen and network policies which can be be added to complement those of TMG; making the whole process of management, administration and ongoing use very straightforward. Kaspersky Anti-Virus 8.0 allows permission or denial of various traffic types – HTTP, FTP, SMTP and POP3 – plus the ability to define what, if any, of the protocols should be subject to scanning. Data on network status – including the protocols which are being blocked, numbers of files scanned, and the number of resulting infections, is readily available. In the performance testing over the HTTP and FTP attack vectors, the combination of Kaspersky Anti-Virus 8.0 and TMG provided 99% detection of the range of malware samples which were included in the test. ■ • 64-bit Windows 2008 machine running as a gateway/DNS server hosting Forefront TMG/ISA Server • 32-bit Windows 2003 machine running Lotus Domino mail server • 64-bit servers running Linux and Windows 2008, both acting as file servers. While each of the solutions were tested independently of one another, results of these tests and the observations made point to the various Kaspersky Lab solutions providing a multi-faceted security framework for a corporate network. Taking a hypothetical network into account, as below, one can see how each of the solutions would interact with and secure the network. Antimalware protection, at the gateway level, is provided by scanning email coming into the ‘corporate network’ over SMTP with an initial scan by Kaspersky Anti-Virus 8.0 sitting on the TMG server. In turn, the email is then received by the Exchange or Domino server and a further scan conducted by the appropriate solution. Should any user require the downloading of email from an external POP3 server, the Kaspersky for TMG solution scans the traffic as it passes through the gateway. When dealing with any files that are downloaded over HTTP/FTP, they are scanned on the TMG/KAV combined server. Should any network user then attempt to upload any files to either a Windows or Linux based file server, then here the respective Kaspersky Lab solution will provide further defensein-depth. 3 Technology Report www.westcoastlabs.com www.westcoastlabs.com Technology Report 4 ADVERTISEMENT ADVERTISEMENT Technology Report Kaspersky Lab Corporate Security Solutions WEST COAST LABS' EXECUTIVE SUMMARY REPORT The launch of the Kaspersky Lab’s range of anti-malware products for the corporate network environment provides security managers with an extended choice of effective solutions for dealing with threats in attack vectors across multiple operating systems. West Coast Labs’ independent testing and performance validation of the products confirm that they combine ease of use and management with high levels of performance, all of which is driven by Kaspersky Lab’s own research, development and customer support programs. Kaspersky Lab has made a significant commitment to the independent validation of its products’ efficacy and performance through West Coast Labs’ Checkmark Certification System. This provides a range of static, dynamic and real-time tests which make these Kaspersky solutions possibly the most intensively tested corporate anti-malware solutions available anywhere in the world today. Details of the specific tests to which the products are exposed are published elsewhere in this report, but the overall outcome of the certification testing is the achievement of the Platinum Product Award for these products, which is the highest level of independent validation possible for an anti-malware solution from West Coast Labs. This is complemented by very respectable malware detection test results which position the performance of Kaspersky Lab products very favorably alongside more widely recognized corporate security solutions. The specific malware detection capability testing of both Kaspersky Lab and a number of competitive anti-malware solutions was carried out in September and October 2010 while the Checkmark Certification testing of its products is performed on an ongoing basis with confirmation of the results available at www.westcoastlabs.com. ■ Kaspersky Security 8.0 update process In a heterogeneous network situation it is important to know that a security solution is both compliant and compatible. Throughout the comparative test program for ISA/TMG, Linux, Lotus Domino and WSEE, WCL utilized the following network configuration to simulate a corporate network environment: Kaspersky Security 8.0 for Microsoft Exchange Servers (Kaspersky Security 8.0) Kaspersky Security 8.0 provides antimalware and anti-spam protection for mail traffic on corporate networks. Its integration with Exchange allows for detection and removal of malware and spam at the gateway level. The product is easy to install and its userfriendly interface, flexible administration and straightforward configuration and reporting system does not place excessive demand upon administrator’s time. No extra setup is required on Exchange and malware protection began immediately. Management of the solution is simple as Kaspersky Security 8.0 employs a Microsoft Management Console (MMC) snap-in, providing an intuitive interface with full access to all features. Database and signature updates run automatically, as often as every two hours, but if required may be run on-demand. Although there are fewer options available compared to other corporate products on the market, it can be argued that all the necessary options are available thus leading to a streamlined user experience. ▼ DEVELOPER'S STATEMENT Kaspersky Lab has developed highly-effective anti-malware solutions for use in medium and large-scale corporate networks with complex topologies and heavy loads. Combining ease of use with high standards of performance across multiple attack vectors, the products are cost-effective solutions which meet both business and technical needs worldwide. Test Networks and Methodology In the ongoing Checkmark Certification Static and Real Time tests, like all the Kaspersky products, this solution has achieved consistently high standards of performance. For the comparative performance testing to measure the product’s detection capability of malware known to propagate over SMTP, Kaspersky Security 8.0 achieved 100% detection rate of the 8,042 malware samples used in the test. This performance is equivalent to and matches that of the competitor products included in the test. We also test HTTPS. ■ Kaspersky Anti-Virus 8.0 for Microsoft ISA Server and Forefront TMG Standard Edition Kaspersky Anti-Virus 8.0 sits on top of Microsoft Forefront TMG 2010. While TMG acts as a standalone security solution in its own right, the addition of Kaspersky Anti-Virus 8.0 provides a multilayered security solution. Installation of Kaspersky Anti-Virus 8.0 is simple, using a standard Windows Installer and settings imported from TMG during the install process. The default settings provide fast protection, but a more tailored installation can be achieved if required. The solution is managed via MMC with an additional central monitoring screen and network policies which can be be added to complement those of TMG; making the whole process of management, administration and ongoing use very straightforward. Kaspersky Anti-Virus 8.0 allows permission or denial of various traffic types – HTTP, FTP, SMTP and POP3 – plus the ability to define what, if any, of the protocols should be subject to scanning. Data on network status – including the protocols which are being blocked, numbers of files scanned, and the number of resulting infections, is readily available. In the performance testing over the HTTP and FTP attack vectors, the combination of Kaspersky Anti-Virus 8.0 and TMG provided 99% detection of the range of malware samples which were included in the test. ■ • 64-bit Windows 2008 machine running as a gateway/DNS server hosting Forefront TMG/ISA Server • 32-bit Windows 2003 machine running Lotus Domino mail server • 64-bit servers running Linux and Windows 2008, both acting as file servers. While each of the solutions were tested independently of one another, results of these tests and the observations made point to the various Kaspersky Lab solutions providing a multi-faceted security framework for a corporate network. Taking a hypothetical network into account, as below, one can see how each of the solutions would interact with and secure the network. Antimalware protection, at the gateway level, is provided by scanning email coming into the ‘corporate network’ over SMTP with an initial scan by Kaspersky Anti-Virus 8.0 sitting on the TMG server. In turn, the email is then received by the Exchange or Domino server and a further scan conducted by the appropriate solution. Should any user require the downloading of email from an external POP3 server, the Kaspersky for TMG solution scans the traffic as it passes through the gateway. When dealing with any files that are downloaded over HTTP/FTP, they are scanned on the TMG/KAV combined server. Should any network user then attempt to upload any files to either a Windows or Linux based file server, then here the respective Kaspersky Lab solution will provide further defensein-depth. 3 Technology Report www.westcoastlabs.com www.westcoastlabs.com Technology Report 4 ADVERTISEMENT ADVERTISEMENT Technology Report TrustPort AV Threat Manager r12 TrustPort CA DEVELOPER'S STATEMENT Threat Manager combines a full-featured network anti-virus solution with policydriven endpoint access control to protect networks from malicious software and unauthorized access. also saves valuable administration time and resources easing the burden on any overstretched IT department. The client is locally managed from either an intuitive GUI interface or from a central server, depending on the individual administrator's preference and the security policies are created and deployed from the Threat Manager server. There is also an update option, which enables the administrator to either run updates ondemand or decide to schedule them to suit. CA Threat Manager is specifically recommended for small to medium sized business models and is designed essentially to protect client machines residing on a corporate network. With its anti-malware protection, CA Threat Manager will provide an important and much needed extra layer of security your business deserves. The CA Threat Manager can be installed and managed via a central server, giving the administrator more time to concentrate on other tasks on the IT infrastructure. CA Threat Manager is a server-client solution and the installation can be managed via a separate executable installation. Alternatively, CA Threat Manager can be installed from a central server and as it is extremely straightforward and well documented, which is always an added benefit, the process can be accomplished with relative ease. This installation can be automated from a network-wide roll out and though the default options suffice there is some flexibility in the install options available. With a good variety of installation methods available and wide ranging system-support, Settings and options are available on the central server and if you are looking for a solution that provides a ‘good-fit’ with any existing network architecture, then CA Threat Manager can provide this. Product Threat Manager r12 Manufacturer CA Contact Details www.ca.com Certification www.westcoastlabs.com there are practically no pre-requisites needed other than those already found on a standard client machine for instance SP2 on XP Professional. CA Threat Manager can also be configured to automatically deploy to any systems joining the network for the first time for instance DHCP; this The test engineer recommends that for a uniform security policy set, across the network, then CA Threat Manager is best managed from the server, however it can be accomplished via the client, making it pretty flexible. With CA Threat Manager there is further flexibility with On-Access scanning that can be scheduled to suit the needs of the network or permanently activated/ deactivated. Also, On-Demand scans can be launched locally or via the central server. CA Threat Manager additionally provides real-time reports, giving users at-a-glance updates of the current network state while also offering all the options you would expect from this type of solution. WEST COAST LABS VERDICT CA Threat Manager offers a variety of deployment models and offers endpoint protection against malware. The central management console offers flexibility combined with good reporting over and allows for the overview of endpoints on a corporate network of small to medium size. 7 Technology Report www.westcoastlabs.com DEVELOPER'S STATEMENT TrustPort AV detects viruses and spyware at all entry points to the computer and prevents attempts by hackers to access the computer. It enables not only the continuous monitoring of files being opened, but at the same time also scans files from incoming electronic mail or downloaded from the web. This particular security solution is designed for home users and could also provide an invaluable layer of security for home workers or the self-employed. With its low system requirements, TrustPort is an ideal solution for providing malware protection for local files, web downloads and email, and also offers firewall protection along with a URL filter. TrustPort is installed and managed directly on the client as it is purely a client-side-only solution, making it user friendly for the less well initiated. Users can purchase and install TrustPort from a separate executable that is downloaded from the TrustPort website, with the license provided at the point of sale; making it extremely accessible. We all know the importance of ease of use with the single user client-based products and TrustPort doesn’t disappoint with a quick and painless installation that is easy to follow. The available options contain good descriptions and there is also some flexibility in the installation options available to the user, however if you are happy not usual scheduling as required, or if preferred they can be run on-demand. TrustPort also allows various actions to be configured for detected malware samples. WCL noted that the product management is in keeping with other products traditionally found in this category, however, it should be noted that what it actually does, it does very well. TrustPort is a security ‘bundle’ providing anti-malware protection for local files, email, and web. It also includes URL blocking and a firewall, enabling control of what can be viewed on the client. Product TrustPort AV Manufacturer TrustPort Contact Details www.trustport.com Certification www.westcoastlabs.com to tinker, all of the default options happily suffice. TrustPort supports all the usual Windows client platforms and the West Coast Lab’s (WCL) engineer stated that this traditional client-side installation manages everything with minimal fuss. The URL filter contains a variety of site classifications, such as adult and gambling, to prevent viewing this type of content if required and this product includes a ‘Portable Antivirus’ solution that allows a version of the TrustPort AV solution to be deployed to a USB stick, thus protecting any files you wish to transport; excellent for those on the move. Observations from the WCL engineers include comments on TrustPort being a really good all-round package with the ‘Portable Antivirus’ helping it stand out in an already crowded market. This type of capability is important for anyone relying on technology when on the move, and should not be underestimated as it will protect their credibility and keep their security in one piece when it could otherwise be compromised. The client is managed via a local GUI interface with the updates capable of the WEST COAST LABS VERDICT TrustPort AV is aimed at home users, but can equally offer protection for SOHO workers. Including anti-malware protection in the suite of protection that it offers, the solution is well documented and is easy to configure for flexible protection levels dependent upon the requirements of the individual user. www.westcoastlabs.com Technology Report 8 ADVERTISEMENT ADVERTISEMENT Technology Report IWSVA v5.1 IMSVA v5.1 Trend Micro Trend Micro DEVELOPER'S STATEMENT Trend Micro InterScan Messaging Security Virtual Appliance is a hybrid SaaS email security solution that integrates an onpremise virtual appliance with in-the-cloud SaaS email security. On the initial configuration of IMSVA, local firewall rules permitting, customization of the solution is carried out via the web-based GUI, which can be accessed anywhere on the network. The West Coast Lab’s engineer again commented on the excellent web-based GUI, however, emphasized that access to the management interface will depend upon existing firewall rules. IMSVA is designed specifically for enterprise size business models. It provides traditional malware protection, but it does not stop there, with the addition of extended technologies, such as firewall, web threats and POP3 scanning. IMSVA ensures a cloak of security for any credible business looking to secure itself from potentially damaging security breaches. This also gives the administrator peace of mind in knowing that no glitches will occur in this security as there will not be any issues with compatibility. The IMSVA solution is initially installed on the server and can then be managed from there; this is prior to rollout to the endpoint clients. The security policies are also managed on the central server then pushed out to the client machines, so the administrator does not have to configure each individual client machine, saving time and money. Designed for VMware ESX/ESXi servers IMSVA is a virtual machine with the images being loaded into the ESX Hypervisor server. IMSVA does require some basic setup via a Linux-based command line when running the virtual machine for the first time. Product IMSVA v5.1 Manufacturer Trend Micro Contact Details www.trendmicro.com Certification www.westcoastlabs.com http://www.cctmark.gov.uk/ As our engineer observed during his initial encounter with it, the IMSVA setup and configuration is carried out via a web-based GUI. Of course, for any administrators with experience of Trend's IMSS and IWSS solutions, utilizing a web GUI will already be familiar to them, and for those with limited or no such experience, it still offers ease-ofuse. Providing full anti-malware capability, as well as providing URL filtering for those URLs found inside emails, IMSVA has the same malware capability as IWSVA while also providing anti-spam support. Working at the gateway level, IMSVA scans inbound traffic before it reaches the endpoint and blocks any traffic it finds to be malicious, thus protecting the whole enterprise. This ensures nothing is left to chance and endusers are not bogged down with header messages they understand little about or decisions on what is expected of them in respect of malicious and unwanted email. The West Coast Labs' engineer also commented on the product's overall ability as a solid, reliable gateway-level defense. This is an important point, as any experienced IT manager will tell you, having full confidence in the security product's capability along with ease of use goes a long way when you have a large network to run. WEST COAST LABS VERDICT Trend Micro's IMSVA solution comprises a virtual machine that handles messaging traffic and includes a number of core technologies, such as spam, anti-malware and anti-phishing. These are combined to offer a scalable and flexible solution which can be deployed in a number of network scenarios. 9 Technology Report DEVELOPER'S STATEMENT Trend Micro InterScan Web Security Virtual Appliance is a consolidated web security solution that combines awardwinning malware scanning, real-time web reputation, powerful URL filtering, and integrated caching. As with IMSVA, IWSVA is designed for the enterprise. IWSVA is installed and managed directly on the server with no further client installations necessary. The security policies are also managed on the central server and pushed out to the client machines to allow IWSVA to provide traditional malware protection, as well as incorporating extended technologies such as firewall, web threats and POP3 scanning. These are all indispensable components of a versatile security solution and the centralization provides the ease of use and flexibility administrators have come to expect, especially useful when running a large network efficiently. Designed for VMware ESX/ESXi servers, this is a virtual machine, with the virtual images being placed on the ESX Hypervisor server. IWSVA requires some fairly basic setup via a Linux-based command line when you run the virtual machine for the first time, but again, this is an uncomplicated process; and as you’d expect with a virtual machinebased technology the product's setup and configuration is carried out via a web- not so experienced, it should still prove easy to use and therefore it does not limit you to a specific member of your IT staff being on hand. This, as described by the WCL engineer, is again a good user-friendly web-based GUI, but he also observed that access to the management interface will depend upon any existing firewall rules, which is important to remember when setting up IWSVA for the first time. Product IWSVA v5.1 Manufacturer Trend Micro Contact Details www.trendmicro.com Certification www.westcoastlabs.com http://www.cctmark.gov.uk/ based GUI. With the ability of accessing it anywhere on the network, local firewall rules permitting, IWSVA customization may be carried out via the web-based GUI once the initial configuration has been accomplished. IWSVA not only provides full anti-malware capability, but also provides URL filtering; it also offers the same malware capability as IMSVA. Working at the gateway level, IWSVA scans all of your enterprise's inbound traffic before it reaches the endpoint and blocks any traffic it finds suspicious so that malicious entities are blocked and your systems remain secure. This requires no client-side intervention and is therefore less prone to user error. West Coast Labs found that during test that this was again a solid, reliable gatewaylevel defense solution worthy of the job in hand. So overall, IWSVA offers a wellrounded security blanket protecting the enterprise at the gateway, which frees up IT staff to concentrate on other business at hand. For any administrators familiar with Trend's IMSS and IWSS solutions they will be accustomed to the web GUI, but for those WEST COAST LABS VERDICT Trend Micro's IWSVA solution offers the ease of virtualization and the flexibility to handle web traffic in a number of types of network. The technologies at work that contribute to the operation of this solution include anti-malware, and URL content filtering, and allow for very fine grained control. www.westcoastlabs.com www.westcoastlabs.com Technology Report 10 ADVERTISEMENT ADVERTISEMENT Technology Report OfficeScan v10.0 ScanMail for Exchange v10.0 Trend Micro Trend Micro DEVELOPER'S STATEMENT Trend Micro OfficeScan is a comprehensive endpoint security and malware protection solution for medium sized businesses and enterprises and is normally used in a clientserver configuration. If you are an administrator running an enterprise and you are charged with finding a suitable security solution, how do you weigh up the protection you require without compromise? With OfficeScan you can protect the enterprise by providing traditional malware protection, incorporating extended technologies – such as firewall, protection from web threats and POP3 scanning – all in one solution. This must make OfficeScan one such product worthy of noting to IT administrators. OfficeScan is installed and managed on the server, and when ready to deploy it is simply rolled out to your endpoint clients to provide the layer and level of security required. With security policies managed on the central server, the administrator can push them out to the client machines, making it an easy task to accomplish - job done. Simply put, OfficeScan is a server-client solution and OfficeScan is initially installed on a central server before being sent out to the client machines around the network. Deployment can be carried out either by targeting specific client machines from the server console, downloading the install It was also noted that OfficeScans has pretty low system requirements and that it also offers good support to the virtual desktops. Product OfficeScan v10.0 Manufacturer Trend Micro Contact Details www.trendmicro.com Certification www.westcoastlabs.com http://www.cctmark.gov.uk/ package to the client, or by incorporating the solution utilizing the Active Directory. The client installation is silent, so neither the administrator nor the end-user has to intervene on the client machine and, as you’d expect, OfficeScan supports all common Windows client platforms, as well as VMware workstations. During installation, the engineer commented on the various choices and variables available as deployment methods. OfficeScan is managed via an MMCstyle interface with all common options available, such as scanning actions, schedules and targets, with various security policies being catered for; so in all this is a versatile product. Although there is nothing revolutionary in the way that OfficeScan is managed, it certainly does not detract from the solution in any way. It does however seem to pack a lot into one package. As its name suggests, OfficeScan provides protection against viruses, trojans, spyware and rootkits, with the further inclusion of firewall, web threats and a hostintrusion prevention, so in all this is a fairly comprehensive barrier against potential threats. OfficeScan can also scan inbound POP3 traffic. This product utilizes the Trend SPN system to provide cloud-based detection of malware. During WCL’s extensive testing, the engineer observed that OfficeScan really did offer a good level of defense and he also said it was in-depth, with numerous combined security technologies included. That has to put OfficeScan in a strong position, with its comprehensive security, as being a solution worthy of a place in any security-conscious enterprise. WEST COAST LABS VERDICT Trend Micro's OfficeScan offers anti-malware technology at its core, with the possibility of central reporting and administration in an enterprise level setting. The deployment and management of remote endpoints is streamlined through the central management GUI offering an easy way for IT staff to ensure that hosts are protected. 11 Technology Report DEVELOPER'S STATEMENT Trend Micro ScanMail for Microsoft Exchange provides Industry-leading scan engines to help stop the widest possible range of threats, while innovative Web Reputation and Email Reputation technologies use a unique cloud-client architecture accessing up-to-the-minute threat intelligence to thwart the latest attacks. ScanMail for Exchange is designed as an umbrella for email protection, including content filtering, spam, recipient filtering, URL detection (within emails) and phishing, which is specifically produced for enterprises running Exchange servers. ScanMail for Exchange is an obvious choice for securing your incoming content as the system requirements are relatively low when considering the security this solution provides and the market it's aimed at. This particular product is installed and managed on the server. While ScanMail for Exchange can be deployed to the Exchange server if necessary, it is also a server-based solution with no client-side aspect. The installation itself is carried out directly on the server and can be placed on the Exchange server, however this is not recommended for the larger business model because of the impact on resources, but if so required, the option is there. At the installation stage, a number of possible The engineer commented on ScanMail for Exchange's good installation routine, effective deployment and integration options; something to be considered when deciding on time to deploy. Product ScanMail for Exchange v10.0 Manufacturer Trend Micro Contact Details www.trendmicro.com Certification www.westcoastlabs.com http://www.cctmark.gov.uk/ configurations can be achieved, however the main installation routine itself is welldocumented. Although, some experience with Exchangebased systems will be necessary, this is assumed given the target market. ScanMail for Exchange supports a number of Windows server platforms and Exchange versions, providing support for various network configurations, such as Server 2000/3/8 and Exchange 2003/7/10. Managed via an MMC-style interface, ScanMail for Exchange offers numerous options for each of the available features, which can be tailored to fit a range of company security policies. Of course, all the usual options are available, such as scanning, schedules and targets. Administrators take note, the engineer says the numerous configuration options are very useful and will help tailor the protection on offer, so you can ensure your systems are protected to the enterprise's requirements. ScanMail for Exchange also provides protection in an email ‘reputation filter.' This allows emails from a list of known ‘unwanted senders’ to be automatically blocked, saving valuable time and resources. With the ability to scan emails for URLs/links to known-bad or malicious websites and to block any that are found, this increases its effectiveness somewhat. According to the West Coast Lab engineers, ScanMail for Exchange incorporates into Trend Micro's Smart Protection Network (SPN) which adds to the level of protection on offer. WEST COAST LABS VERDICT Trend Micro's ScanMail – here considered in the integration with Microsoft Exchange Server – offers gateway protection against email-borne threats. It includes all the components that might be expected, such as anti-spam, anti-malware and phishing protection, administered with ease through a central management console. www.westcoastlabs.com www.westcoastlabs.com Technology Report 12 ADVERTISEMENT ADVERTISEMENT Technology Report SecureWeb Webroot Web Security Service K7 Computing Webroot DEVELOPER'S STATEMENT K7 SecureWeb provides end-to-end protection for personal information right from the keyboard to the website and specifically aims to secure online transactions. Designed to provide end-to-end protection for personal information – such as username, password, and credit card – right from the keyboard to the website, and to secure online financial transactions. In addition to protecting internet users against various threats, such as screenscrapping and keylogging, SecureWeb also provides SSL certificate verification and website authentication. And the automatic browser launch is a great feature as it prompts users whenever they browse to online bank and shopping websites. SecureWeb was tested using a network consisting of a primary network attached directly to the internet and a secondary, aggressor network. A standard desktop machine was used as the host for SecureWeb housed on the primary network. To prevent theft of passwords and bank details SecureWeb provides an additional layer of security. It does not provide antivirus or URL filtering, however, what it protects is done extremely well. To protect against keyloggers, SecureWeb encrypts all keystrokes so that any data that is captured is unintelligible. When dealing with screen grabbers, West Coast SecureWeb address space and as such all user data remained protected. SecureWeb also protects against the threat of DNS poisoning, which alters the IP address associated with the URLs for such sites, so that a user is instead directed to a website controlled by the attacker. Product SecureWeb Manufacturer K7 Computing Contact Details www.k7computing.com Certification www.westcoastlabs.com Labs found that each screenshot was redacted so that any potential attacker captures a blank screen. DLL injection can disrupt a security solution and lead to the theft of user data. Attackers will often target the solutions themselves as a first port of call to try to circumvent protection on a local machine, whether this is anti-virus, URL/website filtering or data protection. In order to protect against this, SecureWeb continuously monitors its own processes for signs of malicious behavior. WCL's engineers attempted to load malicious and harmful DLLs, but were unable to inject malicious code into the To test, a list of well-known e-commerce and financial domain names were added to the host's file. Each domain was associated with an IP address of various web servers owned and controlled by WCL. However, SecureWeb does not rely on information contained within the system's host files. All attempts to redirect SecureWeb to an incorrect webserver/webpage proved unsuccessful. Many transaction websites use SSL certificates (HTTPS) for privacy assurance. But, attackers will often try to create fraudulent certificates to pass-off spoofed versions as legitimate. SecureWeb provides a means of checking the authenticity of SSL certificates, reporting if they are self-signed and therefore not legitimate. To display this information, SecureWeb employs a SiteBand™ that uses colored warnings to provide an at-a-glance report on whether the site can be trusted or not. Throughout testing, SecureWeb accurately identified those sites that were using legitimate SSL certificates from those that weren't. DEVELOPER'S STATEMENT With up to 85% of malware now distributed via the web, proactive web security is a necessity. Webroot Web Security Service provides better manageability and better malware protection than on-premise solutions. Organizations can get the most advanced protection against viruses, spyware, phishing and data loss while easily enforcing internet acceptable use policy—all without the hassle of purchasing and managing additional hardware and software. Webroot Web Security Service is recommended for the larger business and enterprise-sized models and as its name suggests is a managed solution, therefore there is no hardware requirement. Webroot Web Security Service (WWSS) provides gateway-level security to protect against web-based threats as a managed service. These threats could include file downloads and URL filtering, which can be a real headache for corporate credibility. WWSS is managed from a web-based interface with each client machine being directed to use the proxy address of WWSS. As far as setting up the service, it is an extremely quick and easy affair and requires an administrator providing basic network information to Webroot. Various settings can be defined by the administrator, such as which URL categories to block, the amount of time each user is permitted to spend online as well as giving information to the user of their WEST COAST LABS VERDICT K7 SecureWeb is a good example of a solution to a specific problem that fulfills its remit very well. This is not a general use web browser, but in terms of protecting users when entering financial details it has been shown to succeed. 13 Technology Report www.westcoastlabs.com Product Webroot® Web Security Service Manufacturer Webroot Contact Details www.webroot.com Certification www.westcoastlabs.com company's individual internet acceptable use policy. The deployment to client machines is also completed quickly and as already noted, as a managed service the installation is almost non-existent. The West Coast Lab’s engineer commented that once the account has been finalized with Webroot, end-user machines simply have to be configured to begin using the Webroot service. As far as the management of the service, this is accomplished remotely by logging into the Webroot management portal allowing protection and internet use policies to be created and rolled out rapidly. As the service is hosted by Webroot, there is no need for the administrator to run updates for either software or security definitions, making it less time-consuming. As WCL’s engineer pointed out, although management is only possible via the web interface, the options available do allow for a tailored approach. The scanning and features available to the network include provision for URL and content filtering, and uses preset categories. Vulnerability scanning has also been added to the service, however, this aspect was not tested by WCL. In addition, WWSS also provides antiphishing protection as well as standard malware scanning. During testing, WCL’s observation was that it offered a good multilayered protection against a range of web-based threats. The Checkmark testing WWSS underwent was on the AV Gateway certification, the Real Time system for malicious URLs and WWSS also passed WCL's Web Threats certification making it a platinum product. WWSS promises fast internet browsing with minimal latency, a proactive scan ahead and safe search facility that colorcodes search engine results to allow users to see if the sites are allowed, blocked or could contain malware. There is also realtime reporting and web activity logging; this can be used to view the network or individual users or groups, providing flexible viewing of network activity. Add all that to the rapid deployment of WWSS across your entire network, which requires no software or hardware purchase, and the ability to use preconfigured policy options based on your chosen level of security, and you can see that all in all a managed service could provide a viable alternative to reduce IT resources and offer costeffective security fast. WEST COAST LABS VERDICT Webroot’s Web Security Service offers web threat protection as a managed service and protects against a variety of threats whilst allowing the administrator central control through a web portal. The use of a managed service also means that administrators no longer need concern themselves with remembering updates. www.westcoastlabs.com Technology Report 14 ADVERTISEMENT ADVERTISEMENT Technology Report Shell Control Box (SCB) syslog-ng Store Box (SSB) BalaBit DEVELOPER'S STATEMENT The Shell Control Box by BalaBit is an activity monitoring solution for privileged access that controls access to remote servers, virtual desktops, or networking devices, and records the activities of the users accessing these systems. One of the two BalaBit products to be reviewed under West Coast Lab’s (WCL) new Performance Validated program is Shell Control Box (SCB). As with syslogng Store Box, the SCB test allowed WCL to provide an independent review of the solution. BalaBit Product Shell Control Box (SCB) Manufacturer BalaBit Contact Details www.balabit.com Certification www.westcoastlabs.com WCL downloaded SCB from the BalaBit website as a virtual machine, then SCB was imported onto a server running VMPlayer. Before full deployment, SCB requires basic network configuration (Host IP address, gateway address, and so on) and the license is imported to SCB at the end of the initial configuration. to integrate with ease, offering high availability and is configured via a clean, intuitive web interface. The roles of each SCB administrator are clearly defined using a set of privileges. SCB receives connection attempts for a specific target host then forwards the connection. The solution enables the creation of rules allowing the administrator to permit or deny connections based on set criteria, and provides for the auditing of network connections. SCB also works in conjunction with BalaBit’s Audit Player to allow logged network traffic to be replayed in real time and supports the following protocols: Secure Shell (SSH), Remote Desktop (RDP), Telnet and terminal emulators using the standard TN3270, VNC and VMware View. WCL only examined the following during the test period: VNC, RDP, SSH, and Telnet. SCB is an independent appliance designed The recorded audit trails can be replayed To test SCB, WCL was provided with a x2200 Sun Microsystems server running SCB. WCL also tested a virtual version of SCB. Testing of the SCB solution was conducted on a custom-built network at WCL’s UK facility. The network itself consisted of a variety of client and server machines running a range of both Windows and Linux-based operating systems. like a movie using the aforementioned Audit Player enabling a review of events exactly as they occurred. The audit trail is indexed to make searching for events and automatic reporting possible, enabling identification of misconfigurations and other human errors during forensics analysis. SCB works in conjunction with network firewalls and can supplement further security devices benefiting network and IT security administrators by controlling all remote connections on a given network. SCB acts as a proxy gateway, and any transferred connections and traffic are inspected on the application level (Layer 7 in the OSI model) giving control over protocol features such as the authentication and encryption methods or permitted channels. In order to test SCB it was necessary to establish inbound connections over a network to a specific machine. VNC, SSH, RDP and Telnet connections were established; each of the connection types and combinations were tested using access control lists. These included machines with various access permissions and, once connections had been established, WCL also tested the solution’s ability to terminate the connections successfully. WCL then replayed the network traffic logs through the Audit Player for verification. DEVELOPER'S STATEMENT The syslog-ng Store Box (SSB) from BalaBit is a network log server that offers the capability to remotely collect and store logging entries and records from a variety of sources, including syslog and SNMP, and is designed to run alongside other security products. As part of its Performance Validated testing program, West Coast Labs (WCL) reviewed the syslog-ng Store Box (SSB) solution from BalaBit. The aim of the testing was to provide an independent means of validating the features and capabilities of SSB. To test SSB, WCL was provided with a x2200 Sun Microsystems server running SSB. WCL tested a virtual version of SSB, deploying the virtual machine SSB image that had been downloaded from the BalaBit website under the VMware Player application. This deployment of the machine was straightforward, and should prove simple to anyone familiar with networking or virtualization technologies. On first boot, SSB requires some basic network configuration, such as designated IP, gateway and DNS addresses along with the application of the SSB license key. With this complete, the administrator is free to log in to SSB, via a web browser, and to begin any required customization of the solution. WEST COAST LABS VERDICT Testing of the SCB virtual machine showed that all connections were received and handled correctly, the administrator was able to terminate established connections and the logged files were 100% accurate. Tests also showed the capability of Audit Player to recreate the data from the session in an accurate movie-like format. 15 Technology Report www.westcoastlabs.com Product syslog-ng Store Box Manufacturer BalaBit Contact Details www.balabit.com Certification www.westcoastlabs.com The test networks on which SSB was evaluated contained client machines running Windows XP along with AV software, various network security appliances, and a number of routers. Added to this were aspects of WCL’s proprietary Real Time system. SSB’s ability to monitor, in real time, the incoming log files and flag any that do not match an expected pattern makes it extremely useful; providing an early indicator to any deviation in network traffic and/or usage. While not a security solution in its own right, SSB can work in conjunction with those security solutions already deployed to a given network and provide a means of monitoring any security events that may occur. SSB allows the administrator to capture redirected log files from various devices such as routers, security appliances, and various servers. These logs can be either analyzed, using integral tools, or stored for later retrieval. Use of a proprietary encryption algorithm means that only authorized personnel can access information via the SSB interface. Log files can also be redirected to either a separate analysis device, or to a different log server. To test SSB’s ability to correctly receive log files, traffic from client machines residing on the Real Time system were configured so that logs relating to system restarts, network events and so on were redirected to SSB. Gateway security appliances, one on the Real Time system and one on a separate network, were configured to deliver all logs to SSB. A group of client machines, residing on a separate WCL network, had BalaBit’s client software deployed to them in order to capture and forward client logs to SSB. To validate SSB’s ability to manage and secure the log files received by the solution, WCL ran tests to ensure all log files received from the various networks were correctly captured. Searches were run looking for known, specific log events such as machine restarts and network security events. WCL also attempted to open log files locally, without the use of the SSB interface, and found that the controls in place allowed access only via the interface, as expected. Log files were not human readable when accessed directly from the underlying operating system. WEST COAST LABS VERDICT SSB received several thousand logs, all from various sources, and WCL concluded that all log files were received with a 100 percent success rate. All log files that were received were accurately classified and grouped. www.westcoastlabs.com Technology Report 16 Product Section McAfee Sourcefire NetVigilance Full-scale and configurable Network awareness suite P65 Scanning from the outside in P57 Keeping the bad guys out T his month we are looking at two groups that, at first blush, don’t look as if they belong together. However, the idea of managing intrusions is a complicated one that would be good to simplify. If we think of intrusion management in four layers, we have avoidance, assurance, detection and investigation. That last category sometimes is subdivided into investigation and recovery. Our two groups this month fall directly into this framework. Our IDS/IPS group addresses detection and avoidance, while vulnerability analysis addresses assurance. So IDS addresses detecting attempts at intrusion, IPS is a mechanism for avoiding the consequences of an intrusion, and vulnerability assessment (VA) is what we do to ensure that IDS and IPS are functioning properly. All of these tools can help us in our investigation and recovery as well. Vulnerability and penetration testing can tell us where weaknesses exist in our enterprise. That would, logically, be the starting point for any intrusion investigation. They also tell us how to remediate. In fact, many of today’s VA tools are morphing toward vulnerability management, and that is the epitome of the vulnerability aspects of intrusion management. While I doubt that the IDS, as a notify-only tool, has much life left in it, I see no end in sight for traditional vulnerability and penetration testing tools. The reason is simple: response. The IDS, plus human response, is way too slow for today’s attacks and nowhere near discriminating enough for subtle attacks that are becoming the rule rather than the exception. An automated system, properly tuned, is going to become – if it hasn’t already – the only sane approach to the problem. Not so with VA and pen test tools. What we are most likely to see is VA tools morphing into a combination of vulnerability and penetration testing. There already has been some of that and, in fact, some moves in the other direction as well: pen test tools embracing VA. Sophisticated analysis of exploitable vulnerabilities will always, in my view, require human ingenuity and intervention. Vulnerability management is a necessary function in today’s enterprises, just as the IPS is. But unlike the IPS, vulnerability management can’t carry the whole load by itself. Yet. —Peter Stephenson, technology editor Previous P58 How we test and score the products Our testing team includes SC Magazine Labs staff, as well as external experts who are respected industry-wide. In our Group Tests, we look at several products around a common theme based on a predetermined set of SC Labs standards (Performance, Ease of use, Features, Documentation, Support, and Value for money). There are roughly 50 individual criteria in the general test process. These criteria were developed by the lab in cooperation with the Center for Regional and National Security at Eastern Michigan University. We developed the second set of standards specifically for the group under test and use the Common Criteria (ISO 1548) as a basis for the test plan. Group Test reviews focus on operational characteristics and are considered at evaluation assurance level (EAL) 1 (functionally tested) or, in some cases, EAL 2 (structurally tested) in Common Criteria-speak. Our final conclusions and ratings are subject to the judgment and interpretation of the tester and are validated by the technology editor. All reviews are vetted for consistency, correctness and completeness by the technology editor prior to being submitted for publication. Prices quoted are in American dollars. What the stars mean Our star ratings indicate how well the product has performed against our test criteria. ★★★★★ Outstanding. An “A” on the product’s report card. ★★★★ Carries out all basic functions very well. A “B” on the product’s report card. ★★★ Carries out all basic functions to a satisfactory level. A “C” on the product’s report card. ★★ Fails to complete certain basic functions. A “D” on the product’s report card. ★ Seriously deficient. An “F” on the product’s report card. LAB APPROVED What the recognition means Best Buy goes to products the SC Lab rates as outstanding. Recommended means the product has shone in a specific area. Lab Approved is awarded to extraordinary standouts that fit into the SC Lab environment, and which will be used subsequently in our test bench for the coming year. February 2011 • www.scmagazineus.com • 51 Next GROUP TEST l Vulnerability assessment Vulnerability assessment Product PICK OF THE LITTER Again this year, we are pleased to select Core Impact Professional as SC Lab Approved. For top value, performance and ease of use, we make netVigilance Internal Scan – Cloud Edition our Best Buy this month. Solid performance and a full feature set make Critical Watch FusionVM Virtual All-in-One Appliance our Recommended product for vulnerability management. For its solid performance and value, SAINT integrated vulnerability assessment and penetration testing is our Recommended choice for vulnerability assessment and pen testing. Another perennial favorite, Tenable Network Security Nessus ProfessionalFeed, is our Recommended choice for pure-play vulnerability assessment. LAB APPROVED Previous V ulnerability assessment has been one of my favorite groups for as long as I’ve been writing this section. I have enjoyed watching the market grow and change for several years. This year we are seeing a more mature market than in previous years. The products that we saw this year are the most capable ever. That’s the good news. The bad news is that it was extremely difficult to select a Best Buy and a Recommended product. All of the products we ran through the lab performed beautifully, did exactly what they claimed to do, and were extraordinarily easy to use. With that in mind, we selected one Best Buy and three Recommended products, along with an SC Lab Approved product. The Recommended products are in pure-play vulnerability assessment (VA), hybrid VA and penetration testing and vulnerability management. The VA market is evolving into three segments: pure-play vulnerability assessment, combined VA and pen testing and vulnerability management. I have taken the position in the past that most VA products would, eventually, evolve into vulnerability management tools. I missed that one, but only by a little. There are some vendors that have focused on making their products the best they can be within their domain. These vendors have no inter- est in moving their pure-play products into the vulnerability management domain. Looking at these tools, we fi nd that they are beginning to improve beyond simply adding more vulnerabilities. In a VA of a large distributed enterprise, there are numerous challenges. Some of those include accessing the network, selecting device candidates and maintaining currency with exploits. Today’s pure-play VA tools focus on ease of use, VA functionality and certainty that they have the latest vulnerabilities covered. Almost all serious VA tools have references for common vulnerabilities and exposures (CVE), Bugtraq and other vulnerability sources. This allows a closer inspection of potential remediation beyond the short suggestions given by the tool. More and more, we also are seeing references to CVSS – Common Vulnerability Scoring System. This is a standardized scoring system that helps one determine the real level of seriousness of the hole. This is vastly superior to the vendorspecific scoring systems that are inconsistent from vendor to vendor. Just remember that the CVSS as shown usually is only the base score. That is because the full score adds the dimension of the environment. This takes us to the concept of risk. I have ranted about the misuse of this term by VA vendors for years. Vulnerabilities are vulnerabilities. They are 52 • February 2011 • www.scmagazineus.com 䢇=yes 嘷=no Specifications for vulnerability assessment tools With the evolution in today’s array of tools, the enterprise can now have vulnerability assessment any way it wants, says Peter Stephenson. not risks. In order for a risk to exist, there must also be a threat and an impact. That is where the CVSS comes in. The National Institute of Standards and Technology (NIST) has a CVSS calculator at http://nvd. nist.gov/cvss.cfm?calculator. I highly recommend using it. There are three components to a full CVSS score: base, environmental and temporal. Loosely, we can think of the base as the level of the vulnerability, the environmental as the impact, and the temporal as the threat. When we talk about vulnerability management, we generally expect to see some form of VA scan automation, automatic analysis and reporting – much as with a pure-play VA tool – some form of patch management or other type of remediation management and, on the most complete tools, some way of automatically retesting to make sure that the remediation took. A capable vulnerability management tool needs solid, detailed reporting to meet regulatory reporting requirements. In a full-fledged vulnerability management program, one will want either a VA tool or a vulnerability management tool – depending on the enterprise – as well as a penetration test tool. Pen testing is critical to validating vulnerabilities for reachability, exploitability and whether they need to be part of a chained exploit or may be exploited alone. Scans Windows systems Scans Linux systems Scans Mac systems » » PRODUCT SECTION Shows remediation information Performs remediation Performs configuration auditing Performs penetration testing Core Security Technology Core IMPACT Professional v11 䢇 䢇 䢇 䢇 嘷 䢇 䢇 Critical Watch FusionVM Virtual All-in-One Appliance 䢇 䢇 䢇 䢇 嘷 䢇 嘷 Cyberim Limited Dragonsoft Vulnerability Management v4.3 䢇 䢇 嘷 䢇 䢇 䢇 嘷 eEye Digital Security Retina CS v2.0 䢇 䢇 䢇 䢇 䢇 䢇 嘷 GFI LANguard v9 䢇 䢇 䢇 䢇 䢇 䢇 嘷 Lumension Scan v6.4.8 䢇 䢇 䢇 䢇 䢇 䢇 嘷 ManageEngine Security Manager Plus v5.5 䢇 䢇 嘷 䢇 䢇 嘷 嘷 McAfee Vulnerability Manager v7.0.1 䢇 䢇 䢇 䢇 䢇 䢇 䢇 netVigilance Internal Scan - Cloud v1.9.298 䢇 䢇 䢇 䢇 嘷 䢇 嘷 SAINT Enterprise SAINTbox v7.5 䢇 䢇 䢇 䢇 嘷 䢇 䢇 SecPoint Penetrator v7.7.9 䢇 䢇 䢇 䢇 䢇 嘷 䢇 Tenable Network Security Nessus ProfessionalFeed v4.4 䢇 䢇 䢇 䢇 嘷 䢇 嘷 February 2011 • www.scmagazineus.com • 53 Next Core Impact Professional Vendor Core Security Technologies Price Annual subscription license starts at $30,000 Contact www.coresecurity.com very year we look at this group and, whether we mean to or not, Core Impact Professional becomes our benchmark. First, the premise behind this product has always been efficient penetration testing. That is what it does, what it focuses on, and how its developers present it to the market. This philosophy has worked well for Core. Impact Professional is, at first blush, an extremely capable pen testing tool. But it really is a lot more. Integration with a vulnerability scanner is an option and it can do a penetration scan or one can select individual exploits. This allows a tiered approach to pen testing for large organizations. Operational personnel can perform regularly scheduled penetration scans and vulnerability specialists can pick up after the scan and perform more in-depth analysis. Core Impact Professional covers network vulnerabilities, email, Wi-Fi and web applications. Client-side vulnerabilities also can be simulated, allowing a full picture of exploitable vulnerabilities in today’s enterprises. The depth into which a E Previous penetration tester can go with this product is another solid benefit. Since exploit scripts are accessible and written in a standard language, the tester can modify them or create entirely new ones. This allows development of tests for zero-day exploits as they are discovered. Documentation is complete. Allowed IP ranges are embedded in the product on a percustomer basis, limiting the likelihood that the tool will be used improperly by a rogue employee. We have used Impact Professional in the SC Lab for the past few years and have found its performance to be first rate even on underpowered platforms. For pen testers on the go, laptop installation is no problem. That said, it will use all the resources that one allows it, so if installed on a large, powerful computer, it works with blazing speed. We also have used it successfully in a VMware vSphere 4.x environment. Core Impact Professional is not cheap, but given its performance, support and ease of use – which is considerable – we fi nd it to be an excellent value. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ OVERALL RATING ★★★★★ Strengths Power, flexibility, ease of use...this one has it all. Weaknesses None that we found. Verdict Again this year, we are pleased to select Core Impact Professional as SC Lab Approved. GROUP TEST l Vulnerability assessment FusionVM Virtual All-in-One Appliance Vendor Critical Watch Price $19,900 for 500 IPs Contact www.criticalwatch.com usionVM from Critical Watch provides a full-featured vulnerably management and configuration auditing platform that can be customized to manage vulnerabilities throughout the enterprise. With this product, an administrator can find and manage vulnerabilities throughout the environment based on customizable policies that can be set up with a few clicks. This tool can be deployed as hybrid software-as-a-service (SaaS) or as an all-in-one virtual appliance. The appliance itself is installed into VMware ESX Server as an Open Virtualization Format (OVF) template. After the template is deployed as a virtual machine, there is some brief configuration to be done to set IP and network information. Further configuration is done though the easy-to-use web GUI. This product provides a multitude of vulnerability management tasks beyond just simply scanning and reporting back flaws. Administrators can easily set up an organizational tree and hand out remediation tasks based on specific groups or users. The FusionVM also can interface with a TippingPoint IPS to help finetune both the IPS itself, as well as tune scan results based on F 54 • February 2011 • www.scmagazineus.com already existing IPS filters. Documentation included an installation guide and a full user manual, both in PDF format. The installation guide, with clear step-by-step instructions and screen shots, illustrates the steps necessary to get the virtual appliance downloaded and running on an ESX Server. The full user manual provides a good amount of detail on configuring the product after deployment, setting up scans and managing users and remediation tasks. We found all the documentation to be easy to understand. Critical Watch offers annual agreements that include phone and email support, as well as access to vulnerability updates and an early warning service. Users also can fi nd a large research library built into the GUI. With a price just shy of $20,000 for 500 IP addresses, this product does have a decentsize price tag, but we find it an excellent value for the money based on its solid ease of use and management flexibility. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ OVERALL RATING ★★★★★ Strengths Easy-to-use vulnerability scanning and management with many flexible options. Weaknesses None that we found. Verdict Solid performance and a full feature set make this our Recommended product for vulnerability management. DragonSoft Vulnerability Management Vendor Cyberim Limited Price Starting at $7,140 Contact www.dragonsoft.com he DragonSoft Vulnerability Manager provides network scanning, vulnerability evaluation, centralized risk assessment, reports and remediation in one easy-to-use tool. With this tool, an administrator can easily launch various types of scans from the simple management interface to target and pinpoint vulnerabilities throughout the environment. Installation is straightforward and is done via a short wizard. After installation is complete, scans are configured and run from the application itself, and can be installed on a Windows XP or Server operating system. We found the application to be quite simple and easy to navigate. Launching top-level scans is seamless with a few scan templates already built in. This product allows some indepth scanning right out of the box as it comes with many policy templates ready to go. These policies can be modified to meet the needs of the organization, or a policy can be built from scratch to provide even more flexibility and granularity. It also comes with a built-in wizard that allows administrators to run configuration audits quickly and easily. T The only thing we found to be a little daunting was sometimes the interface temporarily froze for a few seconds when navigating through the dialog boxes. Documentation included a user guide, which details the full product lifecycle from installation through configuration and management. We found the documentation to be well organized and easy to follow. Cyberim offers no-cost, 90-day, telephone-based installation support included with the purchase. Further support can be acquired as part of an annual agreement, which includes 24/7 phone and email aid. Customers also can access various technical resources via the website at no cost. With a price starting just over $7,000, we fi nd this tool to be a good value for the money. This product can offer a quick and easy way to do some comprehensive vulnerability assessment right out of the box with the added benefit of flexibility for custom scanning. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★✩ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★✩ OVERALL RATING ★★★★★ Strengths A lot of prebuilt policy templates make scanning easy right out of the box. Weaknesses Performance when navigating between dialog boxes is slow. Verdict If you can tolerate some limited performance slowdowns, this one deserves a close look. » » GROUP TEST l Vulnerability assessment Retina CS Vendor eEye Digital Security Price $8,000 for 256 IPs Contact www.eeye.com he Retina CS from eEye Digital Security is the latest vulnerability management tool in an ever-changing offering from eEye. This scanner takes the combination of the Retina Network Security Scanner and the Retina Insight reporting module and puts them together in a full Compliance and Security Management Console. We found this solution easy to install, but it does require a fairly robust machine. The Insight reporting module requires a 64-bit installation of Windows Server and a lot of memory. This tool is a beast when it comes to flexibility. If loaded up on good hardware with some add-on modules, this product can become a full-scale vulnerability and compliance management hub for an organization of any size. Furthermore, this product includes patch management capabilities for added value. Documentation included installation and users guides for all the components. We found all these guides to be nicely organized and easy to follow, with many clear, step-by-step instructions and procedures. However, we did fi nd them to be T February 2011 • www.scmagazineus.com • 55 lacking in visual support. A few more screen shots and examples would have been helpful. eEye offers standard and platinum options for phone and email tech support. Customers also can access a vast support portal with resources, such as documentation downloads and a knowledge base. At a price of $8,000 for 256 IPs, we fi nd this product to be a fairly good value for the money. The combination of scanning and vulnerability management tools that this product provides make it a solid value by itself. However, it does require some robust hardware to run on, which adds to the overall cost. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★✩ Support ★★★★★ Value for money ★★★★✩ OVERALL RATING ★★★★★ Strengths Robust scanning, auditing and reporting capabilities. Weaknesses Requires hardware with large memory resources. Verdict A mainstay in the vulnerability tool market, eEye has done an excellent job with this one. Fully loaded, it may be all one needs for vulnerability management. A little pricey, though. Next GFI LANguard Vendor GFI LANguard Price Starting at $32 per IP for 10-24 IPs Contact www.gfi.com FI LANguard has grown over the last few years to become a fairly robust vulnerability scanning and remediation tool. With this product, administrators can quickly launch scans, analyze the results and deploy suggested remediation to vulnerable machines throughout the enterprise – all from one easy-to-use application. We found this offering to be a quick install. The installation is launched from an executable, which goes through a short setup wizard. After setup is complete and the application is launched, it is basically ready to begin scanning. Scans can be prebuilt as quick or full, or the user can defi ne a custom scan by going through the wizard. At the end of the scan, the user then can move to the analysis section and begin to decide on remediation. This product is very well organized with an intuitive interface. At the heart is a dashboard view that gives a quick overview of the status of the health of the environment by showing the network security level and most vulnerable computers. We also found G Previous GROUP TEST l Vulnerability assessment Lumension Scan this tool to be quite configurable with a multitude of easy-tochange options. Documentation included a full user manual, which covers configuring and using the product after installation. This manual illustrates step-by-step how to configure and perform scans, as well as information on how to analyze scan results. We found this documentation to be easy to follow with many screen shots and examples. GFI provides 30 days of no-cost support following installation. After 30 days, customers can purchase additional support as part of an annual agreement. The fi rst year of this assistance is included in the purchase price of the product and includes 24/5 phone and email technical support. At a price starting at $32 per IP for up to 24 IPs – with volume discounts available for more IPs – we find this solution to be a good value for the money. LANguard provides some solid scanning and analysis tools at a reasonable price. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★✩ OVERALL RATING ★★★★★ Strengths Easy-to-use scanning and remediation tools. Weaknesses None that we found. Verdict A solid product with a lot of flexibility. Vendor Lumension Price $8 per node per year Contact www.lumension.com umension Scan is a small piece of the much larger Lumension Vulnerability Management platform. With Lumension Scan, administrators can easily run comprehensive vulnerability and configuration assessment scans across the entire network environment. This tool allows the user to identify assets in the enterprise and run a number of checks for weaknesses on network machines. We found this tool to be quite simple to install and use. The installation took only a few minutes and we were scanning as soon as it was completed. The application has an easy-tonavigate interface, and configuring and launching a scan is done just by clicking a button. The scan configuration dialog box pops up to start a new job and, after some fields are fi lled in, it is ready to go. The power of this product comes in its ability to create dozens of reports on the fly. After a scan was complete, all we had to do was select the completed job, click the reports pane and generate the report we needed. Navigating through specific scan results for a target or a full vulnerability list is also quick. Documentation included user guides for both the scanning L 56 • February 2011 • www.scmagazineus.com engine itself, as well as the configuration management piece of the product. We found these to be quite comprehensive, but the format was organized more like a book rather than a manual. There are no step-by-step instructions or examples, just paragraphs explaining features and functions. While the format was a little uncomfortable, the language was quite clear, which made it fairly easy to follow. Lumension provides two support levels: standard is available at no cost, and premium is purchased annually as part of a plan. Both offer varying levels of phone and email technical support, as well as access to updates and other resources. At a price starting at $8 per node per year, this product can become quite expensive for just a vulnerability scanner in large environments. We fi nd this solution to be an average value for the money. While it does have some excellent features, it is just a vulnerability scanner without the extra modules, and the extra modules add cost to an already expensive product. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★✩✩ Support ★★★★★ Value for money ★★★✩✩ OVERALL RATING ★★★★✩ Strengths Solid vulnerability scanner with an easy-to-navigate GUI. Weaknesses High price point for just a scanner. Verdict Lots of features and solid performance, but it comes at a pretty hefty price. ManageEngine Security Manager Plus Vendor ManageEngine Price Starting at $695 annually for 25 systems Contact www.manageengine.com he ManageEngine Security Manager Plus is just what it sounds like. This application can run vulnerability scans, detect open ports, run patch management and manage changes to Windows fi les, folders and registries. We found this tool to be a very simple install. All we had to do was run the installer, follow a few short steps in a wizard and we were up and running. The installer automatically supplies all the necessary components, such as the web GUI and database server, with no interaction needed. After the install is complete, management is all done on a clean web GUI. On the home tab of the GUI, the user can easily view at a glance several informative dashboard items. Some of these items include vulnerable assets, prevalent vulnerabilities in the network, patch status and inventory information. We most liked the fact that we could drill down into the most vulnerable host on the dashboard and see a full overview of that asset’s health at the time of the last scan. Additionally, we could even click a button to download and deploy T patches or service packs directly to the machine. Documentation was an HTML help fi le, which included all the installation and configuration information necessary to get the product up and running, but that was pretty much the extent of it. We found this guide to lack depth, step-bystep instructions, screen shots, examples or anything other than a brief overview. ManageEngine offers free 24/5 telephone and email support included in the purchase price of the product. After the first year, additional support may be purchased as part of an annual agreement. At a price starting just under $700 per year for 25 systems, we fi nd this offering to be an average value for the money. While it does have some very powerful features, it can get expensive as an annual fee for larger environments. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★✩✩ Support ★★★★★ Value for money ★★★✩✩ OVERALL RATING ★★★★✩ Strengths Powerful tool for vulnerability assessment, as well as patch and system management. Weaknesses Documentation could have a little more substance. Expensive. Verdict As with all of our products this month, this one is extremely capable. The annual license can be a bit expensive, though, and the documentation could be rethought to make it more effective. » » GROUP TEST l Vulnerability assessment McAfee Vulnerability Manager Vendor McAfee Price $16,800 Contact www.mcafee.com he McAfee Vulnerability Manager provides a full vulnerability management tool for the large enterprise. This solution features the ability to discover new vulnerabilities, analyze potential risk and remediate as needed throughout the environment. This appliance is also highly configurable. While it can scan with a default set of policies out of the box, it also can be fi ne-tuned to provide deeper accuracy. The install of this appliance is almost plug and play. The base of the appliance is the Windows Server 2008 operating system, which then has all the applications and web interface already preinstalled, so everything is pretty much ready to go out of the box from an installation standpoint. Configuration is a whole other story. This product can be run with a default configuration to establish a base to build off of, but then it can be fi netuned with granular controls for a true sense of vulnerability and risk throughout the enterprise. Once a base scan has been completed, the administrator can go in and manage discov- T February 2011 • www.scmagazineus.com • 57 ered assets and group them based on their criticality and other settings. This helps more accurately determine risk, as well as level of vulnerability. All these settings, as well as other configuration of the appliance, is done through an easy-tonavigate web GUI. Documentation included a full installation guide, as well as a product manual. Both these PDF guides provided in-depth, easy-to-understand details. McAfee provides many levels of support to customers to meet the needs of various environment types. Some features include 24/7 phone and email technical support, hardware warranty and online interactive support. At a price just shy of $17,000 for the appliance, software licenses, scanning of 1,000 IPs and a year of the gold support program, we fi nd this appliance to be a good value for the money. This product offers a multitude of features wrapped up together in an easy-to-useand-manage appliance. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★✩ OVERALL RATING ★★★★★ Strengths Full-scale and highly configurable vulnerability management appliance. Weaknesses None that we found. Verdict Just what one would expect from McAfee: Solid performance, appliance-based and good support. If you’re a McAfee shop, don’t pass on this one. Next netVigilance Internal Scan – Cloud Edition Vendor netVigilance Price $11,994 for 1,024 IP addresses Contact www.netvigilance.com art of the fun of doing these product reviews is getting to see new takes on the same old problem. Sometimes a product comes along in a space that has reached maturity and changes the game a bit. This is one of those products. The Internal Scan – Cloud Edition from netVigilance provides vulnerability assessment from the outside looking in. This solution performs scans from the cybercriminal’s perspective and scans internetfacing systems, providing a clear picture of vulnerability. We found this tool to be easy to install, configure and manage. The only installation required is a small client that can be loaded inside the enterprise on a Windows XP machine. After the client is installed, all other management is done via a web browser that connects to the netVigilance cloud service. From this web GUI, scans can be run and reports generated just as if it was running inside the environment, but there is no overhead and no P Previous expensive hardware to buy. This service provides a robust scanning platform as well. There are several prebuilt policies readily available – including a Safe Scan mode all the way through high risk and several compliance-based scans. After scans are complete, reports can easily be downloaded in several formats. Documentation included a single, easy-to-follow PDF on how to use the cloud service. Support offered by netVigilance includes no-cost phone and email technical help Monday through Friday, as well as access to updates and product upgrades for the first 12 months. After then, customers can purchase additional assistance through support agreements. At a price just shy of $12,000 to scan 1,024 IPs, we fi nd this product to be an excellent value for the money. The netVigilance Internal Scan – Cloud Edition provides a true vulnerability picture in an easy-to-use, low overhead product. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ OVERALL RATING ★★★★★ Strengths Cloud-based vulnerability scanning from the outside in. Weaknesses None that we found. Verdict For top value, performance and ease of use, we make netVigilance Internal Scan – Cloud Edition our Best Buy this month. GROUP TEST l Vulnerability assessment SAINT integrated vulnerability assessment Vendor SAINT Price $19,000 Contact www.saintcorporation.com hose familiar with SAINT know that it has in the past been a software application that had to be installed on a Linux-based machine somewhere in the enterprise. While this is not usually a problem, in certain environments there may not be somebody who is very comfortable with installing and managing Linux applications, or there just may not be a box available on which to install Linux. Enter the SAINT Box. This appliance brings all the features of SAINTscanner, SAINTexploit and SAINTmanager into one box that is ready to go right off the shelf. We found this tool to be easy to install, as it comes pretty much already configured. All we had to do was plug in the box and attach a keyboard and monitor to go through a quick setup wizard and we were ready to go. All administration is done through a web GUI, which we found to be easy and intuitive to navigate. This GUI is also where configuration for scanning and reporting is done. The SAINT platform itself is a powerful vulnerability and penetration testing tool. With T 58 • February 2011 • www.scmagazineus.com the combination of SAINTscanner and SAINTexploit, users are able to scan and try to exploit almost anything with an IP address, as well as web and database applications. After the scan is complete, SAINTwriter provides equally robust reporting with many compliance templates ready to go. Documentation included a well-organized user guide, which provides information on how to configure and use all of the SAINT components. SAINT includes basic phone and email support to all customers, but 24/7 support can be purchased at an additional fee. Customers also can access an online knowledge base, as well as product documentation. While $19,000 may seem steep, we find this tool to provide a nice combination of powerful vulnerability scanning and penetration testing tools, as well as robust reporting, in an easy-to-use box, which is why we find it to be a great value for the money. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ OVERALL RATING ★★★★★ Strengths Powerful vulnerability scanning and penetration testing combined onto an easy-to-use platform. Weaknesses None that we found. Verdict For its solid performance and value. this venerable pioneer is our Recommended choice for vulnerability assessment and pen testing. The Penetrator Vendor SecPoint ApS Price Starting at $1,200 for eight IPS/one year Contact www.secpoint.com he Penetrator from SecPoint is exactly what it says it is. This product has been designed to scan for vulnerabilities and to try to penetrate them. This appliance features the ability to scan and exploit anything with an IP address – going beyond just systems, but also routers, switches, firewalls and many other devices. This solution has been designed in such a way that it is very simple to use. Installation takes just a few minutes and is guided by a setup wizard. After the initial setup is compete, users can begin scanning immediately. All scanning and administration is done through a simple and intuitive web GUI. The appliance also comes equipped with several preconfigured scanning templates and easily selectable scanning options. This product is straightforward and easy to use. It has many clickable options, which makes vulnerability scanning and penetration testing intuitive. This, combined with a multitude of vulnerability checks, detailed remediation information and easy-to-read reporting, make this product a solid tool. The only problem we ran into is that when a user T » » GROUP TEST l Vulnerability assessment Nessus ProfessionalFeed logs on to the web GUI from an unauthorized IP, it will not allow the logon without going through a check fi rst. But we had to go through the check several times before we could access the GUI. Documentation included a full user manual, as well as a quick-start guide. The guide provided a few simple steps for getting the product up and running. The manual then provided detailed configuration and feature information. Both guides also included many screen shot examples. SecPoint includes in the price of the yearly subscription 24/7 live chat, email and Skype technical support, as well as access to an online forum. There are also a few free resources available on the website for customers. At a price starting at $1,200 per year for eight scanable IPs, this product is not an inexpensive option. We fi nd it to be an average value for the money based on its simple design and excellent feature set. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★✩ Documentation ★★★★★ Support ★★★★★ Value for money ★★★✩✩ OVERALL RATING ★★★★★ Strengths Very easy to use and manage vulnerability scanning and penetration scanning. Weaknesses Quite expensive. Verdict Excellent product, but it comes with a steep price tag. Vendor Tenable Network Security Price $1,200 per scanner per year Contact www.tenable.com/nessus he Nessus ProfessionalFeed from Tenable Network Security is a lightweight, no-frills network vulnerability scanner. It features the ability to scan local and remote systems for the latest vulnerabilities. With the ProfessionalFeed, users also get access to a compliance configuration audit pack, which can add credential-based auditing for NIST FDCC/SCAP, DISA STIG, CIS, and PCI compliance, along with many others. This tool is a very straightforward install. The small server component can be installed on a medium-size machine with at least 2 GB of memory. The installation itself is easy and only takes a few minutes after launching the executable installer. After the server is installed, licensed and started, it instantly downloads the latest vulnerability checks and is ready to go. The web GUI can be accessed from any machine on the network, and scanning can begin. We found the web GUI to be intuitive to navigate with a clean, organized layout. Scanning policies can easily be created, as well as highly customized for excellent flexibility. While this tool may be small, it does pack a sig- T February 2011 • www.scmagazineus.com • 59 nificant punch. To further add punch, multiple scanners can be managed from the Tenable Security Center to meet the needs of any size environment. Documentation included nicely organized installation and user guides. As part of the ProfessionalFeed subscription, Tenable offers no-cost email support, but only users that have purchased Security Center can access eighthours-a-day/five-days-a-week phone support. This product has been the old standby for years, and we find it is still the good dog when it comes to straight-up vulnerability assessment. While this solution does not have the frills of some others, it does what it does very well and is quite flexible when it comes to configuring polices and running scans. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ OVERALL RATING ★★★★★ Strengths Straightforward vulnerability and configuration auditing in an easy-to-use tool. Weaknesses None that we found. Verdict Another perennial and well-deserved favorite, this is our Recommended choice for pure-play vulnerability assessment. Next GROUP TEST l IDS/IPS IDS/IPS PICK OF THE LITTER Top Layer Security IPS 5500 Model 75EC v6.12 offers a lot of value for the money. It makes IDS/IPS easy to deploy, use and manage. This solid product gets our Best Buy this month. The NitroGuard Intrusion Prevention System (IPS) device is a very strong offering, a solution to consider seriously for an enterprise deployment. We make this our Recommended product this month. LAB APPROVED 䢇=yes 嘷=no Specifications for IDS/IPS tools Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are evolving in capabilities to deliver protection against more sophisticated threats, says Michael Lipinski. I think I installed my fi rst IDS back in 2000 and my fi rst IPS in 2002. Back then, we had software- or appliancebased offerings, and we chose to install them either in front or just behind our fi rewalls for an added level of security. The technologies back then were a bit challenging to deploy and did not offer a wide array of configuration or management options. As these technologies morphed into stateful firewalls and, eventually, unified threat management (UTM)-style products, the traditional intrusion detection/intrusion prevention systems have continued to provide a valuable service in our layered defense/security architectures. These technologies have evolved to support enterprisewide deployment models, allowing admins to deliver an added layer of protection across any LAN segments or host systems they wish to protect. So instead of focusing our intrusion technologies strictly at the gateway traffic, we now have technologies that allow us to gather and manage information as it moves around our networks and to mitigate risks wherever they are found. Through easy-to-use policy tools – allowing admins to create custom rules and threat descriptions – and added technologies, such as sophisticated risk and threat modeling and behavioral analysis, these solutions bring us much closer to protecting our enterprise from zero-day threats. The distributed architectures allow for far greater deployment and protection options, while maintaining a central policy management and log collection. How we tested We tested these products by configuring our lab into a three-zone setup inclusive of firewalled internet connection and internal LAN and DMZ, also off a firewalled port. The DMZ consisted of a patched Windows 2003 domain controller and SQL server. The internal LAN consisted of an unpatched Windows XP SP2 PC and a CentOS Linux server. It is important to note that we were not testing the products for their ability to stop various threats. We reviewed the signature- and rule-based and zeroday capabilities to compare features and functions only. We ran Nessus and NMAP scans against various hosts to generate alerts and log data so that we could evaluate the management, reporting, dash boarding and alerting capabilities. We tested the policy creation and deployment features and reviewed how each product kept its threat and vulnerability databases up to date. Of the five products reviewed, four shipped to us as appliances and one was a software deployment requiring a dedicated Linux server. We didn’t assume these products would be simple to deploy. All of the products we reviewed this month took quite an effort to deploy and configure. These technologies are defi nitely not plug and play, but what good security product is? Once deployed, all the products delivered graphical tools for configuration and management of the sensors. Some were more intuitive than others. We found vast differences in reporting, dashboarding and alerting. Most of the products had inline and passive modes for monitoring traffic. There were things we liked about each solution we reviewed, which means it will be very important to understand what one really wants in an IDS/IPS solution before deciding which platform to acquire. All the solutions delivered base IDS capabilities. The differentiators came in the form of the IPS capabilities and the technologies used to combat sophisticated and zero-day threats. The documentation was not quite what we wanted to see from each of the participants. That forced us to use the support options available to us, and those were all very impressive. The product sets we reviewed were flexible and delivered so many options – from out-of-the-box protection to elaborate, customized policy rules and risk and threat heuristics. If one has the time to evaluate multiple technologies, these are defi nitely tools that justify a full evaluation to help determine the best solution for the enterprise’s needs. CounterSnipe » » PRODUCT SECTION McAfee Nitro Sourcefire TopLayer Appliance 䢇 䢇 䢇 䢇 䢇 Software 䢇 嘷 嘷 䢇 嘷 IPS capabilities 䢇 䢇 䢇 䢇 䢇 IDS capabilities 䢇 䢇 䢇 䢇 䢇 Zero-day threat protection 䢇 䢇 䢇 䢇 䢇 Inline protecting 䢇 䢇 䢇 䢇 䢇 Passive monitoring 䢇 䢇 䢇 䢇 䢇 Support for custom policies 䢇 䢇 䢇 䢇 䢇 Real-time alerting 䢇 䢇 䢇 䢇 䢇 Central management 䢇 䢇 䢇 䢇 䢇 Compliance grade reporting 䢇 䢇 䢇 䢇 䢇 INFORMATION ASSURANCE DEFEND NETWORKS AND INFORMATION. IMPRESS POTENTIAL EMPLOYERS. EgZkZci^c\YViVi]Z[i#GZVhhjg^c\XjhidbZgh#8dbean^c\l^i][ZYZgVagZ\jaVi^dch# ?jhihdbZd[i]ZgZVhdchl]nhZXjg^c\^c[dgbVi^dc^hhjX]V]^\]eg^dg^in[dg ZbeadnZgh#HZ^oZndjgdeedgijc^in!l^i]VXZgi^ÃXViZdgVbVhiZg¼hYZ\gZZ[gdb Jc^kZgh^ind[BVgnaVcYJc^kZgh^in8daaZ\ZJBJ8#L]Zi]Zgndj¼gZVbVcV\Zg dgVc>Iegd[Zhh^dcVa!ndj¼aaaZVgc]dlidegdiZXihnhiZbhVcY^c[dgbVi^dcV\V^chi YZa^WZgViZViiVX`hdgVXX^YZciVaYVbV\Z# Enroll now. 9Zh^\cViZYVhVCVi^dcVa8ZciZgd[6XVYZb^X:mXZaaZcXZ ^c>c[dgbVi^dc6hhjgVcXZ:YjXVi^dcWni]ZCH6VcYi]Z9=H GZXd\c^oZYVhVEgd[Zhh^dcVaHX^ZcXZBVhiZg¼h Wni]Z8djcX^ad[<gVYjViZHX]ddah ;^cVcX^VaV^YVcYVc^ciZgZhi"[gZZbdci]aneVnbZci eaVcVkV^aVWaZ Egd\gVb^hd[[ZgZYZci^gZandca^cZ 800-888-UMUC umuc.edu/data Copyright © 2011 University of Maryland University College Previous 60 • February 2011 • www.scmagazineus.com February 2011 • www.scmagazineus.com • 61 Next Vendor CounterSnipe Price $500/site license Contact www.countersnipe.com ounterSnipe Active Protection Software (APS) provides network-based intrusion prevention security. The APS from CounterSnipe is a combination of intrusion prevention software, host/application discovery, vulnerability detection and intelligent alert management. The solution is delivered as software and needs to be installed on a Linux-compatible server. The process to fully load and configure the server took about 30 minutes, but it was very easy and did not require substantial Linux expertise as the product is downloadable as a Debian ISO that the admin uses to create a bootable CD. Booting to the CD starts the fully automated process of loading the operating system and application, which gives way to a menu-driven configuration interface for setup. The software includes Snort as the IDS engine and detects and compares the network traffic with a constantly updated database of IDS/IPS, spyware and malware signatures. As with Snort, admins have various alerting and remediation options available. These actions range from dropping or rejecting traffic (close the connection) to alerting to the presence of the malicious packets. A total of C Previous nine different actions are available to provide admins with a truly flexible incident response. A web-based user interface is used for management and configuration of the sensors. The interface provides a console dashboard and config bar for navigating between devices, classifications, alerting and signature management. Support can be purchased for 20 or 25 percent of the purchase price and includes hourly updates. We did not fi nd any description of what was covered under support on the website. Documentation was fairly sparse but gave us enough to run through the setup. There is defi nitely a place for this technology. If one without a large budget has an environment that requires the deployment of dozens of sensors, this is a very nice alternative to going without protection. SC MAGAZINE RATING Features ★★★★✩ Ease of use ★★★★✩ Performance ★★★★✩ Documentation ★★★★✩ Support ★★★★✩ Value for money ★★★★✩ OVERALL RATING ★★★★✩ Strengths Low-cost (if deployed on a low-end server) IDS/IPS solution that adds a nice user interface with basic reporting and alerting to Snort. Weaknesses Signature based and can customize classification sets, but no real rule engine. Verdict This is a nice option to using Linux- or Snort-based solutions. It gives one an easy-to-use management console for overseeing all those deployed sensors. It works best as a traffic analysis solution. McAfee Network Security Platform v6.0 Vendor McAfee Price Range from $10,995 to $229,995 Contact www.mcafee.com cAfee Network Security Platform (NSP) v6.0 provides threat protection for demanding networks. This network intrusion prevention system delivers inline threat prevention and detection capabilities through a combination of protocol discovery and analysis, heuristics, behavior analysis and cloud-based reputation feeds. The offering is delivered on a purpose-built appliance platform. The sensor is a content-processing appliance built for accurate detection and prevention of intrusions, misuse and distributed denial-of-service (DDoS) attacks. The platform is managed with McAfee Network Security Manager, which is part of the NSP integrated security offering that also includes network access control, network threat behavior analysis and full integration with McAfee endpoint solutions. We evaluated the intrusion detection/intrusion prevention component with the network security manager as the management platform. The solution provided to us included the IDS/IPS sensor and a preconfigured Windows server loaded with the Network Security Manager. We had the server set up and talking to the sensor in no time. There are default policies that come as part of the base setup that M 62 • February 2011 • www.scmagazineus.com provide basic protections. The device examines the header and data portion of every network packet, looking for patterns and behavior in the network traffic that indicate malicious activity. Creating policy and managing the sensors is done through a web-based user interface. We really liked the threat analyzer capabilities. This feature discovers hosts on the network and creates a nice map showing security events that violate configured policies. McAfee Network Security Platform models range from 100Mbps throughput to 10Gbps-plus. List prices range from $10,995 for the M-1250 (100 Mbps) model to $229,995. Support is provided at a cost of 20 percent of the price of the solution. Several upgraded support offerings are available. NitroGuard IPS 4245 v8.4.2 Vendor NitroSecurity Price $54,495 as tested (lower performance models start at $6,495) Contact www.nitrosecurity.com he NitroGuard Intrusion Prevention System (IPS) device is an intelligent packet-fi ltering system that detects sophisticated network intrusion attempts and actively records and/or stops such attempts. The NitroView Enterprise Security Manager or Enterprise Security T System (ESM/ESS) is the central point of administration and configuration. The ESM/ESS allows network administrators to keep all configuration settings, user and access group profiles, and event and flow data in a single location. These two components are part of a full unified security management system. However, we only evaluated the ESM and the NitroGuard Intrusion Prevention System in a standalone deployment. The intrusion prevention appliance actively detects, analyzes and protects the network from an array of security threats, including viruses, worms, spyware, denial-of-service (DoS) attacks, and other forms of malware, as well as unknown or zero-day attacks. The user interface is one of the more attractive interfaces I have used. There are userconfigurable views on the dashboard, and tools, options and a tree-based selector for managed appliances are all within a couple of clicks of where one needs to be. Reporting is strong, with built-in reporting templates available, including compliance reporting. One also has the ability to design custom reports. Also new to this release is a “what if” alert action. As an added benefit, the product is both FIPS and Common Criteria certified. Support fees were not included, but we did open a ticket to assist in the initial deployment easy to deploy, configure and manage. Weaknesses As a standalone IDS/ IPS, relies mostly on signature- and rule-based protection. Verdict Good solution for adding IDS/IPS to a layered security architecture. Strong offering if deployed with other NSP components. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★✩ OVERALL RATING ★★★★★ Strengths Full-featured with a great presentation of data, strong reporting, and SCADA and distribution control system (DCS) protocols. Weaknesses None that we identified. Verdict A very strong offering; a solution to consider seriously for an enterprise deployment. As part of the overall solution, the price would not be excessive. Just a bit pricy as a standalone IDS/IPS solution. We make this our Recommended product this month. PE N N STAT E | ON L I N E Lead with 'SRÁHIRGI Penn State’s online graduate programs in information security can help you understand the theory, skills, and technologies associated with information assurance. SC MAGAZINE RATING Features ★★★★✩ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★✩ Value for money ★★★★✩ OVERALL RATING ★★★★★ Strengths Nice IDS/IPS features, and received a fast response, and the support resource was knowledgeable and helpful. Web application security Why do vulnerabilities in web apps still linger? Find out the answers on Feb. 24 QFree registration and on-demand viewing QEarn 4 CPE credits QGain the most up-to-date IT security education Visit www.scmagazineus.com/scwc247 for more information Information Systems Security Certificate Master of Homeland Security, Information Security and Forensics Option w w w.wo r l d c a m p u s . p s u . e d u/ ITSecurityEducation February 2011 • www.scmagazineus.com • 63 Next U.Ed.OUT 11-0523/11-WC-267bkh/sss CounterSnipe APS v4.0.3 GROUP TEST l IDS/IPS » » GROUP TEST l IDS/IPS » GROUP TEST l IDS/IPS Chris enjoys playing soccer. Chris is an IT professional. Sourcefire Next-Generation IPS v4.9 Chris is motivated. Chris gets recognition. Chris achieves more. Chris has an ISACA certification. www.isaca.org/certification-scmagazine Recognition • Success • Growth June Exam Date: 11 June 2011 Early-Bird Registration Deadline: 6 April 2011 Vendor Sourcefire Price $8,995 Contact www.sourcefire.com he Sourcefire NextGeneration IPS v4.9 is a distributed appliancebased offering modeled on the Snort detection engine. It is part of the Sourcefire 3D System that provides a suite of tools for delivering real-time user and network awareness. The Sourcefire Intrusion Prevention System (IPS) is one of the components of the Sourcefire 3D System that runs on the 3D Sensor. IPS allows one to monitor a network for attacks that can affect the availability, integrity or confidentiality of hosts on the network. By placing 3D Sensors on key network segments, one can examine the packets that traverse the network for malicious activity. Each 3D Sensor uses rules, decoders and preprocessors to look for the broad range of exploits that attackers can develop. A typical Sourcefire IPS deployment consists of one or more physical Defense Center management console appliances deployed on a trusted network and multiple physical IPS appliances distributed throughout the environment. The appliance can be installed in either a pas- T Previous sive, inline, or inline with failopen deployment option. IPS and Defense Center appliances also can be deployed as software on VMware vSphere and open source Xen hosts to monitor VM-to-VM traffic. The appliance is accessed via a web-based browser connection. Nice alerting features allow for SNMP, email or syslog automated response. There is also support for automated firewall response, but it is limited to Check Point OPSEC compatibility. We liked the incident management feature that allows one to create and manage an incident through the lifecycle of the incident management process. Reporting is good and includes the ability to generate reports from various event views. Support is included for a fee of 18 or 22 percent of the purchase price. This solution would make a nice addition to any environment that wants to add IDS/IPS to a layered security solution at a reasonable price point. SC MAGAZINE RATING Features ★★★★✩ Ease of use ★★★★✩ Performance ★★★★✩ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★✩ OVERALL RATING ★★★★✩ Strengths High availability features, incident management, customizable, and integration to other products. Weaknesses As a standalone IDS/ IPS, lacks analysis tools for combating zero-day threats. Verdict If your enterprise already owns a SIEM, this would make a nice addition for providing IDS/IPS functions at an attractive price point. IPS 5500 Model 75EC v6.12 Vendor Top Layer Security Price $12,495 Contact www.toplayer.com he IPS 5500 Appliance from Top Layer Security is a standalone, purposebuilt IPS. The EC-Series models have copper network interfaces and built-in zero power bypass functions. The Model 75EC, considered for this Group Test review, is optimized for cost-effective, remote-site deployments. Typically installed inline, IPS 5500 units can be deployed in a variety of modes, including detection-only, pre-emptive blocking or a combination of both. The Top Layer IPS detection/protection capabilities use integrated three-dimensional protection to perform thousands of inspections to fi lter out malicious traffic. The solution consists of three main modules: a stateful analysis firewall providing network-level protection, a denial-of-service protection engine and a deep packet inspection engine providing protection against vulnerabilities, worms and application-level attacks. The IPS unit is managed through a Java-enabled web browser or through the IPS controller management software. The user interface is attractive with tree-based navigation of confi guration and management items and a full graphical dashboard. T February 2011 • www.scmagazineus.com • 65 Enterprise features for redundancy, failover and scalability are all available. Reporting is granular and based on templates that allow admins to create type and frequency of reports. PCI compliance-level reporting is also available. Event logging configuration is very granular and gives one the flexibility to log as little or as much information as required for each sensor. The documentation resources are very good, complete and nicely laid out, making deployment and management of the solution very easy. The list price includes a threeyear threat update subscription, three-year support, maintenance and upgrades, three-year advance hardware replacement, and two-day remote installation and deployment service. Additional support options are available for a fee. SC MAGAZINE RATING Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ OVERALL RATING ★★★★★ Strengths Ease of use, support included for three years, nice integrated offering. Weaknesses None that we found. Verdict Lot of value for the money. Makes IDS/IPS easy to deploy, use and manage. This solid product gets our Best Buy this month. Next » FIRST LOOK Moving authentication to the infrastructure t would be nice – and convenient – if we could standardize all of the authentication methods for our enterprise on a single product or, at least, product type. But the fact is that we cannot. For example, a bank might have very strong authentication for system administrators, another type of strong authentication for senior managers, ID and password for most other employees, and some form of simple, but strong, authentication for customers of the online banking system. That is at least four different types of authentication. Add some layered methods – such as strong authentication for the database administrators and passwords to the applications for the same administrators – and the authentication scheme starts to get a bit complicated. The thrust of ActivIdentity 4TRESS is to allow a diverse array of authentication methods – as well as provide a policy-driven tool for managing authentication – all in a single appliance. The management piece is very nice. The policy approach allows administrators to manage user profi les down to a fi ne granularity, and those policies are consistent across multiple service channels and lines of business or user communities. Thus, the authentication process becomes part of the enterprise’s infrastructure rather than part of an application. The secret is that 4TRESS abstracts away from the application and deals only at the user level. That means that no matter what the app requires, if a user is authorized on it, the authentication requirements are tied to that user. I Previous Another benefit of the 4TRESS appliance is simplicity of deployment. A typical deployment consists of appliances with load balancing across a cluster of applications. Users can be associated with h their authorized applications through an application programming interface (API) or through standard mechanisms, such as RADIUS. Since the 4TRESS appliance can connect to multiple user repositories – Active Directory, among others – this tool is ideal for bringing diverse environments together. Setting up users is simple. User profi les contain all credentials and rights associated with those credentials. Virtually any type of authentication is accepted, including static passwords, smart cards, USB tokens, one-time passwords, certificates, out-of-band transaction verification and transaction signing. Of course, any particular user can have multiple methods and password policies associated. 4TRESS is reasonably priced, especially considering what it does and the environment – banking – in which it does it. The website is plain and simple to navigate with quite a few resources – from managed services, such as consulting information, to application notes, case studies and white papers. There are two available support options. The standard option includes eight-hours-a-day/five-days-a-week support and free upgrades. The premium option expands support availability to 24/7, again with free upgrades. Overall, this is a very good product – one that is somewhat unique in its capabilities, especially in the nuances of how it executes those capabilities. The 66 • February 2011 • www.scmagazineus.com AT A GLANCE Product: ActivIdentity 4TRESS Authentication Appliance for Banking v 7.0 Company: ActivIdentity Price: Starts at $7,500 for 4TRESS Authentication Appliance; $33,000 for 4TRESS Authentication Appliance with embedded HSM, plus per user SW license fee What it does: Provides a single authentication-method-agnostic appliance that also allows management of users’ access control requirements What we liked: This tool is a one-stop shop that manages user authentication, user access policies and everything associated with access control. What we didn’t like: Nothing. The only caveat is that before one deploys this product it is necessary to know what is desired, especially if some enterprise-centric authentication already is in place that needs to be integrated into the new system. tool is well thought-out, and the requirement it addresses is real. I liked it and, really, could find no fault with it. As with all systems that interact with users and the enterprise, though, one needs to understand one’s goals in deploying it thoroughly. That said, there is no question that the ActivIdentity 4TRESS Authentication Appliance for Banking paradigm is to bring the functionality of authentication management solidly inside the enterprise infrastructure, rather than thinking of it as a standalone security application. – Peter Stephenson, technology editor Next Events Seminars FEBRUARY »RSA Conference 2011 Feb. 14-18 RSA Conference 2011 celebrates its 20th anniversary with dozens of presentations, panels, workshops and courses broken down into several tracks. Keynote speakers include Ari Juels, RSA Laboratories; Dave Hansen, CA Technologies; Philippe Courtot, Qualys; Scott Charney, Microsoft; Tom Gillis, Cisco; Enrique Salem and Francis deSouza, Symantec. President Bill Clinton will be the closing keynote presenter on Feb. 18. Venue: San Francisco Contact: rsaconference.com/2011 MARCH »Gartner CIO Leadership Forum March 20-22 Gartner CIO Leadership Forum offers an interactive, workshopcentric experience to exchange ideas and receive actionable guidance from prominent CIOs, Gartner experts and senior executives from leading technology providers. This gathering focuses on business and IT alignment, CIO and IT leadership, IT modernization, IT strategic planning and project management. Venue: Phoenix Contact: gartner.com/EventsCal »Web 2.0 2011 March 27-28 This event showcases the latest Web 2.0 business models, development paradigms and design strategies for the builders of the next-generation web. This annual multitrack conference brings together people, ideas, connections, contacts, products and companies to foster stronger Web 2.0 communities. The event features keynotes and speakers, detailed workshops, a Launch Pad start-up program, an expo show floor, a Web2Open unconference and networking events. Venue: San Francisco Contact: web2expo.com APRIL »InfoSec World Conference & Expo 2011 April 19-21 This annual event will deliver more than 70 sessions, dozens of case studies, multiple tracks, in-depth workshops, two co-located summits and more than 100 exhibitors. Providing education to all levels of information security pros — from CISOs to system administrators — this gathering offers practical sessions that provide the tools to strengthen security implementations without interfering with business operations. Venue: Orlando, Fla. Contact: misti.com »Counter-eCrime Operations Summit 2011 April 26-28 This fifth annual gathering will be hosted by the Anti-Phishing Working Group (APWG) along with its sponsors, CyberSecurity Malaysia and MyCERT. It will engage questions of operational challenges and the development of common resources for first responders and forensic professionals who protect consumers and enterprises from the e-crime threat every day. Presenters will offer case studies of national and regional economies under attack, narratives of successful transnational forensic cooperation, as well as models for cooperation Start here for a calendar of events. To have your event included, contact scfeedbackUS@haymarketmedia.com and unified response against e-crime and data resources for forensic applications. Venue: Kuala Lumpur, Malaysia Contact: apwg.org »Gartner Business Process Management Summit 2011 April 27-29 This is a meeting place for IT and business executives and professionals who are responsible for implementing, managing or maintaining business process management. Learn more about technologies that enable business agility. Gather best practices on the art of process control. Become more efficient, consistent and competitive. Venue: Baltimore Contact: gartner.com/EventsCal MAY SuperStrategies 2011 May 10-13 More than 70 topics will be presented at this gathering, including: How information assurance contributes to meeting the organization’s goals and vision; auditing your customers; continuous monitoring for internal fraud and integrity; implementing risk-based auditing; complexities and challenges of implementing enterprise GRC; data risk management; red flags in vendor audits; and social network sites’ emergence. Keynotes include Greg Ip, The Economist, speaking on the economic outlook for 2011. Venue: Chicago Contact: misti.com JUNE Int’l Cloud Computing Conference & Expo June 6-9 The organizing principle of this event is to ensure – through keynotes, sessions, and an expo floor – that attendees leave with abundant resources, ideas and examples they can apply immediately to leveraging the cloud, helping them to maximize performance and minimize cost. Venue: New York Contact: cloudcomputingexpo.com At WGU we respect your time and intelligence, because what you know is more important than time in a classroom. WGU’s ONLINE competency-based approach puts you in control of your academic destiny... and your own security. ADVERTISER INDEX Company Page URL 3M Mobile Interactive Solutions 19 www.3MPrivacyFilters.com CA Technologies 5 www.security.com Deloitte & Touche LLP 30 www.deloitte.com ESET Back Cover www.eset.com GuardTime 67 www.guardtime.com HID Global 50 www.hidglobal.com IBM Inside Back Cover www.ibm.com ISACA 10,64 www.isaca.org Palo Alto Networks 25 www.paloalto.com Penn State University 63 www.worldcampus.psu.edu PhoneFactor 21 www.phonefactor.com SC World Congress 24/7 63 www.scmagazineus.com/scwc247 Symantec-VeriSign 13 www.VeriSign.com Trend Micro Inc Inside Front Cover www.trendmicro.com TriGeo Network Security 9 www.trigeo.com Univ. of Maryland University College 54 www.umuc.edu Western Governors University 69 www.wgu.edu Master of Science Information Security and Assurance O TOLL-FREE AT: 1.866.225.5948 OR VISIT OUR WEBSITE AT: O O O Incorporates (and includes in the tuition!) 6 security and networking certifications. (Your time to completion will be shorter if you already hold any of these certifications.) Certified by the National Security Agency’s IACE program. Meets CNSS National Training Standards. Scholarships Available. www.wgu.edu/scm O N L I N E . A C C E L E R AT E D . A F F O R D A B L E . A C C R E D I T E D . Previous 68 • February 2011 • www.scmagazineus.com Next LastWord Smarter business for a Smarter Planet: Smart mobile app development Mobile threats will soon be used to gain access to personal and business devices, says Sean Martin. T he mobile world has pretty much taken over our lives. To address operational concerns, we are seeing some activity in the space to enable multiple virtual environments to run on a single device, allowing individuals to possess a single device that can separate personal use from business use. Still, each device brings with it a different network, a different platform, various operating system versions, and a new set of apps to run on them. This nearly infinite combination oftentimes leaves a path wide open for vulnerabilities or other weaknesses to be exploited. While we have yet to experience large quantities of widespread and widely publicized attacks against the mobile space, we have to accept the fact that it is just a matter of time before attacks against these mobile vulnerabilities or weaknesses are used to gain access to personal/business devices, the critical business systems they are connected to, and the sensitive information that they host. Unfortunately, for most app builders, the security requirements fall to the bottom of the requirements bucket as a priority of being quick to market trumps all else. Quickly building a secure app designed to run on one or more platforms/devices can be extremely challenging if the wrong environment and tools are selected. The real challenge is balancing the right level of security with the right multidevice/platform strategy with the right timeto-market delivery. To begin with, addressing security for each app built on a device-by-device basis is not the right answer. This requires too much time to design, implement, test and deliver, thereby impacting the ability to get the app to market quickly to the widest audience possible. Additionally, it can be nearly impossible for an app development team to truly understand the nuances of each device, operating system and security requirement while trying to keep up with the changes to each of them over time. Alternatively, most developers will look for a way to write the code once and have it run on multiple devices. This is typically accomplished by building a wrapper app. However, leveraging a wrapper app as an attempt to secure the app across multiple platforms is not the right answer either. Here’s another consideration: If your organization is planning to build apps that run on multiple mobile devices, then it is critical to select a mobile development platform provider that offers a completely native development environment for each of the mobile applications. This provider should support the delivery of a rich and secure cross-platform Addressing security for each app built on a deviceby-device basis is not the answer.” experience for both the development team and the applications’ users such that the time-to-market requirements can be met. The development environment should eliminate the producer’s burden of having to configure for each individual device and operating system, such that multiple platforms and operating systems can be supported through a single release. The development platform provider must research and implement a secure development environment, such that the application itself is secure and will use each of the mobile device platforms and operating systems securely. With these requirements met, your organization should fi nd they are able to deliver releases with greater quality, quicker release times, improved application scalability and reliability, proper system security and data integrity. If an organization chooses to address the security risks of each platform through a ‘write once, run anywhere’ mobile development platform, the model of lowest common denominator security can be avoided and mobile apps can be brought to market both quickly and securely. Sean Martin is the owner and directing consultant at imsmartin consulting. What a predictive model means to a hospital in Africa. It means that this hospital in Ethiopia will be able to help HIV patients receive the best treatment regimen possible. The EuResist Network is helping doctors predict patient response to multiple HIV treatments with over 78% accuracy. In a recent study, the EuResist prediction engine outperformed 9 out of 10 human experts in choosing the best drug combinations for a range of HIV genetic variants. The tool is built on an IBM analytics solution that integrates over 41,000 HIV treatment histories from a variety of disparate databases onto a flexible IBM DB2® platform. A smarter organization is built on smarter software, systems and services. Let’s build a smarter planet. ibm.com/hospital A data visualization of 41,000 HIV case histories. The EuResist Network is a nonprofit partnership composed of Karolinska Institutet (Stockholm, Sweden), Max Planck Institute for Informatics (Saarbrücken, Germany), University of Siena (Italy), Informa s.r.l. (Rome, Italy) and University of Cologne (Germany). The EuResist project has been cofunded by the European Commission. IBM, the IBM logo, ibm.com, DB2, Smarter Planet and the planet icon are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at www.ibm.com/legal/copytrade.shtml. © International Business Machines Corporation 2011. Previous 70 • February 2011 • www.scmagazineus.com Next for Mac Cross-platform protection — one console Our award-winning ESET NOD32® Antivirus is the faster, smarter, easier-to-manage defense against Internet threats. With a unified management console that scales to support small and large business networks, ESET NOD32 delivers advanced proactive protection for all your endpoints, whether they are running Windows, Mac or Linux. www.eset.com