Enterprise Strategy Group | Getting to the bigger truth.TM

Posts Tagged ‘Trend Micro’

Server Virtualization Security: A Lot More Work Is Needed

Monday, October 25th, 2010

If you attended VMworld in late August, you know that virtualization security was featured extensively. Ditto for VMworld Europe where VMware CEO Paul Maritz included a few security slides in his keynote presentation. Maritz and VMware get it–virtualization security has been somewhat neglected until recently. If server virtualization is truly to become next-generation cloud infrastructure, security must be integrated throughout the technology.

VMware vShield and partner products are a great start toward bridging this virtualization security gap. Unfortunately, security technology is only part of the problem. ESG recently surveyed 463 large mid-market (i.e., 500-1000 employees) and enterprise (i.e., more than 1000 employees) organizations in North America, to gauge how they were using server virtualization technology. The goal was to understand current use, future plans, successes, and challenges. It turns out that security problems are pretty persistent. For example:

  1. Security is often an afterthought. You know the “throw it over the wall” IT story? It happens here with security. Server virtualization projects are often well along the way before the security team gets involved. In these cases, server virtualization infrastructure adds security risk from the get-go.
  2. Security professionals lack server virtualization skills. When the security team gets called into the project, they aren’t really qualified to help. Since projects tend to continue, server virtualization security risks increase while the security team gets up to speed.
  3. There are no best practices. This may be changing but security professionals complain that server virtualization security doesn’t fit neatly into existing security frameworks and operating models.

In aggregate, there is a people problem (i.e., security skills), an organizational problem (i.e., project management/cooperation), and a process problem (i.e., no best practices). Yes, these issues do ease over time but it is clear to me that they never go away. At some point, highly-regulated organizations are likely to slow down server virtualization projects to address these security gaps. When this happens, server virtualization/cloud vendors will see sales slow to a crawl.

VMware is a technology company so it is doing what comes naturally–addressing security holes with new products and industry relationships. Nevertheless, VMware needs additional help from standards bodies, IT and security professional organizations, and professional services firms. The ESG Research clearly illustrates that server virtualization is a paradigm-shifting technology that changes IT organizations and processes. The real revolutionary potential of server virtualization won’t occur until IT organization and process changes become as pervasive as hypervisors.

The Security Industry Needs to do More Around Web Threats

Tuesday, August 10th, 2010

If you aren’t familiar with Web threats, you should be. A Web threat uses the ubiquity of the WWW as a threat vector to propagate malicious exploits and payloads. Web threats lead to PCs infected with keyboard loggers, botnet code, or traditional worms and viruses.

Traditional threats like e-mail viruses and automated Internet worms still exist, but the bad guys now find the Web more effective. Cybercriminals can use dynamic links, scripts, URLs, or files to infect PCs. Even worse, they regularly exploit sites like Facebook for social engineering attacks.

This is a very serious threat– each and every enterprise should be implementing Web threat defenses. There are a number available from companies like Blue Coat, Cisco, McAfee, Symantec, Trend Micro, and Websense. Unfortunately, this activity isn’t as urgent as it should be because:

  1. Users don’t always understand. Security threats morph and grow more sophisticated all the time and many users simply can’t keep up with the changes. There hasn’t been enough user education about Web threats.
  2. The industry hasn’t done a good job of bridging this gap. Some vendors insist that exploits are the same thing as malicious code threats. They aren’t and this type of rhetoric confuses the market. Others simply position Web threat management as the next security point tool du jour. This doesn’t really help users understand the context here.

Independent product testing would help educate users and illustrate the types of threats we face. NSS Labs is poised to test a number of products, but since this space is somewhat immature, many vendors are hesitant to step up to the plate. This is unfortunate as it places business concerns over security protection.

To address Web threats, users have to demand help from their vendors. This help should come in the form of education services, product testing, and a contextual framework of where Web threat management fits within overall information security. This needs to happen now, not when products mature and a high percentage of PCs are already infected.

Peer-to-Peer Security

Tuesday, July 27th, 2010

Traditional security solutions are sort of like client/server computing. Security vendors take the role of the server, hosting the master software, adding new anti-malware signatures, and distributing them to all of the clients.

This model was adequate in the past, but it is no longer good enough. Why? Malware volume stresses the system and all too common zero-day attacks have free and clear access to sitting duck systems.

Coping with the new threat landscape means embracing a new security model. First, we have to assume that an unknown file, URL, or IP address is malicious. That said, we can’t simply deny access; rather, we need to analyze the suspicious content in real-time and then make the appropriate access decision (i.e., allow access, deny access, quarantine, send content to a honeypot, etc.).

This new model depends upon a community of users and security devices/software acting as a neighborhood watch and sharing information with security vendors in real-time. Some people call this a “hybrid cloud” model to capitalize on the buzz around cloud computing.

Hybrid clouds are fine for now, but I foresee a future evolution to a peer-to-peer security model. With hybrid clouds, security devices/software still engage in a conversation with only one entity: the security vendor’s cloud infrastructure. In peer-to-peer security, security devices/software will engage in conversations with other security devices/software from multiple entities:  security vendors, ISACs, government sources, academic institutions, etc. These conversations will issue warnings, blacklist threats, analyze content, compare notes, exchange data, etc.

Several vendors–including Blue Coat, Cisco, and Trend Micro–already have hybrid cloud offerings that could serve as the foundation for my peer-to-peer model. A bit of vendor cooperation, government incentives, or user demand could lead to further developments in APIs, secure protocols, data standards, etc.

Cybercriminals constantly exploit our security weaknesses and lack of coordination. This has been a winning formula thus far to the tune of billions of dollars in identity theft and data breaches. To overcome these tactics, we need to use our technology assets more effectively. This is precisely what peer-to-peer security can do.

The Network Effect (or Metcalf’s Law) states that the value of a network is proportional to the number of connections. In my opinion, peer-to-peer security leverages the power of the Network Effect for the good guys.

End of life for CSA? That’s okay!

Wednesday, June 16th, 2010

Earlier this week, Cisco announced its intentions to end-of-life the Cisco Security Agent (CSA) at the end of the year. Cisco will continue to support CSA for another 3 years but it won’t enhance the product any longer.

Moving forward, Cisco’s endpoint security efforts will center upon AnyConnect, an agent-based offering that unfies endpoint connectivity, TrustSec, DLP, threat defenses, and policy management. As far as pure AV protection, Cisco will recommend partner with vendors like Sophos and Trend Micro.

What’s going on here? Is Cisco walking away from an entire product and market? No. In fact, ESG believes this decision demonstrated guts and vision. Cisco has never had any luck with Windows client software and that’s really what CSA is. Cisco may be saying adios to Windows but this move is right down Broadway as it aligns with Cisco’s strengths and market direction. Why? Because:

  1. Windows PCs are no longer the point. We all have PCs, smart phones, Macs, etc., and this list will only grow over time. I want to secure my stuff, not my Windows PC. How can you amalgamate this task? Through the network, of course. This is exactly what Cisco wants to do.
  2. Think cloud. Yes, the cloud will provide us all with infrastructure, applications, and services, but it can also be a big honking proxy service. As we virtualize our workloads, this has to happen. Cisco gets this and is already offering cloud-based security services via IronPort and Scansafe. This is the future, not CSA.
  3. The definition of endpoint security has grown. When Cisco acquired Okena, endpoint security was really about malware protection. Now endpoint security extends to identity, access controls, usage policies, and data assurance. Again, most of these other functions can be managed via the network.

Cisco has a fair number of CSA customers so I’m sure some folks within the company wanted to continue to invest in the product. This would have been the easy “let’s not rock the boat” decision.

Yes, this would have been the easy path but it also would have been the wrong decision. Cisco can now focus on endpoint security from a position of network/cloud strength rather than its Windows PC weakness.

The market is already headed in this direction. Cisco is simply shedding some legacy baggage and positioning the company at the nexus of endpoint, network, and cloud security. This is the absolute right decision.

The Future of Endpoint Security

Wednesday, May 19th, 2010

If you do some research on endpoint security you’ll quickly read one analyst or another’s claim that antivirus software is dead and that there is a pressing need for some new model like cloud security services, white listing, black listing, virtual desktops, etc.

Antivirus is dead? Hmm, I wonder if these analysts have been following the financial results of Kaspersky, McAfee, Symantec, Trend Micro or a host of others who continue to make money on endpoint security software.

As you can tell by my sarcasm, I don’t subscribe to this theory but I do believe that endpoint security is going through massive changes in order to best address new threats and new requirements. Now and into the future, endpoint security will:

  1. Follow a hybrid model. Yes, you will still install bits on your PC but resident software will be increasingly supported by cloud services. This will break the endpoint security reliance on signature downloads, minimize the device-based footprint, and help alleviate patching fire drills. Additionally, the hybrid nature of endpoint security will vary by device. Androids and iPhones will have thin agents and rely mostly on the cloud while PCs will continue to leverage local disk, memory, and processors.
  2. Fatten the feature set. Antivirus became endpoint security as vendors added anti-spyware, HIPS heuristics, and whitelisting to their code. Look for more web threat integration as well as products that throw in full-disk encryption.  PC backup will also become a “must have” –Symantec is ahead here.
  3. Feature identity protection. For the average consumer, it is probably worth a few extra bucks to get an identity protection service like LifeLock, TrustedID, or IDWatchdog. Look for these services to be commodified and offered as a feature in products from folks like Panda and Sophos.
  4. Feature consolidated pricing. Like most geeks, I have numerous PCs and consumer devices that need protecting. Pricing models will change to accommodate this increasingly typical use case. One user, one price, multiple devices, common reporting.
  5. Leverage common agents. Check Point and Symantec are already talking about one agent for multiple endpoint security functions. Cisco is going a different way with its AnyConnect client that consolidates Scansafe, TrustSec, and VPN clients. We’ll see more of this as vendors bundle additional functionality for WAN optimization, PC configuration management, backup, etc.
  6. Provide PC tuning. TV ads for services like “finallyfast.com” may be prosaic, but any money going to these fly-by-night services is not going to McAfee and Trend.

Aside from market demand, security vendors will go down this path for defensive reasons. Free AV software from AVG and Microsoft is plenty good for casual users.

Will all of these features mean an uber fat client application? No. Like hybrid threat protection, vendors will offer a lot of these features as cloud services and rely on a lightweight agent to orchestrate the process. Finally, users will choose what they want and how much they want via a pricing calculator. Think online PC sales as an analogue.

Security purists may claim that endpoint security changes mean giving up control but the business case is too attractive for both users and vendors to pass up. Broad based solutions that cover requirements like threat management, performance management, backup, identity protection, and configuration management across multiple devices per user are simply the next phase of an evolutionary life cycle.

Venture Capitalists MUST Invest More in Cybersecurity

Friday, April 16th, 2010

There is a glimmer of good news on the venture capital front. In Q1 2010, venture funding rose 38% from a year ago to $4.7. What’s more, the pool of VC money is spread over 681 companies–a 7% increase from Q1 2009.

Good, but not great news. Most of the dough is going to biotech companies while investment in clean technology tripled.

The bad news? Investment in software declined 1% year over year. Remember that in Q1 2009, we were preparing for runs on banks and Hoovervilles.

While I have no data, there is anecdotal evidence suggesting additional bad news. I speak with security companies all the time and I simply don’t see VCs investing heavily in this space.

Perhaps they got burned investing in the 5th NAC, anti-spyware, or UTM vendor. Maybe they think that Cisco, Check Point, Juniper, McAfee, Symantec, and Trend Micro have everything covered. It could be that many believe that the whole tech space is mature, so they are chasing the new new thing in other technical areas.

I’m not sure why the VCs are eschewing security investments, but I do know that this is a problem. Why? At a time when attack volume is steadily increasing, cybercriminals operate like Fortune 500 companies, and FBI directors characterize cybersecurity attacks as “an existential threat to our nation,” the VCs are moving on to perceived greener pastures. In other words, there is serious demand for next-generation security skills and technology, but the supply-side continues to invest elsewhere. Bad economics and bad for the digital assets we all depend upon.

Okay, I understand that the VCs are in it for the money and nothing else, but something is wrong with this picture. It seems to me that when demand exceeds supply, there is money to be made. I’d like to see the VCs invest in security as a patriotic act, but I’m not optimistic. Therefore, I have a few ideas for the “smartest guys in the valley” on Sand Hill Rd.

  1. Co-invest with In-Q-Tel. In-Q-Tel is a VC firm that came directly out of the CIA. On its web site, the firm’s mission statement reads as follows, “In-Q-Tel identifies and partners with companies developing cutting-edge technologies to help deliver these solutions to the Central Intelligence Agency and the broader U.S. Intelligence Community (IC) to further their missions.” The key here is to find the smartest security firms whose technology is good enough for the CIA, DOD, and NSA and can be adapted for commercial use. Given the recent string of private attacks, the private sector would welcome military-grade protection.
  2. Explore other direct federal funding. It’s likely that DARPA, NSF, DOE, and other agencies will have money to spend on cybersecurity research and development. Smart VCs will figure out ways to hedge their risks by getting these agencies involved.
  3. Partner with Universities. UC-Berkeley, Carnegie-Mellon, MIT, Purdue, Johns Hopkins, and Cornell are all doing advanced research in various security disciplines. The VCs need to buddy up to these prestigious institutions and find investments that provide mutual benefits.
  4. Seek out Israeli money. Educated at Tel Aviv University and Technion and then saturated in security in the IDF, Israel produces some of the smartest security minds in the world. I’d like to see more American investment in Israel and more outreach to Israeli VCs from Sand Hill Rd.

The lack of VC investment in security could have broad implications moving forward, so the VCs can’t sit on the sidelines. It’s time for the rich guys to get more involved and proactively champion security innovation and investment rather than sit back, drink Merlot, and wait for business plans to come in. Our digital security may depend upon this.

Mac Security Threats Will Grow More Ominous in 2010

Monday, December 14th, 2009

In May of this year, I wrote a blog on another media site predicting a precipitous rise in Mac-based malware. At the time, I believed that this would change Apple’s public claims about security superiority over Windows and force Steve Jobs and company to recommend security software for all Mac users.

I guess it got some people’s attention. Usually, my blogs would get a half-dozen comments or so, but this one received a whopping 162. Some supported my position, but many accused me of being a Microsoft shill or a complete idiot.

Well, I hate to say “I told you so,” but this morning I was reading through a recently published report from Trend Micro titled “The Future of Threats and Threat Technologies” which made the following forecast for 2010:

Mac Threats

While cybercriminals are likely to take advantage of any given monoculture (i.e., Windows
for desktop computers) in crafting their attacks, they have been found—especially
in 2009—to create high-impact malware targeting Mac users. They are unwittingly
encouraged by Mac users’ preconceived notion that Macs are “safe and virus free.”
Thus Mac users are more than likely to let their guards down when it comes to security.
Threats like OSX_JAHLAV.I,14 which pose as legitimate applications and then change
the system’s Domain Name System (DNS) settings to redirect the victims’ browsers to
malicious sites without their knowledge, will simply become more sophisticated going
into 2010. (page 14)

Like I stated in May, I am not writing this because I believe that Apple or Mac systems are profoundly insecure. Nor am I comparing Mac security to Windows security. The fact is that all complex software contains vulnerabilities and cybercriminals are very good at what they do.

Moving forward, I hope that:

  1. Apple stops downplaying security risks in ads and public relations. Yes, the number of Mac attacks pales in comparison to Windows, but one exploit is all it takes to steal data or corrupt a system.
  2. Apple recognizes this and begins to address security with more candor. Apple shouldn’t worry about changing its recommendations about Mac security. The threat landscape has changed and thus Apple must change.
  3. Users get a clue. Security is everyone’s business, including Apple and Mac users. Mac users must abandon their cavalier attitude toward security and become just as vigilant as the Windows community.
Search
© 2010 Enterprise Strategy Group, Milford, MA 01757 Main: Fax:

Switch to our mobile site