Click here to find out more!
http://www.csoonline.com/http://www.csoonline.com/magazinenewsletterscareerfeaturesresourcessearch

December 2002 CSO Magazine









Risk Consoles
Tool Box
Read More

 
Next Year's Hot Security Tools

Today's pain points are tomorrow's vendor opportunities BY SIMSON GARFINKEL


IF YOU WANT to predict the most important information security tools for CSOs in the coming year, just look at the problems that CIOs are trying to resolve today. Whereas today's security tools are intrusive, clunky and require significant commitment from both staff and users alike, tomorrow's tools will increasingly be automatic and even autonomous. Whereas today's tools are focused on delivering technical capabilities, tomorrow's tools will be focused on delivering concrete results. Finally, as CIOs and executive management focus on what ails them, more and more classic IT problems are going to be rephrased—right or wrong—as security problems.

That's sure to open the door to new solutions. Unfortunately, it will also open the door to new disappointments, as immature tools are frequently not a good match for the problems they seek to solve. So along with next year's likely winners, I've noted some widely hyped technology areas where available tools still earn a "needs improvement" grade. (Fair disclosure: Everybody gets a fair shake in this article, but I've been active in the security industry long enough to accumulate a number of potential conflicts in writing about some of these technologies. Those who want the gory details can see my bio at the end of the story.)


E-Mail Fixes
Without question, two of the most immediate pain points in corporate computing are e-mail-borne viruses and spam. One company I know recently had multiple computers infected by a virus after a sales manager disabled his antivirus software. He turned off the software because it interfered with another program that the manager needed to run. Next year, rather than leave their security in the hands of end users, more and more companies will institute antivirus scanning in their mail servers, their firewalls and even their routers. In the meantime, companies are looking for technology that automatically installs and updates antivirus software without needing any assistance from the PC user.

As for spam, so long as legislators twiddle their thumbs (and probably even if they stop), the amount of unsolicited e-mail circulating through the Internet will only increase. Already a serious problem for Internet service providers—more than 80 percent of the e-mail received by Hotmail is spam—spam is a growing issue for businesses as well. Companies will increasingly see spam as a security problem and move to widely deploy antispam tools.

The best technologies will combine antispam with antivirus, as Brightmail already does. Until then,
New security scanners such as FoundScan will combine problem detection with intelligent prioritization, tracking and remediation reports.
spam-only solutions like ChoiceMail, SpamAssassin, Spamnix and SpamSubtract are sure to be quite popular. And while antispam services like SpamCop may remain popular with end users, I believe that businesses will shy away from those services, since they require that each e-mail message be sent offsite for antispam processing—a move that potentially threatens business and client confidentiality.

Astute readers are sure to realize that the confidentiality problems inherent in sending e-mail to another company are also present when you use another company's products on your confidential data behind your firewall. Antispam programs that filter your e-mail necessarily have access to your mail and your e-mail passwords. What guarantee do you have that these programs are not surreptitiously copying this information and sending it somewhere else? The answer is that there are no guarantees unless the source code of the programs is professionally evaluated—and that is one of the reasons behind the perennial push for evaluated software, the Common Criteria and trustworthy operating systems. Expect to see an increased attention to that kind of formal evaluation applied across many different categories of security tools.


Sleuthware
Forensics is likely to be a huge growth area during the coming year. Today, disk forensic programs are popularly used by law enforcement to discover what was on a suspect's hard drive, as well as by attorneys involved in litigation and discovery to search for documents that the other side might possibly be hiding. I expect that as the understanding of these tools grows, many businesses will use them for investigating the computers of problem employees—both before and after termination.

Today, disk forensic tools are divided into high-end programs like Encase, low-end tools like Norton Utilities and free software like @Stake's Task. What's needed are more midrange tools built around specific problems that people want to solve, rather than specific capabilities that programmers have been able to develop. We need tools that can run off a bootable CD-ROM so that they can be used without disturbing the host operating system but still have full access to the Internet so that recovered documents can easily be copied to another machine without resorting to sneakernet or CDRs. What's more, these tools need to be usable with little or no training.

Unfortunately, forensic tools also make great tools for burglars. If one of your employees stayed late in the office and spent the night copying files from people's computers to some website in Argentina, would you ever find out? For most businesses, the answer is no. That's because most businesses simply do not monitor what information is passing over their Internet connection. That leads us to the next hot area for 2003: network forensics analysis tools (NFAT). Right now, several such tools exist on the market, including NetDetector, NetIntercept, NetWitness, NFR, SilentRunner and the open-source program Ethereal. All of these products will capture every packet that moves across your Internet connection and then allow you to reassemble TCP/IP connections so that you can really understand what's going on.

These tools also have their limitations. Unfortunately, with the exception of NetWitness,
Unfortunately, with the exception of NetWitness, the current generation of network forensic tools is mostly reactive, rather than proactive.
the current generation is mostly reactive, rather than proactive. Unlike intrusion detection systems, these NFATs don't terminate questionable connections that are in progress. Instead, they simply record everything, under the general assumption that somebody in your organization might want to do something with the data at some later point in time.

The problem here is that you need to know when to go looking for something. For those of us who are naturally nosy, that's no problem. Even so, most organizations will find that having an NFAT creates an ongoing requirement for additional man power—and that translates into an ongoing expense. The next generation of NFATs will need to be better at learning baseline behavior and automatically reporting abnormalities if they are to be broadly adopted.

This push for higher-level functionality and focusing on specific tasks is already appearing in the world of security scanners. A few years ago, I ran Internet Security Systems' Internet Scanner on a small network, and I ended up with a report of more than 100 pages about potential security problems on the network. New tools such as FoundScan will combine problem detection with intelligent prioritization, tracking and remediation reports. In other words, more and more scanners will start checking to see if the problems they detect are actually fixed—and that those problems they detect stay fixed.


The Kitchen Sink
I expect more and more products to be delivered as "appliances," rather than as software packages that are loaded onto a Windows or Solaris server. The appliance approach lets a single vendor be responsible for the hardware, the software and the embedded operating system. Appliances also reduce the chances that one program might interfere with another, since the only way that appliances should be communicating with each other (or with the outside world) is through well-established TCP/IP protocols.

The troubling thing about this push to appliances is that most appliances turn out to be rack-mounted PCs running Windows, Linux or FreeBSD. The problem here is that all these operating systems have seen significant security vulnerabilities in the past year and all require constant patching and updating to remain secure. My concern is that many companies selling appliances have failed to devise ways for these systems to be updated in the field; instead, they simply equip the appliance with two Ethernet interfaces and recommend that the management interface be installed behind a firewall. Code Red and Nimda both taught us the fallacy of that approach.

Although biometrics and single sign-on systems are sure to see increased sales in the coming year, I don't expect them to be a potent force for most companies. On the other hand, I expect password synchronization systems to make significant inroads. Those systems ease the pain for workers who need to use multiple computers and yet also need to change their passwords on a regular basis to ensure security. Synchronization is a compromise solution, but it's a solution that seems to work.

Finally, I don't expect much breakthrough progress on the encryption front. With the exception of SSL (secure sockets layer), which is both easy to deploy and absolutely vital for securing e-mail delivery, Web transaction and the like, encryption systems are simply too hard to use. That's sad, because file encryption is one of the few ways to minimize the damage that can be caused by a laptop theft. But experience has shown that people protect themselves only against threats that they think are likely, and most people don't expect that their laptop will ever be stolen or misplaced. end


Simson Garfinkel is a technology writer based near Boston. Disclosures: He has spoken at Brightmail conferences, formerly served on InterMute's advisory board and has a "tiny, tiny" ownership in the SpamSubtract product, is a friend and former business associate of Spamnix developer Barry Jaspan, and cofounded Sandstorm Enterprises and helped develop its NetIntercept NFAT tool.



Most Recent Responses:

Agree "tomorrow's tools will be focused on concrete results". An important result that CSOs and CIOs are increasingly looking for is the ability to prove compliance with regulations such as HIPAA. To do this an audit trail must be created that generates reports and provides the ability to understand what data was changed, by whom, and when. Network intrusion and firewall solutions are great burglar alarms, but a motion detector (i.e. auditing at the database level) is critical to closing the loop for data integrity and security.

Linda Haight
Director, Product Marketing
Lumigent Technologies
Email
Print

I agree with the kitchen sink comments. We have developed a product or "appliance" if you will, with an embedded real-time OS,Java VM, and SSL acceleration, and can be implemented as a secure web server, or a web services gateway. It also has the field update capabilities mentioned. We are constantly fighting the battle against other "embedded" systems, which as stated, are typically a stripped-down version of Linux or FreeBSD burned into flash memory or prom. Our approach has given us a lot of attention within the Homeland Security program and the DoD.

Dan Koch
Director, Business Development
Bodacion Technologies
Email
Print

White Glove (http://all.net/WG/) provides many of these tools on a bootable CD that fits in your shirt pocket.

Fred Cohen
Director
all.net
Email
Print

Read the Hot Security Tools article by Simson Garfinkle and couldn't help but notice he left out two excellent tools for NFAT -- one quite basic and the other for detailed forensics.

For basic NFAT, our company utilizes a visual NFAT called Iris from eEye Digital Security.

When there are advanced forensics needs (i.e. may require litigation), EnCase is used to collect evidence.

Iris is used almost daily to monitor and track... EnCase is only used in certain situations and is really popular for law enforcement.

Anyway, thought readers may be interested in more common tools for forensic needs.

Anonymous
Print



Add a Comment:

Name:
Title:
Corp:
Email:
Subject *
Your Comment: *

* Required fields.
Selected comments may be published in CSO magazine.
We will neither sell nor display your personal information.










advertiser
CSOonline.com

   2002-2003 CXO Media Inc.                             Privacy Policy

December 2002