Thursday, February 17, 2011

En un futuro cercano, el spyware será la pesadilla de la industria móvil

Publicidad




Fortinet, empresas centrada en la fabricación de appliances de seguridad de red, está observando desde hace algún tiempo cómo está cambiando la seguridad en el entorno móvil. Hablamos con Luis Miguel Cañete, Director de Canal de Fortinet Iberia, sobre la oferta de la compañía, la dificultad que entraña securizar los terminales móviles o la actitud de los usuarios antes los posibles problemas de seguridad que pueden generar los móviles.


¿Cuál la oferta de seguridad para móviles de su empresa?



En Fortinet contamos con una solución específica para telefonía móvil, FortiClient Mobile. Esta solución ofrece una gran variedad de funcionalidades de seguridad diseñadas para proteger smartphones basados en plataformas Windows Mobile o Symbian. Entre sus características cabe destacar: el escaneado antivirus, firewall, protección de la agenda de direcciones del Outlook, VPN IPsec, filtrado y antispam de SMS, seguridad del móvil, y filtrado de llamadas. Asimismo dispone de actualizaciones automáticas a través del servicio de suscripción FortiGuard o del appliance FortiManager para asegurarse frente a las últimas amenazas,, a la vez que el FortiManager ofrece un control centralizado.  Además, contamos con una solución VPN SSL para Apple iPhone e iPod touch (a través de una aplicación descargable de  iTunes App StoreSM).


Al incorporar la solución FortiMobile a una red con seguridad Fortinet dotamos de protección adicional a los usuarios móviles que acceden a los recursos de la red a través de dispositivos que se encuentran fuera del perímetro.  Así, al desplegar agentes FortiMobile, nos aseguramos que estos usuarios no solo protegen sus móviles y los datos que almacenan sino que tampoco se convierten en una puerta de entrada a amenazas móviles que puedan afectar a la infraestructura corporativa.



A la hora de proteger un smartphone, ¿qué es lo más complicado, la cantidad de plataformas, que estén siempre conectados, rendimiento limitado…?


En los smartphones confluyen una serie de características que les convierten en dispositivos especialmente propensos a sufrir ataques. Las redes 3G al ofrecer un mayor ancho de banda y permiten acceder a una amplia gama de servicios avanzados. Esto representa una gran vía de entrada de malware ya que los usuarios no sólo utilizan las aplicaciones instaladas de fábrica. Además, la usabilidad de estos dispositivos está favoreciendo el uso de los smartphones tanto para uso personal como profesional lo que entraña otros peligros que afectan ya no sólo al usuario del dispositivo móvil sino también a la propia corporación.


El mercado de telefonía móvil presenta una posición única en términos de malware en comparación con el mercado del PC. Las plataformas disponibles en PC son limitadas mientras que el número de plataformas móviles continúa creciendo: Google Android, SymbianOS, Windows Mobile, Palm. Esta amplia variedad de plataformas complica a los fabricantes a la hora de desarrollar soluciones de seguridad para ellas.



Actualmente existen una amplia variedad de plataformas móviles, ¿se crearán soluciones de seguridad para todas? ¿cree que el hecho de no contar con productos de seguridad específicos afectarán al éxito de la plataforma afectada?


El no contar con una solución de seguridad en nuestro móvil puede suponer un grave perjuicio para el usuario, y como indicábamos anteriormente, también para la empresa si éste lo utiliza como instrumento para acceder a la red corporativa.


Es probable que el propio mercado se encargue de reducir el número de plataformas que existen en la actualidad. En este punto, el usuario valorará positivamente que su móvil se encuentre protegido por lo que es probable que opten por plataformas que cuenten con soluciones de seguridad específicas. Los fabricantes iremos adaptando nuestra oferta a las plataformas más demandadas.


¿Cree que los usuarios son conscientes de que sus móviles son una tentación para los hackers?


El malware en móviles es un fenómeno todavía desconocido. La mayoría de la gente ni siquiera es consciente de su existencia y los que conocen el problema lo consideran un mal menor porque “hay muy pocos”. Sin embargo se está convirtiendo en un problema real en el que la clave reside no tanto en la cantidad como en su capacidad de propagación y el daño que provocan. Un solo virus puede infectar a cientos de miles de móviles como el caso de los gusanos CommWarrior y Yxes para Symbian.


En Fortinet creemos que el uso creciente de los teléfonos inteligentes y otros dispositivos inalámbricos y los nuevos modelos de negocio que permiten,  se convertirá en la mayor amenaza para la seguridad de la empresa en un futuro próximo.



Los usuarios de móviles ¿cree que está dispuestos a pagar por tener seguridad en sus terminales?


Es cuestión de tiempo. En el momento en que el usuario sea consciente del problema que le supone sufrir ataques de phising a través de su móvil, sea objeto de spam a través de SMS, le roben los datos personales de su agenda de contactos, etc. estará dispuesto a invertir en su propia seguridad.


¿Qué consejos daría a los usuarios de smartphones para estás más protegidos?


Hay unos sencillos consejos fáciles de seguir: no abra un SMS o MMs procedente de un desconocido, no se descargue una aplicación desconocida, instale un antivirus en su móvil, no conecte su móvil a otro dispositivo que pueda estar infectado y alerte a su operador si sufre un ataque.


¿Cómo cree que evolucionará la seguridad en los móviles en los próximos años? ¿Veremos soluciones de seguridad en las tiendas con más de una licencia?


En un futuro cercano, el spyware será la pesadilla de la industria móvil. Fortinet detectó un fuerte incremento de spyware para teléfonos móviles que afecta a todas las plataformas: iPhone, Symbian o Windows Mobile. Nuestro equipo de detección, FortiGuard, ha detectado una importante cantidad y variedad de malware para móviles. Y va en aumento, sobre todo con el desarrollo y la comercialización de suites dirigidas a crear spyware para móviles, productos que son vendidos por cientos o miles de dólares.

You need to manage the privileged identities

You need to manage the privileged identities for every system in your network You need to manage the privileged identities for every system in your network

You have security firewalls and antivirus tools. You have role-based access controls and identity management software. You probably even have regulatory compliant applications. But how safe are the servers, storage devices, and network appliances that actually host your data? At this moment can any administrator login to your systems, read and modify records, change device settings, install new code… and more? If there's a breach, will you know who is responsible? How will you track who did what to which system, and when? Without a method for managing the privileged identities for every system in your network, you are vulnerable to all of these threats posed by unauthorised users and malicious programs.

Privileged identities are accounts that hold elevated permission to access files, install and run programs, and change configuration settings. They exist on virtually every server and desktop operating system, business application, database, Web service, and network appliance in your organization.

The ability to manage the accounts that allow privileged access – whether called privileged account password management (PAPM), privileged user password management (PUPM), or shared account password management (SAPM) – is a subset of the broader Identity and Access Management (IAM) category. However, conventional IAM solutions are designed to manage typical end-user account activities and cannot discover or control privileged identities.

Lieberman Software frequently hear complaints that other vendors’ products:
• Become slow, unresponsive, or difficult to manage when deployed on large networks;
• Don’t complete password changes reliably and fail to report potentially serious error conditions;
• Don’t adequately keep up with changes on the customer network, lapsing in coverage even after predictable changes occur in systems and applications;
• Are sold with low up-front license fees and the promise of easy implementation, only to turn into vastly more expensive, open-ended services engagements;
• Have deployments that result in higher staff workloads and simply fail to perform.
• Purchases that led to years of expensive service engagements yet never delivered the agreed scope of work.

Today virtually all IT staff enjoy anonymous, unaudited 24/7 access to your datacentre applications, computers and appliances through use of privileged account credentials. More IT auditors are beginning to notice that this lack of accountability has brought organisations out of compliance with key industry mandates – PCI-DSS, HIPAA and others. The hackers have also taken notice, exploiting these all-powerful and often poorly secured credentials.

Many organisations seem to grasp too late that implementing a privileged identity management solution is too important a process to delegate to a rubber-stamp Request for Proposal (RFP) or a battle of vendor checkboxes. If handled correctly your implementation can help you close critical security loopholes; help make staff members accountable for actions that affect IT service and data security; and lower the cost of regulatory compliance. Yet the wrong choices too often turn into expensive shelf-ware.

The truth is that privileged identity management software is not a commodity and should not be purchased based on checkboxes and up-front fees alone. Vendor claims to the contrary, not all solutions perform equally well under vastly different deployment conditions that can include:
• Wide varieties of managed computers – Windows, Linux, UNIX, and mainframes along with numerous network appliance platforms, backup infrastructure, and other hardware to be secured;
• Large numbers of frequently changing target systems that can be separated by slow, unreliable, or expensive WAN links;
• Significant numbers of custom-designed and legacy applications that might be poorly documented and whose designs may pose significant vulnerabilities if not properly remediated;
• Complex organisational structures demanding solutions with the flexibility to handle overlapping and frequently-changing lines of delegation and control.

If any of these scenarios sound like your organisation, you should downplay vendors’ claims and instead focus on:
• Trial deployments that encompass a test environment with a realistic sampling of your target systems, applications, and user roles;
• Engaging in in-depth conversations with reference customers whose deployments realistically match the diversity and scale of your own organisation, and whose managed applications at least reasonably approximate your own;
• Getting the facts from those customer references about true timeframes and back-end costs of vendor deployments so that you can budget your project accordingly.

As you proceed with your evaluation be aware that many vendor checkboxes simply lie. Craftily written marketing pieces can suggest that a vendor’s capabilities with respect to one target platform, application or deployment scenario extend to all areas where they claim coverage, and salespeople often believe their organisation’s own marketing hype.

Ask very explicit questions about how individual target platforms, managed applications and use case scenarios are configured and deployed. In each case was the vendor’s capability delivered out-of-the box, only through custom development, or never at all?

Here is a scenario that is guaranteed to go wrong: an organisation needs to remediate its processes for managing privileged accounts following a disastrous auditor finding. The organisation has 30 years’ worth of legacy hardware and software to be secured and an ill-defined organisational structure for controlling access and managing change. Management’s goal is to purchase the lowest-cost, appliance-based solution they can find that offers a money-back guarantee and the promise to eliminate those audit failures.

Management assigns a project team to develop an exhaustive RFP spreadsheet that is typically culled from various analysts’ findings. The RFP is sent to a handful of vendors with the request that they provide all information and supporting documentation in two weeks’ time.

Your choice of a privileged identity management solution should start with an honest discussion among all process stakeholders including the CSO, CIO, IT administrators, and anyone else involved in the management of sensitive accounts. Your key stakeholders should be those that will suffer the most damage should the solution take too long to implement, unnecessarily add to staff workloads, or provide insufficient coverage. Define your project goals and then determine who on the team is best suited to determine if each proposed solution is really a fit.

Privileged identity management requires not only the introduction of technology, but also some fundamental changes in how sensitive credentials are disclosed, changed and attributed to those who use them. Regardless of whether a solution can lower staff workloads, individuals who once enjoyed unlimited, anonymous access will probably resist being held accountable. For this reason the project is likely to succeed only with the active sponsorship of top management.

Expect your vendor to provide:
• A detailed, written analysis of your organisation’s business goals;
• Explicit documentation of your needs with respect to systems, applications, and lines of control;
• A trial evaluation of the proposed solution in a realistic test environment;
• A clear statement of work that details the time and cost required to bring unsecured privileged accounts present in your target systems and applications under control.



Opinion piece submitted by Phillip Lieberman, president and CEO of Lieberman Software

FireEye Announces Next-Generation Email Security Appliances Using Signature-Less Malware Protection Engine to Stop Spear Phishing Attacks

First email security solution with real-time analysis of embedded
URLs and attachments for targeted, socially engineered attacks







RSA Conference 2011








SAN FRANCISCO--(BUSINESS WIRE)--RSA 2011 – FireEye,
Inc., the leader in next-generation Malware Protection Systems
(MPS), today announced the FireEye Email Malware Protection System that
stops targeted email attacks, also known as spear phishing, to prevent
malware-induced network breaches and data theft. With the launch of the
Email MPS, enterprises and government agencies can protect data and
networks from recurring Modern Malware infections and advanced,
persistent threats (APTs) that attack using malicious email content and
attachments.


“Using the FireEye Email MPS, we’ve been able to stop over three dozen
separate spear phishing attacks over the course of two weeks”




“The Email MPS represents a new generation of messaging security
protecting against email attacks using malicious URLs and attachments
exploiting zero-day vulnerabilities,” said Ashar Aziz, CEO, CTO and
Founder of FireEye. “FireEye's integrated MPS solutions protect
organizations across the Web and Email attack vectors. Customers now
have the most comprehensive protection against the Modern Malware used
to conduct cybercrime, cyber espionage, and cyber reconnaissance
attempts.”




Highly Scalable, Accurate, and Effective Spear Phishing Security



FireEye’s new Email MPS features the Real-time Attachment and URL
Analysis engine that evaluates emails for zero-hour malware using
virtual machines that run a cross-matrix of operating systems and
applications, such as various web browsers and plug-ins. This dynamic
analysis enables FireEye to detect and stop spear phishing email attacks
aimed at known and truly unknown OS and application vulnerabilities.
With global data from the FireEye MAX Cloud Intelligence network,
customers get the latest security content about malicious attachments
targeting zero-day vulnerabilities, malware callback channels, and URL
blacklist updates. The incorporation of real-time, dynamic analysis
coupled with global security content enables customers to stop the
email-borne Modern Malware infection cycle. With blended attacks using
email and the Web on the increase, it is critical to have a zero-hour,
signature-less malware protection engine to analyze links in email as
well as file attachments, such as PDF documents, Microsoft Office®
files, multi-media content, and other file formats.



"Using the FireEye Email MPS, we’ve been able to stop over three dozen
separate spear phishing attacks over the course of two weeks,” said an
IT administrator at a defense contractor, who asked to remain anonymous.
“In our case, we’ve seen no false quarantines, and by integrating with
our FireEye Web MPS, we can quickly trace a zero-day Web exploit back to
its spear phishing email preventing a breach and saving at least 320
hours of forensic analysis for just one of the incidents.”




The FireEye Email MPS is an easy-to-deploy appliance that requires no
tuning and deploys as an MTA (Message Transfer Agent), SPAN device, or
as a BCC destination. The FireEye solution deploys behind existing email
control points like antispam gateways. The new Email MPS family
comprises the Email MPS 8000 Series for high email volume environments
and the Email MPS 5000 Series for mid-to-large email volumes.



Pricing and Availability



The FireEye Email Malware Protection System will be available in the
second quarter of 2011. Pricing begins at $54,950 for the appliance,
with per seat licenses starting at $11.68 (for a 5,000 seat
organization).




SOCIAL MEDIA:




About FireEye, Inc.




FireEye,
Inc. is the leader in malware protection systems and next generation
network threat prevention solutions that safeguard valuable data and
networks against Modern Malware infiltration and theft in commercial
enterprises, higher education, and government institutions. The FireEye
Malware Protection System is the industry’s first solution that
completely breaks the Modern Malware infection lifecycle by stopping
inbound, zero hour, targeted attacks across Web and Email attack
vectors, outbound data exfiltration callbacks, and dynamically
inoculating networks from future attacks through both local and global
intelligence. FireEye finds and blocks the 90% of Modern Malware attacks
that conventional defenses miss, at network speeds and near-zero false
positive rates, delivering an extremely low security TCO. FireEye is
based in Milpitas, Calif. and backed by Sequoia Capital, Norwest Venture
Partners, JAFCO Ventures, DAG Ventures, Juniper Networks, and In-Q-Tel.



FireEye is a trademark of FireEye, Inc. All other brands, products,
or service names are or may be trademarks or service marks of their
respective owners.














Contacts




Loughlin/Michaels Group
Woody Mosqueda, 408-738-9148
woody@lmgpr.com
or
FireEye,
Inc.
Phillip Lin, 408-321-6300
pr@fireeye.com

Cloud security advances not yet on IT radar

SAN FRANCISCO -- After years of hot air and lame product rebranding, security techniques and
products for cloud
computing
are finally starting to appear. However, they seem to be of little interest to IT
pros that must secure today’s enterprise IT organizations.



Fighting malware threats, in particular, remains an issue for many attendees here at this week's
RSA
Conference
.






I can't wait until everyone does this the same way.

Jon Greaves, CTO of Carpathia Hosting, on cloud standards








"If our systems are infected by malware, that could be a major problem," said Peter Tam, a
security engineer with NASA. He spends most of his time protecting NASA’s researchers. "The cloud
is interesting," he added, "but it does not impact my job today."



"The cloud is a future thing, it’s a black hole right now," echoed Mike Myers, lead technical
analyst for Marriott International. Top of his mind was monitoring client machines and internal
systems to combat malware. That said, Marriott uses a cloud provider to host the maps on its
websites.



"This information is not sensitive; we wouldn’t put anything sensitive in the cloud," Myers
said.



Trust remains a big barrier to cloud in the minds of security practitioners.



"I don’t know you, you don’t know me," said Andy Gram, chief platform architect at BlackRidge
Technology. "The cloud is like that, so why would I put anything sensitive there?" BlackRidge is
building a product that provides identity-based switching and routing in the cloud.



Security consultant John Kinsella said that the scale enabled by cloud services is another
problem security engineers must worry about. Cloud doesn't fit standard security models, and most
security products that are allergic to cloud-style automation; they do not take into consideration
that someone is launching and terminating entire servers by the hundreds every day. Today’s
security products were designed, Kinsella said, for inspection, auditing, and reporting within four
walls.



New cloud security tools take root

At the conference, RSA announced Trusted Cloud Authority, a service that it claims will move the burden of
establishing trust from the customer to the cloud by acting as an intermediary for hosted security
and compliance services. A beta that includes identity and compliance offerings will be available
in the second half of 2011, but details on the services were scant.



Small advances in virtual machine
(VM)
-centric security ideas are starting to surface, and providers are beginning to look for
ways to offer security in the cloud the same way they offer infrastructure: automated and out of
the hands of the user.



Professionals like Kinsella note that using cloud computing for infrastructure doesn’t tend to
improve life for the security-conscious. Pure Infrastructure
as a Service (IaaS)
tends to make secure operations either tedious or risky when compared to
traditional deployments. There might be hundreds of virtual servers where there were two or three
physical servers before; they may all have public IP addresses; and your operating system (OS) of
choice, no matter what it is, needs to be patched and monitored for weaknesses non-stop.





Most of the commonly used techniques and tools for monitoring OSes aren’t ideal for this kind of
challenge: the OS can update itself, but it’s not 100% reliable. It’s spinning plates to
individually monitor more than a handful of VMs. A small uncorrected problem in the base image can
suddenly become a massive hole when it gets replicated hundreds of times. Scripts and alerts and
hand checking mean a lot of grunt work, exactly what the cloud is supposed to help avoid.



"It takes a lot of man-hours to proactively go out and manage all these systems," said Tim
McQuillen, CEO of StrongMail, an email infrastructure and messaging service. StrongMail is the
poster child for cloud security headaches, as it runs a highly targeted service (email) and
delivers everything online, along with running almost entirely in IaaS platforms. McQuillen said
StrongMail’s vulnerable surface area in the cloud is large.



Monitoring virtual networks, repeating the same security procedures over and over for each of
his systems as he scales operations up and down, is an unproductive grind. To alleviate some of
this burden, StrongMail turned to a new startup, CloudPassage, which installs an agent on each of
StrongMail’s Linux instances and monitors the systems automatically as a service. Vulnerability
patching and reporting also happen automatically. CloudPassage also offer "iptables as a service,"
Linux-based soft firewalls for individual machines.



It’s not revolutionary technology; given the idea, McQuillen said, most decent administrators
could cook up a similar approach. But CloudPassage packaged it up and priced it in such a way that
he liked it better than investing in doing it himself.



"There’s a ton of point solutions and open source that’ll get you there, but this is just rolled
up in a way that’s really easy, really simple," he said.



CloudPassage hasn’t replaced any of McQuillen's traditional security software or appliances like
antivirus and intrusion detection; it’s just scratched an itch exacerbated by the use of cloud
computing infrastructure . It also hit right at the big question of effective cloud security: how
to effectively protect machines that live outside your firewall.



Compliance and audit in the cloud

"One of the biggest answers we’re starting to see is per tenant and per instance protections; a lot
of customers want very fine-grained controls on their environments," said Jon Greaves, CTO of
Carpathia Hosting, which serves highly regulated government and healthcare customers. They are
clamoring for cloud, driven by federal policy and legislation, said Greaves, but they have
non-negotiable compliance and audit requirements.






We wouldn't put anything sensitive in the cloud.

Mike Myers, lead technical analyst for Marriott International








Greaves said that most cloud operations spend most of their security resources on standard
perimeter defenses, but that was not going to cut the mustard for very long. While public cloud services
like Amazon Web Services (AWS) have very good track records, they also have black-box security.
That is not comforting for enterprises and auditors, and Carpathia will offer Vyatta's virtualized
security appliances to address those concerns.



Running a cloud, Greaves noted, does have advantages: "The cloud gives us a very repeatable
platform. We can build that [security appliance] one time for one platform and the customer can
punch that out as many times as they need."



Greaves also said that cloud makes some old ideas new again. For example, the venerable
Information Technology Infrastructure Library (ITIL) guidelines for tracking processes, procedures
and actions can actually help keep track of fungible cloud computing resources. Carpathia uses ITIL
techniques to meet audits for virtualized and cloud environments, which Greaves admits is
inefficient.



For now, he’s praying for the day when security automation efforts like CloudAudit and industry
standards get adopted: "I can’t wait until everyone does this the same way."



Carl Brooks is the Senior Technology Writer for SearchCloudComputing.com, and Jo Maitland is
the Senior Executive Editor. You can contact them at cbrooks@techtarget.com and jmaitland@techtarget.com.

Russell W. Budd Named to NCCN Foundation Board

NCCN announces the appointment of Russell W. Budd, president and
managing shareholder of Baron & Budd, P.C., to the NCCN Foundation Board
of Directors, the philanthropic affiliate of NCCN chaired by ABC news
veteran, Sam Donaldson.







FORT WASHINGTON, Pa.--(BUSINESS WIRE)--The National Comprehensive Cancer Network® (NCCN®)
welcomes Russell W. Budd, president and managing shareholder of Baron &
Budd, P.C., as the newest member to Board of the NCCN
Foundation
, the philanthropic affiliate of NCCN. The NCCN Foundation
seeks support for programs to benefit patients with cancer as well as
clinical researchers.



“I am honored that the NCCN Foundation has made
the visionary step of inviting an attorney to serve on their board and
hopeful that together we can address the many needs of cancer patients.”




“Mr. Budd is an exceptional addition to the NCCN Foundation Board,” said
Patricia J. Goldsmith, Executive Vice President and COO, NCCN. “His
esteemed reputation and ongoing commitment to patients with cancer and
their families complement the mission of the NCCN Foundation to provide
resources to improve the lives of patients with cancer. We are honored
that he is willing to add his expertise to our current board, and we
look forward to working with him on a number of initiatives.”



Mr. Budd has been a shareholder of Baron
& Budd
since 1985 and president and managing shareholder since
2002. Over the last decade, Mr. Budd has played a significant role in
protecting the rights of people injured by exposure to asbestos.
Although the practice has expanded its scope to include cases as diverse
as asbestos exposure, water contamination, Gulf Oil spill damages,
unsafe pharmaceuticals, securities fraud and commercial litigation, Mr.
Budd remains dedicated to protecting the rights of people who suffer
from cancers like mesothelioma and lung cancer, which are often
attributable to environmental toxins.




Under Mr. Budd’s direction, the firm has given generously to a number of
asbestos awareness advocacy organizations as well as providing a
cornerstone donation to the International Pleural Mesothelioma Program
at Brigham & Women’s Hospital to research curative mesothelioma.



“Given the complexity of today’s cancer care and new research emerging
in the field, this board has the tremendous opportunity to educate
people with cancer, such as mesothelioma, about their treatment
options,” said Mr. Budd. “I am honored that the NCCN Foundation has made
the visionary step of inviting an attorney to serve on their board and
hopeful that together we can address the many needs of cancer patients.”



Mr. Budd’s philanthropic endeavors continue outside of the firm as he
and his wife are very involved in the community and are passionate
supporters of Habitat for Humanity in the Dallas area. A father of two,
he is active in his church and in his children’s many activities.




The NCCN
Foundation
was created to advance the NCCN mission of improving the
quality and effectiveness of care provided to patients with cancer,
while providing additional information and resources for informed
decision-making. One of the primary initiatives of the NCCN Foundation
is to gain support for the distribution of the NCCN
Guidelines for Patients
. The NCCN Guidelines for Patients
are translations of the NCCN Clinical Practice Guidelines in Oncology (NCCN
Guidelines
) into patient-friendly language outlining
appropriate treatments.




About the National Comprehensive Cancer Network



The National Comprehensive Cancer Network® (NCCN®),
a not-for-profit alliance of 21 of the world’s leading cancer centers,
is dedicated to improving the quality and effectiveness of care provided
to patients with cancer. Through the leadership and expertise of
clinical professionals at NCCN Member Institutions, NCCN develops
resources that present valuable information to the numerous stakeholders
in the health care delivery system. As the arbiter of high-quality
cancer care, NCCN promotes the importance of continuous quality
improvement and recognizes the significance of creating clinical
practice guidelines appropriate for use by patients, clinicians, and
other health care decision-makers. The primary goal of all NCCN
initiatives is to improve the quality, effectiveness, and efficiency of
oncology practice so patients can live better lives.




The NCCN Member Institutions are: City of Hope Comprehensive Cancer
Center, Los Angeles, CA; Dana-Farber/Brigham and Women’s Cancer Center |
Massachusetts General Hospital Cancer Center, Boston, MA; Duke Cancer
Institute, Durham, NC; Fox Chase Cancer Center, Philadelphia, PA;
Huntsman Cancer Institute at the University of Utah, Salt Lake City, UT;
Fred Hutchinson Cancer Research Center/Seattle Cancer Care Alliance,
Seattle, WA; The Sidney Kimmel Comprehensive Cancer Center at Johns
Hopkins, Baltimore, MD; Robert H. Lurie Comprehensive Cancer Center of
Northwestern University, Chicago, IL; Memorial Sloan-Kettering Cancer
Center, New York, NY; H. Lee Moffitt Cancer Center & Research Institute,
Tampa, FL; The Ohio State University Comprehensive Cancer Center - James
Cancer Hospital and Solove Research Institute, Columbus, OH; Roswell
Park Cancer Institute, Buffalo, NY; Siteman Cancer Center at
Barnes-Jewish Hospital and Washington University School of Medicine, St.
Louis, MO; St. Jude Children’s Research Hospital/University of Tennessee
Cancer Institute, Memphis, TN; Stanford Comprehensive Cancer Center,
Stanford, CA; University of Alabama at Birmingham Comprehensive Cancer
Center, Birmingham, AL; UCSF Helen Diller Family Comprehensive Cancer
Center, San Francisco, CA; University of Michigan Comprehensive Cancer
Center, Ann Arbor, MI; UNMC Eppley Cancer Center at The Nebraska Medical
Center, Omaha, NE; The University of Texas MD Anderson Cancer Center,
Houston, TX; and Vanderbilt-Ingram Cancer Center, Nashville, TN.



Clinicians, visit NCCN.org.
Patients and caregivers, visit NCCN.com.















Contacts




NCCN
Megan Martin, 215-690-0576
martin@nccn.org

WatchGuard Breaks Revenue Records

Record Fourth Quarter Attributed to Global Demand for WatchGuard Security Solutions



SEATTLE, Jan. 31, 2011 /PRNewswire/ -- Privately-held WatchGuard® Technologies, a global leader of business security solutions, today announced that it attained a record-breaking 2010 fourth quarter for revenue.  This quarter stands out as the top-grossing quarter ever earned in the company's history.  Additionally, the company notes double-digit sequential growth from Q4 over Q3, and that 2010 marked another year of consecutive annual growth since going private in 2006.





"WatchGuard is the leading security solutions provider for SMB and mid-market enterprises," said Joe Wang, CEO, WatchGuard Technologies.  "Today's businesses all have a common need – having affordable and effective security solutions stop a myriad of threats, such as spam, viruses, malware, spyware, as well as protect against rogue applications, hackers and identity thieves.  As evidenced by the company's aggressive growth, WatchGuard continues to innovate and offer businesses with unbeatable network, application and data protection."  





Record-breaking WatchGuard Revenue Growth Seen Worldwide





For this calendar quarter ending December 31, 2010, WatchGuard broke all historic quarterly revenue records due to numerous countries around the world achieving significant, top-line revenue growth.  Growth for WatchGuard security solutions was broad-based across all regions.  The following markets achieved notable Q4 year-over-year growth:





  • China – 176.3 percent
  • India – 82.3 percent
  • Japan – 26.4 percent
  • Southern Europe – 21.3 percent
  • Canada – 19.4 percent
  • Latin America – 18.2 percent
  • Hong Kong/Taiwan – 18.2 percent






As well, global revenue for WatchGuard grew 18 percent sequentially over Q3, 2010, indicating accelerated growth moving into 2011.





Several factors contributed to WatchGuard's record growth.  First, WatchGuard notes an increase overall among SMB purchases, as well as substantially improved demand from mid-market and enterprise organizations.  This indicates broader industry adoption in favor of multifunction security appliances and a shift away from single purpose appliances.  





Second, WatchGuard notes a substantial increase of add-on services purchased along with WatchGuard XTM appliances.  Since 2006, the attach rate of adding multiple security services on individual WatchGuard appliances continues to dramatically increase.  This trend further supports the view that more businesses are consolidating security functions into one, easy to manage and lower total cost of ownership security appliance from WatchGuard.  





Currently, WatchGuard offers seven add on security services for XTM appliances, including: Application Control, WebBlocker, Gateway Antivirus, Reputation Enabled Defense, spamBlocker, Intrusion Prevention and LiveSecurity.  These services can be purchased as a bundle or individually to best meet customer needs.





Lastly, emerging markets in Asia Pacific, Latin America, Europe, Africa and the Middle East showed strong demand for WatchGuard's next generation security solutions.  This corresponds with recent emerging market growth trends.





Wang concludes, "Businesses today face unprecedented challenges in keeping data safe; no longer is a traditional firewall capable at protecting critical business assets.  With WatchGuard, businesses gain an evolving security platform that scales with their growth.  WatchGuard XTM and XCS appliances are dynamically designed to stop today's threats as well as tomorrow's next-generation attacks."





About WatchGuard Technologies, Inc.





Since 1996, WatchGuard® Technologies, Inc. has been the advanced technology leader of business security solutions, providing mission-critical protection to hundreds of thousands of businesses worldwide.  The WatchGuard family of wired and wireless unified threat management appliances, messaging, content security and SSL VPN remote access solutions provide extensible network, application and data protection, as well as unparalleled network visibility, management and control.  WatchGuard products are backed by WatchGuard LiveSecurity® Service, an innovative support, maintenance, and education program.  WatchGuard is headquartered in Seattle and has offices serving North America, Europe, Asia Pacific, and Latin America. To learn more, visit http://www.watchguard.com/.





WatchGuard is a registered trademark of WatchGuard Technologies, Inc.  All other marks are property of their respective owners.


Contacts:


Chris McKie


WatchGuard Technologies


206-613-3760


chris.mckie@watchguard.com


Jimme Peters



24/7 Consulting


503-289-5354


jimme@24-7consulting.com










SOURCE WatchGuard Technologies, Inc.

Revealing network threats, fears


How to use ANSI/ISA-99 standards to improve control system security











FAST FORWARD




  • RISI data shows security problems arise from three common sources: proliferation of “soft” targets, multiple points of entry, and poor network segmentation.


  • ISA-99 introduces the concepts of “zones” and “conduits” as a way to segment and isolate the various sub-systems in a control system.



  • “Defense in depth” is multiple layers of defense distributed throughout the control network.




By Eric Byres











Anyone integrating automation technologies these days is well aware of the pressure on the operators of industrial plants to increase productivity, reduce costs, and share information in real time across multiple industrial and enterprise systems. Adding to these business pressures is the growing fear of cyber attack as the world has become aware that the Stuxnet worm was specifically designed to disrupt an industrial process. Operators and engineers are under pressure to isolate automation systems at the same time as management is asking for greater interconnectedness.




This article explains how the ANSI/ISA-99 security standards provide a framework for helping deal with network security threats that arise from the “push for productivity” and the fear of the next “Son-of-Stuxnet” worm.



1. Why the “push for productivity” has degraded control network security



As corporate networks have converged with industrial networks, there have been many integration projects where proprietary networks or equipment were replaced with TCP/IP networks and commercial-off-the-shelf equipment. This shift in technology has greatly increased the complexity and “interconnectedness” of control systems. As a result, they now have many of the same vulnerabilities that have plagued enterprise networks. In addition, the controllers in these networks are now subjected to new threat sources that they were never designed to handle.



The result has been a significant increase in the number of plant disruptions and shutdowns due to cybersecurity issues in the control networks at industrial facilities.




The Repository for Industrial Security Incidents (RISI—www.securityincidents.org) is the world’s largest database of security incidents in control and SCADA systems. An analysis of the data from 1982 to 2009 found the type of incidents breaks down as follows:




  • 76% of incidents were accidental in nature


  • 24% of incidents were due to malware



In our study of the incidents in the RISI database, we see problems arising from three common sources:




a. Proliferation of “soft” targets: Control systems devices were designed with a primary focus on high-performance real-time I/O, not robust networking. Many devices will crash if they receive malformed network traffic or even high loads of correctly formed data. Also, Windows PCs in these networks often run for months at a time without security patches or antivirus updates and are susceptible to even outdated malware.



b. Multiple points of entry: Even without a direct connection to the Internet, control systems are accessed by numerous means, including:




  • Remote maintenance/diagnostics connections


  • Shared historian and Manufacturing Execution Systems (MES) servers



  • Serial connections


  • Wireless systems


  • Mobile laptops



  • USB devices



These pathways can be exploited by malware and other disruptive elements.



c. Poor network segmentation: Control networks are now more complex than ever before, consisting of hundreds or even thousands of individual devices. Unfortunately, the design of many of these networks has remained “flat” with virtually no segmentation. As a result, problems that originate in one part of the network can quickly spread to other areas.



Mitigations




There is limited opportunity for control system engineers to address the first source in the short term. Most plant operators are dependent on their equipment vendors to secure the controllers and software that they use. With the competitive pressure that most companies face to improve productivity and access to the systems and data in their plants, it is unlikely they will be able to significantly reduce the number of internal and external pathways into their plants. However, operators can implement good network segmentation, and we address this topic in this article.



2. The fear of “Stuxnet 2” and its impact on industrial control project priorities



2010 was a watershed year for industrial cybersecurity because of the identification of the Stuxnet worm and the wake-up call it has created for operators of all industrial facilities. Stuxnet has given a clear warning: Secure your control and automation systems, or the reliability and safety of your entire operation is at risk.



For those of you who have not closely followed the Stuxnet story:





  • The Stuxnet worm was discovered in June 2010 by a Belarus-based company doing business in Iran.


  • It is a very advanced computer worm that took many man-years to create. It was designed to jump from computer to computer using human and network pathways until it found the specific, well-protected control system it was designed to destroy (most likely Iran’s nuclear enrichment program).


  • Once it penetrated the facilities in Iran, Stuxnet targeted Siemens programmable logic controllers (PLCs) and human machine interfaces (HMIs). From there, it modified commands and data going to the frequency converters that regulate the speed at which centrifuges spin to enrich nuclear fuel. The worm made the centrifuges turn very quickly so they were damaged, but not destroyed. The worm also masked the changes in speed or PLC logic from being discovered at the operator’s control panel.


  • At its height, Stuxnet infected an estimated 100,000 computers and 50 to 60 industrial control systems around the world.




Most facilities will not be subject to an attack as sophisticated as Stuxnet. However, the worm’s existence has paved the way for future industrial control system attacks and abolished the concept that “security by obscurity” protects automation systems. As well, the detailed and public analysis of Stuxnet’s design has become an “instruction manual” for future worm developers, showing them how to attack other industrial systems.



3. ISA-99 standards and solutions that work on the plant floor



To reduce cybersecurity issues in control networks, either due to technology convergence or for “Son-of-Stuxnet” protection, well-designed network segmentation is critical. This topic is addressed as part of the ANSI/ISA-99 Standards: Security for Industrial Automation and Control Systems.



ANSI/ISA-99 is a complete security life-cycle program, with best practices for developing and deploying policy and technology solutions to address security issues in control systems. In this article, however, we will focus on one aspect of the standard—containing communication in control sub-systems to avoid having security issues in one area migrate to another area.




ISA-99 introduces the concepts of “zones” and “conduits” as a way to segment and isolate the various sub-systems in a control system. A zone is defined as a grouping of logical or physical assets that share common security requirements based on factors such as criticality and consequence. Equipment in a zone has a security level capability. If that capability level is not equal to or higher than the requirement level, then extra security measures, such as implementing additional technology or policies, must be taken.



Any communications between zones must be via a defined conduit. Conduits control access to zones, resist Denial of Service attacks or the transfer of malware, shield other network systems, and protect the integrity and confidentiality of network traffic. Typically, the controls on a conduit are intended to mitigate the difference between a zone’s security level capability and its security requirements. Focusing on conduit mitigations is typically far more cost effective than having to upgrade every device or computer in a zone to meet a requirement.





Zone and conduit design starts with the facility being analyzed to identify groups of devices that have common functionality and common security requirements; these groups are the “zones” of equipment that require protection. For example, a facility might first be divided into operational areas, such as materials storage, processing, finishing, etc. Then within these areas, it could be further divided into functional layers, such as MES, Supervisory Systems (i.e., operator HMIs), primary control systems (i.e., PLCs), and safety systems. Often, the models from other standards such as ANSI/ISA-95.00.01-2000 or the Purdue manufacturing model are used as a basis for this division.



The next step is to discover the pathways in the network through which data is passed between these zones; these are the network “conduits.” Industrial firewalls can be installed in these conduits and configured to pass only the minimum traffic that is required for correct plant operation, blocking all other unnecessary traffic.




Good network design would also suggest the firewalls should implement some kind of alarm reporting mechanism to alert operations or security personnel any time that abnormal behavior (i.e., blocked traffic) is observed in the network.



This approach implements a strategy of “defense in depth”—multiple layers of defense distributed throughout the control network—which has been proven in the IT community to be a strategy that works well.



Consider how a network protected in this manner would respond to threats such as a traffic storm created by a device failure or a “Son-of-Stuxnet” virus. The impact would be limited by the firewalls to the specific zone in which the problem occurred, and the alarm messages from the firewalls would pinpoint the zone and even the source device where the problem originated.



A real-world example




An example from a real customer application shows how an ISA-99 “zones and conduits” analysis was performed in a refinery to analyze the potential threat sources and develop a plan to protect the plant. A high-level network diagram of the refinery is shown in Figure 2.



For simplicity, only two refinery operations areas (Op #1 and Op #2) are shown, but in real life, there were multiple operations. Each operation has its own basic control, safety, and HMI/supervisory systems. These systems connect to a common Process Information Network, where Historian and MES servers are accessible from the Enterprise and control networks. In addition, wireless sensors are being deployed throughout Op #2, and a Remote Access gateway is provided to permit remote maintenance on plant systems by the control system engineers.



The first step was to identify the “zones” of devices with common functionality and common security requirements. The next step was to identify all the conduits that exist in the plant network. The result of this analysis is shown in Figure 3.



Following this analysis, the potential threat sources and consequences of an attack were identified and reviewed with the plant engineers. Through this analysis, it was evident the safety integrated system in each operational unit should be located in its own zone. To ensure continued safe plant operation, it was vital that the safety system could not be compromised from the plant control network. These were the first zones to be protected with “plug and protect” security appliances.






4. Implementing ISA-99 zones and conduits with industrial security appliances



Some industrial security appliances are engineered specifically to support a “defense in depth” strategy in control networks. These are the ideal platform on which to base an ANSI/ISA-99 zones and conduits deployment.



On start-up, any industrial security appliance should be “plug and protect” ready. That is, as shipped from the factory, it transparently bridges all traffic between its Ethernet ports, so it can be installed in the control network without any changes to the design or IP addressing of the network. Some industrial security appliances can be fine-tuned for a particular purpose by installing firmware modules that implement security features, such as firewall, asset management, VPN, and content inspection of particular protocols, such as Modbus or OPC.





In an ANSI/ISA-99 zones and conduits deployment, industrial security appliances would be installed in each conduit that was identified in the network. Once this is done, a firewall module can be activated in each appliance to provide the capability to filter all traffic passing through that conduit. The firewall makes it simple to build intrinsically secure networks because it automatically blocks and reports any traffic for which there is no “allow” rule. The control system engineer need only configure firewall rules that specify which devices in the network will be allowed to communicate through the conduit and what protocols they may use, and the industrial security appliance will block any other traffic not matching these rules.




Testing the system



Ideally, the industrial security appliance’s configuration tools are designed specifically to match the needs and capabilities of the control engineer. Such tools make it very easy not only to configure firewall rules, but also to test them before they are actually implemented.



For example, there should be a “Test” mode that transparently bridges all traffic through the device, but reports any traffic that would have been blocked if the firewall rules had been active. This permits the control engineer to interactively edit and test the rules in the network using real network traffic, but with no risk of accidentally shutting down the plant. When no more “blocked traffic” alarms are generated by the device, the engineer can have a high level of confidence that the firewall rules are correct and complete, and that it will be safe to switch the security appliance to “Operational” mode where the firewall rules will be enforced.



Typical control networks will have multiple conduits distributed over many locations in a plant. Preferably the multiple industrial security appliances can be managed from a single management console application.




Summary



New network and PC-based technologies introduced into control systems have provided tremendous improvements in plant performance and productivity. In 2010, the Stuxnet malware showed us sophisticated viruses targeted at industrial processes exist and are likely to be more common in the future. The impact of these two trends will be to increase the urgency and thus project priorities for cybersecurity initiatives that improve control network security and reliability.



The ANSI/ISA-99 standards provide a framework for companies to achieve and maintain security improvements through a life cycle that integrates design, implementation, monitoring, and continuous improvement. System integrators and control engineers who become proficient with segmenting control networks for zones and conduits, and who gain expertise with appropriate industrial security solutions, will be able to mitigate cybersecurity threats that arise from the “push for productivity” and “Son-of-Stuxnet” malware.



ABOUT THE AUTHOR


Eric Byres, ISA Fellow, is a security expert and CTO of Byres Security. His e-mail is eric@byressecurity.com. Byres is heading an ISA committee that will conduct a gap analysis of the current ANSI/ISA-99 standards to see if companies following this standard would have been protected from Stuxnet.











Resources