CSOof the Year
Transcription
CSOof the Year
march 2013 • WWW.SCMAGAZINE.COM REVIEWED IN OUR GROUP TEST eSoft P39 This month’s UTM Best Buy is featurerich with a low cost CSO FEATURES: of the Year John South joined Heartland when it was still reeling from a breach…and it’s the best career decision he’s ever made P18 Handheld at arm’s length The mobile payments concept is surging in Canada, but due to security concerns, consumers seem less than enthusiastic PC1 Preparing for the new norm Many respondents to this year’s “Guarding Against a Data Breach” survey say they are armed for advanced attacks P24 WatchGuard P47 Well worth the expense for larger enterprises Symantec P51 Wraps mission critical environments in protection VOLUME 24 NO. 3 • March 2013 • WEBSITE WWW.SCMAGAZINE.COM • EMAIL [email protected] REGULARS PRODUCT REVIEWS 4 Editorial Just get on with it already 31Product section The UTM has morphed into a catch-all for security functionality. 8 Threat report A hacktivist posted the personal data of the former president of Brazil. 32Group Test: UTMs We saw quite a range of possibilities in this year’s batch of UTM devices. 10 Threat stats A mobile device was reported stolen from the Florida Department of Juvenile Justice. 49Group Test: Emerging products This time we take a look at one of the hottest trends developing: Security in the virtual world. 12 Update The nascent partnership between a Chinese development group and an entrepreneurial hub funded by three levels of Canadian government has raised concerns. 13 Debate The FTC should have the right to penalize companies for poor data security practices. 14 Two minutes on…The influence of overseas reforms. 15 Skills in demand A need for experienced penetration testers. 16 Opinion New risks must be valued, by Geoff Webb, director, solution strategy, NetIQ. 17 From the CSO’s desk Maximizing quality and reliability, by Rafael Diaz, CISO, state of Illinois. 74 Last word Before you take the plunge, by Justin Somaini, former Yahoo CISO. John South, CSO, Heartland Payment Systems P18 FEATURES 18 CSO of the year John South joined Heartland Payment Systems when it was still reeling from a breach…and it’s the best career decision he’s ever made. NETGEAR P43 C1 Handheld at arm’s length The mobile payments concept is surging in Canada, but due to security concerns, consumers seem less than enthusiastic. 22 Losing control Industrial control systems remain troublingly vulnerable to both internal error and outside intruders. Special survey 24 Guarding against a data breach survey For this sixth edition of our annual data breach survey, we broadened our base of respondents to include security professionals in the U.K. and Australia. Reflex Systems P50 SC Magazine™ (ISSN No. 1096-7974) is published 12 times a year on a monthly basis by Haymarket Media Inc., 114 West 26th Street, 4th Floor, New York, NY 10001 U.S.A.; phone 646-638-6000; fax 646-638-6110. Periodicals postage paid at New York, NY 10001 and additional mailing offices. POSTMASTER: Send address changes to SC Magazine, P.O. Box 316, Congers, NY 10920-0316. © 2013 by Haymarket Media Inc. All rights reserved. Annual subscription rates: United States: $98; Canada and Mexico: $110; other foreign distribution: $208 (air service). Two-year subscription: United States: $175; Canada and Mexico: $195; other foreign distribution: $375 (air service). Single copy price: United States: $20; Canada, Mexico, other foreign: $30. Website: www.scmagazine.com. Haymarket Media uses only U.S. printing plants and U.S. paper mills in the production of its magazines, journals and digests which have earned Chain of Custody certification from FSC® (Forest Stewardship Council®), SFI (Sustainable Forestry Initiative) and from PEFC (Programme for the Endorsement of Forest Certification Schemes), all of which are third party certified forest sustainability standards. 52 Book of the night Our program profiling the winners and finalists of the 2013 SC Awards U.S., held Feb. 26 in San Francisco. C. Scott Hartz P15 www.facebook.com/SCMag www.twitter.com/scmagazine Justin Somaini P74 Cover photo by Jason Janik/Newsport Editorial Just get on with it already R ight before he took to the microphone for his State of the Union address in February, President Obama signed an executive order (EO) that aims to strengthen the country’s critical infrastructure security by primarily getting government agencies and private companies to share information on attacks and potential cyber threats. The information-sharing provisions introduced were joined by other directives, including one pushing for the creation of frameworks that would help critical infrastructure operators and owners to work together to shrink the risks they all face. Since the EO’s release, plenty of industry players have bemoaned its shortcomings alongside just about as many others who say the decree showcases a U.S. president finally pushing forward with some real cyber security initiatives for the country to embrace. And then there are those who, like me, think that offering up more general guidelines that organizations ought to follow is all well and good, but without any meaningful and enforceable requirements then, really, what’s the point? I understand the need for a national approach to cyber security and an understanding of some ways of getting there, but sans incentives and enforcement, chances are it will just be business as usual. The marketplace will figure it out, some say. But, many sectors haven’t been able to do so without regulation. As well, quite a few critical infrastructure companies still enlist poor data security practices, thereby supporting an argument to impel action through regulatory mandates. For now, some congressional leaders have taken the EO to mean that the Cyber Intelligence and Sharing Protection Act (CISPA) should be reinstated. Hence, a cringe-inducing proposal for the bill has resurfaced thanks to Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. No matter that the Senate skipped the act once before because of outcries about potential privacy infringements. Lawmakers who support it say it’s needed to codify cyber threat intelligence sharing among critical infrastructure players, and will not include the potential sharing of citizens’ private information. Groups like the ACLU disagree. So, this is the best we have – documents and debates that typify still more documents and debates in the future. In the meantime, all comers can carry on launching APT and other attacks on our critical systems. When massive mayhem ensues, maybe then the many parties charged with safeguarding them will just get on with it. Security and flexibility for the BYOD era. Illena Armstrong is VP, editorial, of SC Magazine. So, this is the best we have – documents and debates that typify still more documents and debates...” 4 SC • March 2013 • www.scmagazine.com MOBILE MASTERY Imagine an enterprise network with smartphones, tablets, mobile PCs – and no compromises. ForeScout delivers real-time visibility and control over mobile computing devices. Users get the freedom, while you protect the network from data loss and malicious threats. Poof! Your primary IT problems just disappeared. Get an IDC whitepaper and more BYOD Essentials at forescout.com. What is SCWC 24/7? SC Magazine has created a free virtual environment that is open year-round. Each month we host an event focused on a subject that you as an IT security professional face on a regular basis. This MOnth March 20-21 eConference: PCI compliance This is the year that the Payment Card Industry Data Security Council – which is charged with enhancing payment 20 account data security by driving education and adoption of the PCI security standards – updates its requirements. We explore what companies should expect and learn how these developments might impact their security planning for the rest of the year. next month April 11 eSymposium: Mobile security The security and privacy issues surrounding the use of mobile devices abound. And though bring-your-own-device (BYOD) has been alive and well for some time now, many organizations still face myriad challenges in deploying just the right security solutions and the proper policies and training to support these. All the while, alongside the privacy and security 15 challenges around compliance issues, with any number of regulations only get more complex as users demand ever more mobility. We examine the most recent developments in the area of mobility and find out some programs that are showing positive inroads. For more info For details on SCWC 24/7 events, please contact Natasha Mulla at [email protected]. For sponsorship opportunities, contact Mike Alessie at mike.alessie@ haymarketmedia.com. Or visit www.scmagazine.com/scwc247. 6 SC • March 2013 • www.scmagazine.com SC MAGAZINE EDITORIAL ADVISORY BOARD 2013 Rich Baich, chief information security officer, Wells Fargo & Co.; former principal, security and privacy, Deloitte and Touche Greg Bell, global information protection and security lead partner, KPMG Kris Lovejoy, vice president of IT risk, office of the CIO, IBM Christopher Burgess, chief security officer and president, public sector, Atigeo Tim Mather, chief information security officer and vice president of security and compliance markets, Splunk; former director, information protection, KPMG Jaime Chanaga, managing director, CSO Board Consulting Stephen Northcutt, president, SANS Technology Institute Rufus Connell, research director, information technology, Frost & Sullivan Randy Sanovic, former general director, information security, General Motors Dave Cullinane, CEO, Security Starfish; former chief information security officer, eBay * Howard Schmidt, principal at HAS Security; research Mary Ann Davidson, chief security officer, Oracle Dennis Devlin, assistant vice president, information security and compliance services, George Washington University THEY: Paul Kurtz, partner and chief operating officer, Good Harbor Consulting Are the ones who grow your business. Are clueless about what it takes to keep things running. professor at Idaho State University; former cyber security coordinator, White House Have no idea how many times you were attacked last month. Ariel Silverstone, chief security officer adviser, GNN; former chief information security officer, Expedia Are tired of security solutions that block innovation. Justin Somaini, former chief information security officer, Yahoo Gerhard Eschelbeck, chief technology officer and senior vice president, Sophos Craig Spiezle, chairman, Online Trust Alliance; former director, online safety technologies, Microsoft Gene Fredriksen, chief information security officer, Tyco International W. Hord Tipton, executive director, (ISC)2; former CIO, U.S. Department of the Interior Maurice Hampton, technical account manager, Qualys Amit Yoran, chief executive officer, NetWitness; former director, U.S. Department of Homeland Security’s National Cyber Security Division * emeritus Who’s who at SC Magazine EDITORIAL VP, Editorial Illena Armstrong [email protected] executive editor Dan Kaplan [email protected] managing Editor Greg Masters [email protected] digital content coordinator Marcos Colón [email protected] reporter Danielle Walker [email protected] TECHNOLOGY EDITOR Peter Stephenson [email protected] SC LAB MANAGER Mike Stephenson [email protected] DIRECTOR OF SC LAB OPERATIONS John Aitken [email protected] SC LAB EDITORIAL ASSISTANT Judy Traub [email protected] program director, sc congresS Eric Green [email protected] regular CONTRIBUTORS Stephen Lawton, Deb Radcliff, Karen Epper Hoffman DESIGN AND PRODUCTION ART DIRECTOR Michael Strong [email protected] VP, Audience Development & Operations John Crewe [email protected] production manager Krassi Varbanov [email protected] SC events Events director Natasha Mulla [email protected] Events manager Anthony Curry [email protected] Events coordinator Maggie Keller [email protected] U.S. SALES VP, Sales David Steifman (646) 638-6008 [email protected] REGIOnal sales director Mike Shemesh (646) 638-6016 [email protected] West Coast sales director Matthew Allington (415) 346-6460 [email protected] Event Sales director Mike Alessie (646) 638-6002 [email protected] Account manager Dennis Koster (646) 638-6019 [email protected] account Manager Samantha Amoroso [email protected] SALES/EDITORIAL ASSISTANT Roo Howar (646) 638-6104 [email protected] Account Executive, Licensing and Reprints Elton Wong (646) 638-6101 [email protected] SC MAGAZINE LIST RENTAL reach marketing Wayne Nagrowski, VP, marketing solutions (845) 201-5318 [email protected] CIRCULATION Audience Development Director Sherry Oommen (646) 638-6003 [email protected] customer data manager Joshua Blair (646) 638-6048 [email protected] Subscription Inquiries Customer service: (800) 558-1703 Email: [email protected] Web: www.scmagazine.com/subscribe MANAGEMENT CEO, Haymarket Media Lee Maniscalco Executive vP Tony Keefe YOU: Are up late keeping the business together. Know how many threats are out there. Want security that opens doors, not builds walls. Know that cloud-based security can do amazing things when you know who to call. Don’t let security stand in the way of innovation. Akamai cloud-based security solutions can protect your business without slowing it down. Because the Akamai Intelligent Platform™ brings Web security closer to the end users, your business remains protected, wherever they decide to take it. Learn more about our innovative approach at www.akamai.com/security. DataBank ThreatReport Cyber criminal activity across the globe, plus a roundup of security-related news Colored dots on the map show levels of spam delivered via compromised computers (spam zombies). Activity is based on the frequency with which spam messaging corresponding with IP addresses is received by Symantec’s network of two million probes with a statistical reach of more than 300 million mailboxes worldwide. HIGH-LEVEL ACTIVITIES MEDIUM-LEVEL ACTIVITIES LOW-LEVEL ACTIVITIES CUMBERLAND, MAINE – A document from BARABOO, WISC. – Mihai Bandura, 39, of Romania was charged with felony ID theft after prosecutors allege he outfitted ATMs with skimmers to steal card numbers and PIN codes from Bank of Prairie du Sac customers. It’s believed Bandura was part of a larger ring that defrauded bank customers nationwide of $3.3 million. 2008 containing the names and Social Security numbers of 275 municipal workers was uploaded to the town’s website. It’s since been taken down, and search engine caches have been cleared, but it remains a mystery how the Department of Labor spreadsheet got on the public site. NETHERLANDS – The country’s National Cyber Security Center posted official best practices for responsibly reporting security vulnerabilities. The guidance also advises organizations to create web disclosure forms and to agree not to prosecute any hackers who discover bugs. The recommendations are not legally binding, however. PHILIPPINES – The Supreme U.K. – A member of the Anonymous online collective was spared jail time for his role in launching distributed denial-of-service attacks against PayPal, Visa and MasterCard. Jake Birchall, 18, who was two years younger at the time of his arrest, was given an 18-month youth rehabilitation order. DENVER – Three men were booked on theft and computer crime charges after allegedly downloading 70,000 files from their work PCs to removable drives, resigning, and taking the data to a competing engineering company. The victim company, EPS, alleges it lost $400,000 in contracts due to the stolen data. BRAZIL – A hacktivist posted the personal data of former President Luiz Inácio Lula da Silva following a “cash-for-votes” scandal that led to convictions of some of Silva’s top aides. Silva claims he wasn’t aware of the scheme, but that didn’t stop an intruder – known as “nbdu1nder” –to dump business addresses, phone numbers and taxpayer IDs belonging to Silva. Spain top producer of zombie IP addresses For the period reported, the EMEA region (Europe, Middle East, Africa) was the leading source of all zombie IP addresses. Of the countries making up the EMEA, Spain was the top-producing country. For the other regions, the highest producers were Argentina in South America, the United States in North America and India in the Asia-Pacific region. Source: Symantec 8 SC • March 2013 • www.scmagazine.com Court renewed an injunction that prevents the government from enforcing a new cyber crime bill. The law seeks to fight hacking, fraud and ID theft, but critics have protested over provisions that would penalize online speech and permit authorities to eavesdrop without warrants. SRI LANKA – A hacker calling himself “Davy Jones” claimed to have breached a large number of government websites, resulting in defacements and dumped usernames and passwords. Victims included the sites for state-run TV channels and the Sri Lanka Port Authority, which oversees commercial ports. www.scmagazine.com • March 2013 • SC 9 DataBank ThreatStats Zombie IPs Global distribution 1. ZeroAccess trojan Other N. America 4.8% Other S. America 11.4% The biggest increase in month-over-month zombie activity occurred in Vietnam. Top 5 attacks used by U.S. hackers 2. Sinowal trojan India 14.8% 3. Pushdo trojan 4. Chinese Infostealer trojan 5. Waledac trojan Top breaches in January Data loss Number of records Position Industry Rate Name Type of breach 1 Retail & wholesale 125% 2 Education 100% Cbr Systems San Bruno, Calif. The 2010 theft of a company laptop, hard drive and unencrypted backup tapes resulted in the exposure of sensitive information. 3 Food & beverage 95% 4 Health care 75% 5 IT & telecommunications 65% 6 Government 45% 7 Banking & finance 40% 2. Pushdo trojan Vietnam 7.3% Other Asia 16.1% A mobile device that contained both youth and employee records was reported stolen. 100,000+ King Drug & Home Care Owensboro, Ky. An employee reported that a portable hard drive was missing. The device had last been seen sometime around Nov. 19. The data on the device included information from before July 31, 2009. 13,619 3. Sinowal trojan 4. Chinese Infostealer trojan Belarus 5.1% Iran 3.7% Pakistan Kazakstan 2.9% 3.5% 5. Downloader trojan The biggest increases in month-over-month zombie activity occurred in India, while the largest decreases occurred in Germany and Peru. Source: Commtouch Software Online Labs Spam rate Volume by month for each region TOTAL number of records containing sensitive personal information involved in breaches in the U.S. since January 2005: The chart above reflects the encounter rate of web malware across a selection of industry verticals. Rates above 100 percent reflect a higher-thanmedian rate of encounter, and rates below 100 percent reflect a lower-thanmedia rate. Source: Cisco 1. ZeroAccess trojan Russia 5.4% 300,000 Florida Dept. of Juvenile Justice Tallahassee, Fla. Top 5 attacks used by foreign hackers China 9.4% Received spam Top five regions Asia Pacific 5.6B 607,110,929 U.S. 10.04% Japan 4.59% Europe 2.3B (as of Feb. 13) Africa & Middle East 1.9B Source: Privacy Rights Clearinghouse (data from a service provided by DataLossDB.org, hosted by the Open Security Foundation) North America 1.1B Index of cyber security Perceived risk South America 888.9M 3.0 0 1B 2B 3B 4B 1,450 2.5 Rate of change over previous month (%) 1,350 1,250 1,150 1,050 1.5 Index value 02/12 03/12 04/12 05/12 06/12 07/12 08/12 09/12 10/12 11/12 12/12 01/13 1.0 The index queries information security industry professionals monthly to gauge their perceived risk to the corporate, industrial and governmental information infrastructure from a spectrum of cyber security threats. A higher index value indicates a perception of increasing risk, while a lower index value indicates the opposite. Source: ICS, www.cybersecurityindex.com 10 SC • March 2013 • www.scmagazine.com 5B 6B Spam rate indicates the accumulated emails tagged as unsolicited. France 1.33% U.K. 1.27% 0% 3% 6% 9% 12% Source: Fortinet Threatscape Report Internet dangers Top 10 threats Name 2.0 Colombia 1.60% Source: Cloudmark 1,650 1,550 There were 23,895,890 attacks in the United States last month, primarily originating from Los Angeles, Cleveland, Phoenix, New York and Chicago. There were 35,286,628 foreign attacks last month, primarily originating from Bucharest, Romania; Tokyo; Mumbai, India; Sao Paulo, Brazil; and Taipei, Taiwan. Source: Dell SecureWorks Detected activity Malware Vertical encounter rate Other Europe 15.6% Movement Date first observed Type Last month Months on list 1. Zbot p 09/22/10 PasswordStealer 18 2 2. Lamechi.B p 01/10/12 Downloader 0 0 3. Hotbar 09/23/10 Adware 2 12 4. Allaple.A 12/05/10 Worm 1 11 5. Winwebsec p 22/10/09 Scareware 10 1 6. Sirefef.P p 11/04/11 Bot 11 2 7. Rimecud.A p 09/22/10 Bot 14 1 8. Kelihos.F Same 03/31/12 Backdoor 8 5 9. Sality.AT 12/05/10 Virus 4 2 10. Loring 02/06/11 Downloader 6 1 Source: Kindsight Security Labs www.scmagazine.com • March 2013 • SC 11 Update 2 minutes on... The influence of overseas reforms P14 Me and my job Options on business from a security perspective P15 Sign o’ the Times »The nascent partnership between »The Conservative government of Prime Minister Stephen Harper has rarely backed down during its seven years in power. It has made an exception on the controversial internet surveillance legislation first introduced in early 2012. Bill C-30 – officially named The Protecting Children from Internet Predators Act – was opposed by Growing demand for veteran penetration testers P15 Debate» The FTC should have the right to penalize companies for poor data security/privacy practices. While there is no silver bullet to guarantee data protection, companies must take reasonable steps to secure consumer data. Last year, the number of breaches increased 34 percent, yet more than 90 percent of these were avoidable. Although Craig Spiezle executive director these businesses have to deal & president, Online Trust Alliance with remediation expenses, compliance with state statutes and the impact on trust of their brand, it is just as important that businesses be held accountable to the impact on their customers. Under section five of the Consumer Protection Act, businesses have the obligation to safeguard consumer data. The FTC has increasingly exercised settlements with some of the worst offenders, yet does not have the power to fine a company directly. Many industry observers have suggested that the FTC be directly empowered to levy fines to increase accountability. As a data-driven economy, business leaders need to increase the stewardship of the data they collect. Those that fail to take reasonable steps need to be held accountable. FOR NEWS BRIEFS a Chinese development group and an entrepreneurial hub funded by three levels of Canadian government has raised concerns from an outspoken former security adviser to Nortel Networks. Brian Shields, who advised the telecommunications giant on security, told the Canadian Broadcasting Corp. that the state-owned Zhongguancan Development Group (ZDG) should not be trusted with unlimited access to Canadian intellectual property. In December, ZDG announced that it was contributing $10 million toward a business incubator in partnership with Invest Ottawa, a joint venture of the city of Ottawa and the Ontario federal governments. The incubator, to be managed by a Chinese director, will provide funding and support to Ottawa-based technology start-ups that want to do business in China. Invest Ottawa CEO Bruce Lazenby responded that all business partnerships come with risks, and that he put his faith in Canada’s federal security agencies to prevent cyber espionage. Skills in demand Hackers believed to be from China spent four months infiltrating computer networks atThe New York Times, ripping off passwords of reporters in an attempt to uncover information related to a Times story on the fortune amassed by relatives of China’s prime minister. The attackers used a number of techniques to install remote access trojans and hide their tracks. The Washington Post and Wall Street Journal also were hit. THE QUOTE This attack was not the work of amateurs...” —Bob Lord, Twitter’s director of information security, commenting after an advanced attack in early February affected a quartermillion users 12 SC • March 2013 • www.scmagazine.com federal and provincial privacy commissioners, who decried provisions that would permit law enforcement officials to compel internet service providers (ISPs) to identify clients without a warrant. ISPs opposed the bill because they claimed it would force them to install expensive tracking equipment. “We’ve listened to the concerns of Canadians,” said Justice Minister Rob Nicholson, who pledged that the government would not introduce additional legislation to monitor online activity. »When former spies break their silence about national security, people generally pay attention. It was no surprise, then, that it raised eyebrows when John Adams, former head of Communications Security Establishment Canada, called cyber crime “a runaway freight train.” Speaking at the Ottawa Conference on Defence and Security, Adams warned that Canada’s critical infrastructure is the country’s weakest point. His message carried added weight coming within days of a report by Mandiant that cited Chinese cyber attacks on systems that regulate North American infrastructure components, including Canadian oil pipelines. While saying that it is no simple matter for foreign powers to gain control of critical infrastructure, Adams urged governments to make it mandatory for utility companies and others to tighten security. “If one’s weak, they’re all weak,” he said, addressing the Obama administration’s decision to impose voluntary rules-based standards on companies that run critical infrastructure in the United States. right to penalize companies for poor data security and privacy practices. If the FTC attempts to penalize companies for poor security, there will be several issues. The first is around poor practices. How Brian Gay owner, will the FTC measure poor Think Forward Consulting data security and privacy practices? Will the FTC compare programs by industry? Without clear guidelines the penalties will not be enforceable. The next concern is that increasing cyber security oversight will create a decrease in transparency. Currently, companies are very reluctant to admit security hacks and data losses. If the FTC were allowed to penalize companies, there would no incentive to publicly admit data security issues and share best practices. This will negatively impact data and privacy as a whole. It would be better for the FTC to provide positive incentive. How about if the FTC were to reward companies for high-performing cyber security practices instead? THE STATS Do you think the Computer Fraud and Abuse Act is too broad and contains penalties that are too severe? 4.8m No 38.24% Yes 61.76% To take our latest weekly poll, visit www.scmagazine.com Java zero-day AGAINST The FTC should not have the THE SC Magazine POLL THREAT OF THE MONTH articles allegedly downloaded by Aaron Swartz from JSTOR through a guest account on MIT’s network. 13 felony counts lodged against Swartz for CFAA violations; he faced up to eight years in prison if he were convicted. What is it? Yet another zero-day vulnerability in Java Runtime Environment (JRE) that allows remote code execution via browsers. How does it work? It can be triggered by a user simply viewing a web page embedding malicious Java content. Should I be worried? Yes, many of the Java vulnerabilities being exploited are types of errors that allow code execution in a completely reliable manner. How can I prevent it? Users should upgrade to Java 7 Update 13, which Oracle released in early February – 18 days prior to its scheduled release – in response to reports of the vulnerability being actively exploited. This latest update addresses 50 vulnerabilities for Java SE products. One of these is the new zero-day, though it is currently unclear which one. As attacks targeting Java are increasing, and we could see new zero-days in the immediate future, users should also disable Java in browsers by default, only enabling it for trusted websites when needed. Source: Carsten Eiram, chief research officer, Risk Based Security Source: Trading Secrets/reason.com www.scmagazine.com • March 2013 • SC 13 Update 2 MINUTES ON... The influence of overseas reforms W hile efforts to harmonize data security laws in the United States so far have been futile, the European Union is close to implementing an information protection law that will homogenize the responsibility of all of its 27 member states. But while the European General Data Protection Regulation, now under review by the European Parliament, is expected to efface some of the confusion around complying with a hodgepodge of disparate laws, some companies are concerned that its provisions and penalties are too burdensome. That includes some of the most powerful globally serving U.S.-based firms, which currently are heavily lobbying the EU for Briefs amendments, a move that has Jacob Kohnstamm, the head of a working group representing EU privacy and data protection regulators, telling these companies to back off. “If such a lobby from the European side were organized toward Congress, we would be kicked out of there,” he reportedly said. So what’s causing concern on the American side? The proposed provisions are heavy on privacy and consumer protection. They include a requirement that any company handling EU citizens’ data must notify data protection authorities and affected individuals of a breach within 24 hours. But what’s particularly upsetting to titans like Google and Facebook is a “right-to-be-forgotten” clause, which instructs companies to expunge any data published by someone upon their request. Fines for violating the regulation could swell to two percent of an offender’s annual global revenue. While it’s unlikely Congress in the United States would ever pass anything as stringent as what is proposed in the EU, one unintended consequence 2% of global net annual income would be assessed against EU members for serious breaches under new data-protection rules of a synthesized framework in Europe is that it may push U.S. policymakers to also consider adopting an overarching law here, said Paul Luehr, managing director and chief privacy officer at Stroz Friedberg, a New York-based computer forensic firm. Right now, nearly all states have breach notification laws. Despite a slew of high-profile incidents that have generated interest from Congress, the body has tried and failed several times in the past, even after urging from the White House, to enact a national law. Typically efforts have been hampered by disagreement over the threshold that should constitute notification, concerns from privacy advocates, pushback from corporations not wanting to spend additional money on compliance and opposition from some who believe the state laws provide greater protection. – Marcos Colón JOBS MARKET Me and my job Dominic Vogel IT security analyst at a financial institution in British Columbia, Canada How do you describe your job to average people? I offer options and advice on various business projects and initiatives from a security perspective. At the end of the day, what I do is risk management. It’s about mitigating risk – to the business and our customers – to appropriate levels by ensuring effective countermeasures and safeguards are in place. Why did you get into IT security? When I was in high school, my dad brought home a copy of SC Magazine and I read it (I have no idea where he got it). I’ve been fascinated with IT security ever since. It is the constant change, acute contextual awareness, and the allure of the unknown that drew me to IT security. The challenge of marrying IT security with the rest of the business structure is something I enjoy immensely. What was one of your biggest challenges? Improving the security culture and attitude toward IT security. Since the value of security is difficult to quantify, measure and see in hard, cold dollars, it often falls by the wayside. By embarking on a security awareness goodwill tour, I’ve visited our branches and spoken to head office staff about the importance of security. I always wanted to be a stand-up comedian, so by incorporating humor into my speeches, I changed people’s perception about IT security. The key to cultural change is always humor. Skills in demand Of what are you most proud? Being known as a strong communicator and proponent of improving security culture. People in the IT security realm are often perceived as being hyper-sensitive nerds who force unreasonable security measures that clash with business objectives. I’m very proud of the fact that I’ve broken that stereotype and that my colleagues now have security as a priority rather than an afterthought. What it takes For what would you use a magic IT security wand? If such a wand were to exist, I’d probably be unemployed. Significant expansions of IT infrastructures have increased demand for experienced penetration testers to find security vulnerabilities in targeted apps, networks, and systems. Hands-on experience with reverse engineering and scripting languages is helpful. Expertise in identifying flaws is critical. Designing creative solutions to complex problems, paired with stellar documentation and communication skills, are most valuable. Compensation Specialist-level roles start around $100K, with senior and lead often earning $110K to $130K. Source: Adam Weissman, director of legal technology, Glenmont Group Company news »Paige Leidig has joined San Jose, Calif.-based cloud information protection company CipherCloud as its first chief marketing officer. Leidig was formerly the global VP at SAP, an enterprise software corporation headquartered in Germany. Travis Patterson also has joined CipherCloud as SVP of worldwide sales. Prior, Patterson served as the SVP of sales and support at Sunnyvale, Calif.based mobile security cloud service provider Marble Cloud, formerly called IronKey. rity issues in Yahoo Mail, namely a cross-site scripting (XSS) vulnerability made public in January. Prior to joining Yahoo, Somaini was CISO at Symantec. Before that, he served as the director of information security at Reston, Va.-based Verisign. Paige Leidig, chief marketing officer, CipherCloud »Justin Somaini has left Yahoo, where he had served as CSO, a move that comes not long after researchers exposed secu- 14 SC • March 2013 • www.scmagazine.com »Famed researcher Moxie Marlinspike has left Twitter, where he was part of its security team. He used the social networking site to announce his exit, telling followers in January that he had “some fun projects coming up.” Marlinspike previously cofounded the San Francisco-based Android security firm Whisper Systems, which was acquired by Twitter in 2011. »A new company, Cyber- salus, has launched and will focus on providing services and solutions for threats affecting the government sector. John Kiehm is the CEO of the Reston, Va.-based firm. Cybersalus is a standalone company based on a partnership between Kiehm and Temple, Texas-based distribution and defense solution provider McLane Advanced Technologies (MAT). »FireEye, a Milpitas, Calif.- based advanced threat solutions company, has secured $50 million in venture funding from new and existing investors, which include Goldman Sachs, Norwest Venture Partners, Silicon Valley Bank and Sequoia Capital. The funding will support FireEye’s international expansion, innovation and other initiatives to expand its customer base. C. Scott Hartz, CEO, TaaSERA »C. Scott Hartz has joined Cupertino, Calif.-based security start-up TaaSERA as CEO. Prior, Hartz was the CEO of PwC. TaaSERA, a behavioral malware detection firm, was established in February 2012 through the acquisition of cloud and endpoint security provider Taasware. It also licensed research and development technology for network malware detection from SRI International. WatchDox, a Palo Alto, Calif.-based enterprise solutions provider, has secured $12 million in funding to further its secure » document-sharing technologies. New York-based Millennium Technology Value Partners led the funding, which helped WatchDox last December acquire InstallFree, a product that allows the company to enhance its own file-sharing security platform. Follow us on Facebook and Twitter www.scmagazine.com • March 2013 • SC 15 Opinion From the CSO’s desk New risks must be valued Rafael Diaz Geoff Webb, director solution strategy, NetIQ I Getting a handle on the basics is difficult today. While T trends –cloud, social networking and BYOD – are making the practice of security management complex, and adopting cloud or BYOD can have a great impact on IT costs, employee productivity and even worker morale, there is little are forcing organizations to shift to a risk-management to nothing in the way of data to understand what the risks perspective. The purpose of risk management is to better enable smarter are, let alone how serious they may be. There are a lot of vested interests in both talking up and decisions. Good risk management must underpin all security playing down the risks of all of these industry trends, makstrategy, and yet it is often overlooked in the pressure to “do ing the problems to risk management that much harder to something.” Communicating risk to senior stakeholders is overcome. So, organizations are left to puzzle out the right challenging, and vague categories of “high, medium, low” approach. Businesses, IT organizations, vendors and industry risk can undermine, rather than support, security programs. bodies need to be both open and collaborative in the way we Today’s security teams cannot be seduced by the “sexy” build risk management capabilities. Failure to do so will damaspects of risk. Worrying about APTs may get you a meeting age the ability of businesses to be competitive, for governwith the board, but failures in the basics of patch management agencies to serve their constituents and for IT vendors ment, protection against SQL injection, privileged user monito retain the trust of their customers. And those are the real toring and the like, will be the cause of breaches and negative 13-10548_SCMag_IT_Ad_6.875x4.125_PressReady.pdf 1 2/4/13 1:39 PM risks. publicity that undermine corporate reputations. GRADUATE with C M MORE Y CM MY CY CMY K The master’s degree program in Information Security and Assurance from WGU is CNSS certified and covers the 10 security domains of the CISSP so you can graduate with more—more expertise, more knowledge, and respected industry certifications. Visit www.wgu.edu/scm to learn how you can graduate with an affordable, accredited degree online from WGU. Western Governors University | 1.800.288.1285 18 SC • March 2013 • www.scmagazine.com CISO, state of Illinois A s CISOs, we are expected to be developing secure organizations from insecure components – namely, our business processes, our people, our technologies, indeed our very organizational construct. Information security executives today must work to “engineer” our organizations to be better, faster and cheaper – and more secure. We must design organizations that are self learning, self organizing and self improving. And, it is vital to question even the most sacred of processes or methods. It is through this questioning that we gradually improve reliability – confidentiality, integrity and availability. There are many reasons for this, but perhaps primarily it is that national security is business security. How do we design these new organizations? How do we engineer the reliable organization? Aligning security and compliance with business strategy – While some the people who will use, support, develop, implement and secure the project. While the statistics vary, many researchers will agree that most of the data loss occurring in our organizations is a result of faulty business processes – good people following bad process. One organization, for example, found that for months it had been sending HIPAA data to a fax number that had never been verified. A formal review of business processes using confidential or sensitive data will reveal astonishing results. Organizational changes require a new kind of CISO – As our organizational connectivity and collaboration grows exponentially, information security becomes increasingly complex and difficult to manage. Organizations that recognize this and respond by taking a more proactive, integrated and strategic approach to security will also ensure their CISO is empowered with a business leadership role. forward-thinking organizations are reorganizing their information security functions – moving out of IT – most CISOs report to the CIO. Aligning the information security function with overall business strategy will allow organizations to get a holistic view of security, risk and compliance, help businesses achieve greater speed to market, adopt a risk-based approach to drive growth, and allow for greater input and visibility from business leaders for technology projects. This reorganization can include changes in reporting structure, scope of responsibility and organizational design philosophy. People, process and technology – This is undoubtedly a well-worn concept, heard many times, though not often followed when implementing a solution. In my experience, I’ve often witnessed operations simply address a problem by throwing technology at it. Yet perhaps the greatest asset – and most important consideration – is 30seconds on... »Leveraging position CISOs who are more closely integrated into the business – and more independent of IT – will have more influence and decision-making power, says Diaz. »Ensuring a safe enterprise Involving the CISO with business decisions will give the organization the needed visibility to ensure its business strategy has security, compliance and risk integrated. »Good with the bad The expansion of digital capabilities juxtaposed with vulnerabilities, risks and new attacks brings us to the most constructive and destructive digital era in human history. »From the ground up We have entered an era that requires a new organization, a new security function and a new type of CISO to achieve an organization engineered for security, says Diaz. www.scmagazine.com • March 2013 • SC 19 Photo by Brian Kersey Maximizing quality and reliability J CS O of the Year John South joined Heartland Payment Systems when it was still reeling from a breach…and it’s the best career decision he’s ever made. Dan Kaplan reports. 18 SC • March 2013 • www.scmagazine.com Before Heartland, South toiled for nearly two decades in security jobs where his role was administrative in scope, and every request for budget support was a feckless battle with the rest of the IT department. But with Heartland, he knew that the 3,000-employee payment processor had, even before sustaining the breach, tightly aligned security with its overall business model. The problem was that it always lacked one key ingredient: sound, experienced and strategic security-specific leadership. South was just the person to fill that void, and now, at 62, he’s got a comfortable seat at the boardroom table. “Obviously there’s that risk when you’re coming into a company that suffered a major breach that viability is something you have to be careful of,” South recalls. “But having talked to the principals and a number of other players in the company, I could see a real dedication to not only mitigating the breach, but keeping the company moving forward.” Three-and-a-half years later, South has overseen the gutting and successful reconstruction of its security infrastructure. South, who is SC Magazine’s 2013 CSO of the Year, was brought in to help transform the new operation into a “sustainable and reliable” part of Heartland’s business. In addition, he established an internal audit group that conducts regular compliance checks, even though Heartland knows firsthand that compliance doesn’t equal security. South, who also is an adjunct professor at the University of Dallas, was recruited to work at Heartland’s Plano, Texas location by Kris Herrin, now the processor’s chief technology officer, who was only a couple of months on the job when the breach was discovered. Herrin formerly reported to South at Alcatel-Lucent, where South ended a 19-year stint as director of information security in January 2008. In fact, he was one of the first people Herrin called when he learned of the breach. South’s past year largely has been spent creating Heartland’s application security program, which concentrates not only on external apps – remember, Heartland’s attackers leveraged an SQL vulnerability to stake their initial foothold – but also internal ones. South also is significantly ramping up the company’s security awareness program. For example, he recently oversaw an exercise in which a small portion of workers received fake phishing emails. The security team was interested in learning how many people would click. “Information security is one of the most significant corporate missions and continual challenges at this high-growth company,” says Charles Kallenback, general counsel and chief legal officer at Heartland. “John’s work with the board, the audit committee, senior management, IT, operations and corporate development is absolutely integral to ensuring that information security is embedded in everything that is done at Heartland.” www.scmagazine.com • March 2013 • SC 19 Photos by Jason Janik/Newsport oining a payment processor a mere nine months after it was plundered by hackers of more than 100 million of its customers’ credit card numbers might seem like a risky, if not desperate, employment decision. But for John South, who in September 2009 took the role as Heartland Payment System’s chief security officer, he couldn’t have timed the move any better. CSO of the year diplomatic action against those nations that harbor these criminals or conduct nation-state attacks themselves. SC: Are we getting anything right? JS: Absolutely. We are seeing much more information sharing across government agencies (though there is plenty of room for expansion) and among corporations. Businesses are getting the message that security issues can no longer be their dirty little secret or their competitive advantage. John South, CSO, Heartland Payment Systems Outside of Heartland, South has been instrumental in promoting information sharing around threat intelligence, something he believes is paramount if the good guys stand a fighting chance. He sits on the board of directors at the Financial Services – Information Sharing and Analysis Center (FS-ISAC). In 2009, he helped create a subgroup, known as the Payments Processing Information Sharing Council (PPISC). South also believes in enforcement. In 2003, he helped stand up the U.S. Secret Service North Texas Electronic Crimes Task Force, and is a founding member of the region’s FBI InfraGard program. “John has provided his mentorship to me, personally, and to countless individuals who have benefited directly from his experience,” says David Bentz, assistant director of Group Services, a Fort Worth, Texas-based security services and consulting firm. Besides being “scary smart,” Bentz, a retired Secret Service agent in Dallas, adds that South is a “man of character and dedication.” In a Q&A, SC Magazine asked South to comment on current and future trends, and to define his technology and project roadmap at Heartland. SC Magazine: How would you describe today’s security threat landscape? John South: Today’s security threat landscape is the most dynamic and aggressive we have ever seen. We have focused threat actors, some with nationstate protection, attacking more targets than ever. Whether it’s criminals monetizing their attack strategies or nation-states attacking our critical infrastructures and intellectual property, the financial and tactical rewards are enabling them to invest in building powerful capabilities. They are actively developing new techniques and tactics to affect their strategies, and are easily luring new members into their ranks. Most importantly, cyber criminals know what targets they want to hit and when they will hit them. SC: What is your biggest gripe with the way security is done these days? JS: The information sharing movement can only get traction if it gets federal attention, funding and resources that would enable the intelligence agencies, federal law enforcement and the carriers to establish a comprehensive program for defending and alerting our infrastructure, companies large and small, and even individuals when they are threatened. A second and equally critical requirement is that the Department of State takes 20 SC • March 2013 • www.scmagazine.com SC: Are the adversaries beatable? JS: With these advantages, they probably can’t be beaten. Just like bank robbers and drug dealers, cyber criminals and nation-state actors are part of a criminal lethality that will never go away. But we should all collectively strive to make it so difficult for them to conduct their attacks that it depreciates their economic and political incentives and cripples their operations. At best, we may eventually reach a point where we can effectively stop the majority of attacks at the carrier level and then track the criminals down and bring them to justice. infrastructure. I would not assume that these attacks will be only aimed at major companies, like we have recently seen focused toward the major banks. As cyber criminals perfect their attack vectors, I would expect to see new targets to emerge in the weak links of corporate networks, such as the crucial junctures of companies’ supply chains, as well as their customers’ networks. Attacking the weaker links may give the adversaries an edge in compromising the country’s critical infrastructure. BYOD will challenge all of us, as this is but the tip of the ever-evolving iceberg. Over the next few years, I expect to see more applications and infrastructure built around mobile platforms. Cloud computing will have similar challenges for us in the future, particularly in maintaining full diligence of data and applications. In the cloud, the presence of data may take on all new meanings. SC: What is on your future agenda at Heartland? JS: My agenda is to continue improving Heartland’s security strategy to take advantage of emerging technologies, such as BYOD and the cloud, while staying focused on the security implications of merging these technologies into our infrastructure. I will also continue to press for improvements in industry-government sharing and advocate that the value in the intelligence that we gather is in the sharing of it. SC: What are the security technology essentials that organizations should have in place? JS: One of the more important tools, as always, is a comprehensive logging and review process. Today, it’s critical that this capability be tied into an active intelligence process that allows trained resources to quickly and efficiently identify anomalous behavior. Two other technical capabilities can be associated with this process. As our adversaries need to be able to communicate back to their own devices, having a mechanism for quickly identifying command-and control-channels as they are established is essential. In addition, as we share malware and attack indicators, having a tool that allows one to quickly locate the presence of the indicators on the network provides a distinctive edge. SC: What are the threats/newer applications that you think you and others in your position must address this year, and how will you do this? JS: One of the major threats that will be facing all of us over the next year is the increasingly aggressive DDoS attacks against elements of our critical SC: What tips would you give to individuals looking to enter the field of information security? JS: Build a strong base of understanding around the technical side of security, but be able to discuss your strategies in business terms. You will have to sell your The most important aspect of building a strong security program is having the right team...” —John South, CSO, Heartland Payment Systems ideas to your business leaders and perhaps even your company’s board of directors. Therefore, you must be able to build a business case around your strategy to show not only the technical, but business advantages. The more lucid and compelling an argument you present, the better chance you have of selling and implementing your idea. In addition, if you are completely new to the field of information security or if you are still in school, try to find a company that is offering an internship program, which will give you an opportunity to showcase your capabilities and gain relevant experience. SC: What’s your best advice to others when it comes to building a strong security program? JS: The most important aspect of building a strong security program is having the right team, and the right-size team, in place. There’s no right answer to what the right number of people is. No magic formula exists. However, it’s essential that you have team members who can operate effectively without direct supervision, who can independently decide how to approach a security question and who act as internal security consultants. As such, security team members need to understand how to listen to business leaders and help translate their needs into a strong security program. While this process needs to start early in the project lifecycle, the security team should be engaged throughout the various stages of development and deployment. SC: How will the role of the CSO look in five years? In 10 years? In 20? JS: In the next five years, I expect that we will see increasing turmoil as criminals and nation-states continue to develop and use their capabilities to attack our infrastructure, as well as the networks and computers of companies and individuals. The incentives for our adversaries far outweigh the repercussions. But we aren’t just going to be sitting around, as I believe corporate and federal law enforcement will increase the use of offensive tactics and weapons and implement better defensive capabilities. My projections for 10 and 20 years out are a bit more fuzzy. But wherever that may take us, we need to ensure that security stays engaged early and often in new projects. One thing that is fairly apparent about the future is that there will be a glut of open security jobs as baby boomers phase out of the workforce. There are few colleges and universities that are educating students with degree programs focused specifically on security. This is where active mentor and internship programs can help identify new talent for your organization. SC: Any hobbies, destination spots or other more personal areas of your background that you would like to share? JS: My wife and I have taken up running (after a long hiatus for me, a new adventure for her). Though we both enjoy competing in 5K races around Plano, [Texas], we have a long way to go before we get competitive. But, at least at this time for us, it’s about the running and not the medals. It’s fun to challenge ourselves to improve, even if the only reward is in knowing that we finished. n A more extensive version of this Q&A is available on our website, www.scmagazine.com. www.scmagazine.com • March 2013 • SC 21 Mobile payments handheld at arm’s length The mobile payments concept is surging in Canada, but perception over insecurity is guiding some consumers to resist it, reports James Hale. F rom the world’s first trans-continental fiber optics network to the invention of the BlackBerry, Canada has been a pioneer in digital technology. Now, with Visa’s endorsement of BlackBerry’s Secure Element Manager as the global standard for the card brand’s mobile payments, and the unlikely partnership of telco rivals Bell Mobility, Telus and Rogers in EnStream, the digital wallet concept is surging in the country. But, while some Canadian companies are leading the mobile payments revolution, Canadian consumers seem more wary about the concept. Only about one in five Canadians has used a smartphone to make a purchase, and just 13 percent have used a mobile banking application, according to a 2012 study by PwC Canada, a member firm of the international advisory and tax services organization. The study reports that 74 percent of Canadians are reluctant to make mobile transactions because of security concerns. “Canadians have a feeling that their security is compromised,” says Balaji Jairam, a technical analyst at PwC Canada and one of the study’s authors. “These are the same people who think nothing of giving someone a cheque, even though it has their bank account number on it, but mobile raises concerns.” And, the sense for many is that mobile payment technology is shifting the traditional retail transaction model away from financial institutions. Through EnStream, the telcos appear to be positioning themselves as transactional agents. Formed in 2005, the company has been particularly active in recent months. Its latest move toward transforming Canadians’ smartphones into digital wallets was its February announcement of a distribution agreement with SecureKey Authentication Technology. In announcing the deal, Almis Ledas, EnStream’s chief operating officer, said: “Our mandate is to accelerate the adop- C1 SC • March 2013 • www.scmagazine.com tion of secure, SIM-based NFC [near field communication] mobile payments in Canada through common platforms.” At the same time, PayPal, the global firm that enables online money transfers, has been trying to interest Canadian consumers in its mobile application for Android, Apple and Windows phones, while Square technology – another small-business platform, founded by Twitter creator Jack Dorsey, that enables debit and credit card payments on a mobile device – jockeys to position itself as an alternative to cash registers for small business owners. Still, none of them has done much to make consumers pull out their phones instead of their credit or debit cards. While PayPal has effectively established itself as an online service provider, its effectiveness as a mobile solution rests on consumers’ trust of cellular security. While Square strikes many merchants as a sensible solution – particularly in an era when ‘pop-up’ locations of restaurants and other commercial ventures are in vogue – it presents consumers with an uncertain link to exactly where their bank information is going once they sign with their index finger. “Right now, we’re way behind countries like Japan when it comes to mobile payment adoption,” says Umar Ruhi, assistant professor at the University of Ottawa’s Telfer School of Management. “The overarching factor is trust. Security and privacy are significant barriers. Canadian consumers want to see their banks directly involved.” Andrew Szabo, senior manager of technology strategy and architecture at Deloitte, agrees. “The reluctance on the part of consumers right now is huge,” he says. “We’re hardwired to think of banks as playing the leading role when it comes to retail transactions.” For their part, Canada’s largest banks have been slow to move. In May 2012, the industry announced a set of voluntary, secure and open guidelines – known as the Mobile Reference Model. Yet, in a survey of the Canadian banking landscape released in November, the Canadian Bankers Association was still calling mobile payment “the next innovation, which is coming soon.” “Banks recognize mobile payments as a market interruption,” says Jairam. “I’ll stop short of calling it a threat. They’re making strategies to partner.” But, while banks start from a position of strength in terms of the trust consumers place in them, it remains to be seen if a single organization will be able to control all forms of value transfers in the mobile payment realm, says the PwC report co-authored by Jairam. “For banks to secure and even extend their revenue potential from mobile payments, they’ll have to play an active role in the enforcement of standards across the ecosystem,” the report said. Other key players in the landscape want to have their say, too. For one, the Canadian Federation of Independent Business (CFIB) has expressed concern Government could definitely step back on this one.” —Andrew Szabo, Deloitte that mobile payment technology will hurt merchants by driving up costs, and create consumer confusion by introducing nontraditional actors like the telcos, PayPal, Square and the like. The CFIB enthusiastically endorsed the federal government’s decision to introduce a Mobile Payment Addendum to the Code of Conduct for the Credit and Debit Card Industry in Canada. Led by the Department of Finance, the government held a two-month public consultation on the addendum early last fall. Announcing the consultation, Ted Menzies, the minister of state for finance, said: “As mobile payment options begin to grow more rapidly in Canada, our government wants to ensure that the principles of transparency, fairness and competition are respected.” In February, David Barnabe, a spokesperson for the department, could only say: “The findings of the consultation are being reviewed, and the finalized addendum will be presented in the near future.” No timetable has been announced. Canada’s privacy commissioner is another interested party. As spokeswoman Heather Ormerod says: “Our office is following developments in the mobile payment industry closely, and we are actively exploring the privacy issues, from both a technology and identity management perspective.” As is the case for many longtime observers of Canada’s information technology scene, the government’s decision to insert itself, rather than letting market forces rule, doesn’t come as a surprise. “Government could definitely step back on this one,” Deloitte’s Szabo says. “They could simply set broad boundaries and let the free market rule. Otherwise, it creates an artificial situation.” Canadians have lived with those types of dynamics before: In the limited competition that was permitted following the decision by the Canadian Radiotelevision and Telecommunications Commission to end the Stentor members’ monopoly over the long distance telephone business; in the limited-player cellular market; and in the monopolistic cable television industry. Canadians have learned to live with higher prices than those paid for similar services in other countries, and with delayed introductions of innovative technologies and delivery mechanisms. Analysts are hoping that government intervention won’t stop what they view as what’s needed to kickstart consumers’ adoption of mobile payments. “For consumers, processing integrity is the main thing,” says Szabo. “They also want to have confidentiality, privacy, security and availability, and the banks are good at all of that. Right now, there are a lot of companies trying to figure out how to bring it all together. I think the bad ones will fall away. The winners will figure out the security question and make it look secure for consumers.” Jairam agrees that changing the perception in the minds of skeptical consumers is the winning formula. “This is a field that is going to be driven by consumers’ choice,” he says. “So, if you look at what could be a game-changer, you have to think that if a trusted company, like Apple, came along with a winning NFC solution, that would be a significant event.” Szabo says mobile payment adoption will come naturally. “Everything is leaning the way of NFC,” he says. “It’s shaping the way phone manufacturers are thinking. We’ll see a staggering number of Androidbased NFC apps by the end of the year, and that could change everything.” n www.scmagazine.com • March 2013 • SC C2 Critical infrastructure losing control Industrial control systems remain troublingly vulnerable to both internal error and outside intruders, reports Danielle Walker. R esearcher Tyler Klinger was curious if the companies that operate the nation’s industrial control systems had jumped the proverbial shark when it came to cyber attack susceptibility. While he was well aware that critical infrastructure providers, like power companies and oil-and-gas refineries, had become increasingly juicy targets in recent years, he was interested in learning the ease by which they could be compromised. Klinger, a researcher at Idaho-based Critical Intelligence, which provides information services to industrial control system (ICS) customers, knew that most companies outside of his area of expertise were being regularly breached through targeted emails, commonly referred to as spear phishing, in which employees open a legitimate-looking attachment or follow an enticing link, only to invite malware into their organization. But would the same type of trivial, easy-to-launch attack – one that doesn’t require deep pockets and nationstate backing – be just as effective at allowing criminals to, say, access a utility plant? The answer was a resounding yes. After receiving approval from two companies that operate control systems, Klinger scoured various websites, like LinkedIn and Jigsaw, to locate contact information and other details about various high-level employees working there. He then delivered experimental phishing emails to 72 workers, who had no knowledge of the experiment. Eighteen clicked on the links contained in the messages. Now, if this were a real-world scenario, Klinger would now have a foothold to initiate more technical, and potentially devastating, attacks by leveraging, for example, a vulnerability residing on the very hardware and software that runs these plants. It’s not a far-fetched scenario. In the last decade or so, industrial control systems that were never designed with IT security in mind have become interconnected with corporate computers and networks that expose them to a range of new threats. Last April, the U.S. Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 22 SC • March 2013 • www.scmagazine.com warned of an ongoing spear phishing campaign where attackers increasingly targeted companies in the natural gas pipeline sector. Spear phishing often exposes the human vulnerability within companies, says Scott Gréaux, VP of product management and services at Chantilly, Va.-based PhishMe, a software firm that focuses on phishing threats. Gréaux, who helped Klinger with his experiment, says he advises that management stress to employees that anyone could be on an attacker’s radar. “Engage users in a discussion about phishing attacks, so they are aware that they are real and that [attackers] will target anyone in an organization,” Gréaux says. “They may not necessarily target a control operator. They will target someone where they can get a foothold.” So what can attackers accomplish once they are inside? The threat of outsiders with sophisticated malware targeting critical infrastructure has grown markedly in recent years. Last August, datawiping virus Shamoon rendered 30,000 computers at the Saudi Arabia-based oil company Saudi Aramco unusable. A few months later, officials at Chevron confirmed that the U.S. oil company was hit by Stuxnet in 2010, a worm – believed to be the creation of the United States and Israel – that was originally designed to target only Siemens SCADA systems being operated within nuclear enrichment facilities in Iran. In October, ICS-CERT alerted the ICS sector of increased attack interest shown by malicious groups, like hacktivists. The threat report warned that these groups were using specialized search engines to identify internet-facing ICS devices as potential targets for attacks. The finding came after a security research company released hacking techniques for targeting programmable logic controllers (PLCs), computerbased hardware used to automate industrial monitoring and control processes. The exploit tools were meant for PLCs made by General Electric, Rockwell Automation, Schneider Electric and Koyo Electronics. Then just last month, Austin-based security firm NSS Labs released a study that tracked a 600 percent jump in ICS system vulnerabilities revealed between 2010 and 2012, with 124 security flaws being disclosed. Also this year, ICS-CERT released a technical paper in January that included guidance – and common mistakes to avoid – when responding to advanced attacks. For instance, instead of immediately trying to rid systems of the malware, IT management or designated responders should capture live system data, like network connections and open processes, before disconnecting compromised machines from networks, growth market: Cyber security spending According to ABI Research, a New Yorkbased market research firm, industrial control systems that are ill equipped to fend off cyber attacks will drive increased ...unless the government steps in...the water supply will be vulnerable.” – Nate Kube, CTO, Wurldtec the paper says. Companies additionally were advised to avoid running anti-virus software immediately after an attack, since the scan could change critical file updates or thwart analysis of malware for future detection. David McIntosh, vice president of federal government affairs at Siemens, a Germany-based electrical engineering and manufacturing company that services critical infrastructure sectors, says federal policies are necessary to facilitate the kind of public-private information sharing needed when advanced attacks occur. According to Nate Kube, CTO of Wurldtech, a Canada-based industrial security products company, the nation’s water supply is particularly at risk to attacks of this kind. “[In] industries like water, there’s not a lot of budget for security, so unless the government steps in and provides incentives and regulations, the water supply will be vulnerable,” says Kube. “The level of security is close to zero, which means if you can procure knowledge on its systems, you can [cause] a lot of damage. There’s not a lot of stop gaps. The only protection now is that there’s not a lot of incentive in hacking these systems.” Hours before his State of the Union address, President Obama issued a cyber security executive order designed to spur the implementation of better security spending in coming years. By 2018, ABI expects worldwide cyber security spending on oil-and – gas infrastructure to hit $1.87 billion for the year. Spending in this category includes investments in policies and procedures, IT networks and countermeasures for threats, the firm found. security standards among ICS companies. Though the order won’t be mandated like legislation and will merely provide best practices for the government and private companies, it will direct federal agencies to share information about critical infrastructure threats with corporations in the ICS sector. The move also encourages lawmakers to pass legislation with critical infrastructure protection in mind. Last month, lawmakers reintroduced the controversial Cyber Intelligence and Sharing Protection Act (CISPA), though many privacy groups oppose a provision that may permit personally identifiable information collected by companies to be among what is shared. News of CISPA returning came not long after seven Democratic senators introduced the Cybersecurity and American Cyber Competitiveness Act of 2013 in January, essentially a refresh of a bill that was shot down last year. The language in the measure has not yet been firmed up, but it is expected to create mechanisms for threat information sharing, workforce development, risk assessment and identity theft prevention. Security vendors and end-users have differing opinions, however, on whether regulations are the answer. PhishMe’s Gréaux says that more policy could distract companies from detecting the real threats. “From a practical perspective, I think there’s good policy that can be written to help guide [companies] in the right direction, but it also can distract security practitioners from focusing on threats,” he says. “It takes focus away from protecting assets and systems, and puts it more on compliance. Sometimes it makes the organizations less secure than they were before.” n www.scmagazine.com • March 2013 • SC 23 The 2013 survey: Guarding against a data breach Sponsored by: Preparing for the new norm With almost daily advanced attacks, organizations of all sizes must be at the ready, according to our latest survey. Illena Armstrong reports. E ven as advanced persistent threats (APTs) and other attacks strike companies and government agencies at an unparalleled rate, information security professionals remain bullish about forging ahead with their data protection and risk management efforts this year. In fact, more IT security leaders than ever before think their companies are making greater strides in safeguarding critical corporate and customer data. According to this year’s SC Magazine “Guarding Against a Data Breach” survey, which for the first in its six-year history sought input from professionals in the U.K. and Australia, 91 percent of the 427 U.S. respondents say their companies are taking proper steps to protect critical data, compared to 87 percent in 2012 and 2011. Meanwhile, of the 104 respondents from the U.K. and Australia, 83 percent think they are moving in the right direction. However, the reality may be a little different from these more optimistic views. Just in the last month, it was revealed that sly and practiced hackers, likely from China, pervaded The New York Times computer networks over four months to try to steal information related to a story the newspaper wrote late last year about the Chinese prime minister’s relatives – and the riches they obtained. Enlisting several techniques to hide their tracks, the criminals gained access to employee computers and stole reporters’ passwords, probably using spear phishing methods to install backdoors. So far, there is no evidence that any files, cusConducted by tomer information or other data was affected, according to newspaper officials. The incursions didn’t stop there. Also recently hit were The Washington Post, The Wall 24 SC • March 2013 • www.scmagazine.com Street Journal, Twitter and the U.S. Department of Energy. And all were reportedly battered by similar or the very same savvy cyber assailants employing what are fast-becoming preferred APT attacks that allow them to infiltrate networks and then linger for long periods behind a sea of obfuscation to observe network communications, amass critical information and more. “Generally, there may be a perception that companies are doing a better job by applying security products [or other tactics], but the reality is that security breaches keep escalating each year,” says Ron Baklarz, CISO and export control compliance officer with the National Railroad Passenger Corp. (AMTRAK). “This will only worsen as nation- and state-sponsored attacks on U.S. critical infrastructures increase, as well.” Likely because of this escalation, more respondents to this year’s data breach survey compared to previous years agree that the threat of a breach, loss or exposure is greatly influencing their organization’s security initiatives. Some 85 percent noted this as a major driver, compared to 80 percent in 2012. Similar to U.S. responses last year, 76 percent of U.K. and Australia IT security pros say attacks are a major influence on initiatives for this year’s survey, which was sponsored by Vormetric and conducted in partnership with CA Walker. “As time goes on, more companies understand that it’s better to be proactive and assess and deal with the security of their data – through frameworks, standards and regulations, like ISO 27002, PCI or HIPAA – rather than wait for a security incident or a failing security audit to start making progress,” says Brad Johnson, vice president at long-standing consultancy SystemExperts, based in Sudbury, Mass. This is especially true given how much data actually is being generated every day and how much organizations have come to rely on it to run their businesses, says Tina Stewart, vice president of marketing at Vormetric, a San Jose, Calif.-based provider of enterprise encryption and key management. With reliance on data assets growing exponentially in recent years, protection of it is paramount. “Recently I read that every day, we create 2.5 quintillion bytes of data – so much that 90 percent of the data in the world today has been created in the last two years alone,” Stewart says. “This data needs to be protected, and there is a cost to that protection.” Despite the costs, though, budgets largely are remaining flat, with occasional spikes here and there, says Stephen Fridakis, CISO of UN FAO, the Rome-based food and agriculture organization of the United Nations. While a host of external factors may prompt some increases in shares of IT funding to be allocated to cyber security – with motives often going well beyond the threat of a breach – most budgets remain fixed. “By far the most significant factor affecting our investment strategy is regulations,” he says. “Similarly, the second greatest influence is client requirements. Visa, for instance, requires certain cyber security hardware, software, policies and routine audits to engage in business relationships. Additional factors are results of current audits [or] response to media attention or a direct compromise.” Of the 427 U.S. respondents to the survey, 70 percent say IT security departments and their leaders have the power, executive and business support, budget and resources to continually improve overall corporate IT security strategies – compared to only 63 percent last year. For U.K. and Australia respondents, though, the number is much lower at only 55 percent. These numbers reflect the reality, says Ian Appleby, information security manager with Australia-based Endeavour Energy. “Budgets still remain flat, and all security projects are justified on support the business. “I hear security concerns used as justification to delay system modernization efforts or other changes that might possibly create new exposures,” says Do you agree your company is preventing data from being stolen, exposed or lost? Strongly agree or agree 91% 83% Respondents are more likely to agree that their company is taking steps to protect corporate data 6% Neither agree nor agree 10% Strongly disagree or disagree 0 0 91% in 2013 vs. 87% in 2012 and 2011 3% 5% non-USA USA 20 40 a business-risk basis,” he says. “Having a budget for new tools is good, but not fully effective without the budget for staffing to operate and manage the security environment.” And while some information security funds are seeing modest boosts, Fridakis adds that “there is concern that these budgets may not be able to sustain, in the long run, the increased capabilities that we establish today.” Future plans Just how much current and prospective “increased capabilities” are impacted by questions of budgetary need is up for debate, but some experts – even now – have seen security worries plaguing the adoption of new technologies that could 60 60 80 80 100 Becky Bace, chief strategist at the Center for Forensics, Information Technology and Security (CFITS) at the University of South Alabama in Mobile. But, what information security leaders must be 0 40 diligent about explaining to20 their bosses is that “there’s virtue associated with 0 20 40 80 beefing up security testing and 60 other mechanisms in order to fix problems before systems are deployed,” she says. Because C-level executives and boards of directors often see IT security as a cost center, misunderstand technology in general and fail to see how harmful data breaches can be to bottom lines and the brand, it’s hugely important that CSOs continually educate them about the threats and risks confronting their businesses. www.scmagazine.com • March 2013 • SC 25 60 The 2013 survey: Guarding against a data breach ExeC leaders: Embracing security The need for robust information security plans and data control mechanisms is being acknowledged by executive leaders across all major industries, which bodes well for CSOs looking to ensure they have the resources to support their programs. “Security and data breaches do significantly alter the company’s security initiatives, especially where it relates to an internal breach or a breach in a similar company,” says Ian Appleby, information security manager with Australia-based Endeavour Energy. “Security concerns are now coming down from board level, so the directors can understand the overall risk and security posture of the company. “I believe the publicity surrounding some of the breaches has caused some of the rise in concern. It creates a ‘can this happen to me,’ inquisitive culture.” Most companies rightly concerned about the various ways breaches could impact their organizations. Most of these are worries for private and publicly traded businesses, alike. Still, there are specific controls that public companies must meet as dictated by standards set by major stock exchanges worldwide, which move beyond regulations, such as PCI-DSS, HIPAA or state data breach laws. “These [drivers] all focus on protecting the value of the firm. As the intrinsic value of the firm is classically tied up in things, such as reputation – i.e. brand, customer base – i.e. customer satisfaction, and profit – [meaning] control of losses and other costs of production, says Becky Bace, chief strategist at the Center for Forensics, Information Technology and Security at the University of South Alabama in Mobile. “It’s no surprise that these would be drivers for information protection.” “They must be able to place security into a business-relevant context and balance the needs to protect the organization versus the needs to run the business operations,” says Phil Ferraro, CISO of Arlington, Va.-based DRS Technologies, a global defense contractor. The goal is help business leaders understand that cyber security is not an IT function, but rather a key business enabler, he adds. Yet, even though the potential adoption or deployments of new businessenabling technologies and services might have some influence on continually shaping an organization’s information security plans, their impact should be as nominal as chatter about the next big attack or the soon-to-be released regulatory requirement. Instead, “appropriate risk management” that accounts for what the critical assets are, how they flow and in what ways they contribute to the underpinnings of the business must be the main factors in updating security strategies, says Fridakis. “CISOs need to make sure that we are not swayed by media hype about a technology or a vendor or a perception for an attack,” Fridakis says. “We need to work smarter and concentrate on the most material work. Remaining faithful to a risk profile is essential.” So, when talk of bring-your-owndevice (BYOD) and mobile security crops up, frantic worries about safeguarding cloud environments are voiced, or discussions around third-party applications heat up, security pros have to refine their approaches, but do so through a living risk management plan that enables organizations to be much more adaptable and proactive, rather than reactionary. “Many companies don’t seem to have clear policies to clarify stances on technology like cloud and mobile,” says Jeff Brown, operations leader at General Electric. The implications of technology need to be considered early, and requirements need to be proactively defined and communicated,” he says. “Right now, it is very reactive. Security 26 SC • March 2013 • www.scmagazine.com is often called in well after the project direction has been set and deployment under way.” Accounting for gaps Comparable to previous years, 13 percent of U.S. respondents to this year’s survey say their company has suffered a loss, theft or breach of customer/client data. For the U.K. and Australia, 18 percent say they have. So, although more respondents overall say they’re taking steps to protect critical data, it doesn’t necessarily mean they’re actually doing a better job. “Though I’m certain that more are taking steps to protect data, I’m not as sanguine that those steps are keeping up with the threat vectors,” say Bace of the University of South Alabama. To be sure, the threats are abundant. As well, the attacks themselves are more complex and frequently persistent. “There is no strategy that will be effective against all types of attacks, but to know there are a variety of types is to build effective ways to monitor for them,” says Jennifer Bayuk, a former CSO, and current principal at consultancy Jennifer Bayuk, LLC, based in the greater New York City area. This is where a well-rounded defensive strategy that considers threats from all vectors comes into play, adds Stephen Scharf, CISO of Experian, a Costa Mesa, Calif.-based consumer and business credit reporting firm. “With proper attention to log aggregation and event correlation, an organization can help increase the likelihood it will discover a security breach quickly and be able to address the threat appropriately,” he says. “Time is critical and the sooner malicious activity is detected, the greater the chance it can be resolved before data is exfiltrated.” Survey results show that of those who experienced a breach, loss or theft of data in the U.S., the information was lost, stolen or exposed through a variety of methods, including web application attack (29 percent), malicious insider (20 percent), targeted attack, laptop loss and theft, or email exposure (all 18 percent). Malicious insiders were higher for U.K. and Australia respondents at 42 percent, as were targeted attacks at 26 percent. As well, the information securityrelated problems at the top of lists that caused the greatest financial loss to U.S. companies included data loss (18 percent), data theft (14 percent), vulnerabilities/bugs (11 percent), web application attacks (11 percent) and phishing (nine percent). These seemed to match up with responses from the U.K. and Australia, except when it came to insider threats. Once again, this problem moved nearer the top, at 21 percent compared to only seven percent in the U.S. Targeted attacks, like those that hit some organizations last month, are more frequently the cause of breaches, and so are becoming the norm, experts agree. As a result, it’s crucial that organizations understand how they happen and when. “Attacks, at least the sophisticated ones, aren’t a single-stage process,” says Charles Kolodgy, a research vice president in the security products service for IDC, a provider of market analysts and advisory services with corporate headquarters in Framingham, Mass. “They generally involve multiple steps.” First, there may be a targeted spear phishing email that entices a gullible user to visit a website that infects them with custom malware complete with backdoors. Now inside the network, attackers can search out data and start removing it. So being able to catch and stop anomalous behavior on the network is critical, yet so too is preventing the download of the custom malware that enabled it in the first place. Companies, therefore, are taking numerous steps to address these kinds of attacks, says Kolodgy, including bolstering information security-awareness training to help staff spot phishing emails. As well, organizations are looking to deploy better network-based advanced malware detection to catch malicious payloads. “At the endpoint, companies are looking at whitelisting and application control to ‘firewall the data’. By implementing a layered approach that includes these critical elements, organizations can improve their security posture more effectively and efficiently than by focusing exclusively on traditional networkcentric security methods.” Unsurprisingly, respondents across all the regions queried through this year’s SC Magazine survey already have deployed such solutions as email management and content filtering, network monitoring solutions, database security, and file and email encryption. As well, to a lesser degree, some have implemented vulnerability management solutions and web application security. Regarding plans for future deployments this year, many of these solutions make the lists for both respondents from the U.S. and U.K./Australia, to prevent unknown executables from running,” Kolodgy says. “They are using network forensics and improved SIEM [security information and event management] to see communications from the network to a location that is suspicious. One solution isn’t going to do it.” Vormetric’s Stewart agrees, noting that traditional data protection models that enlist network-focused security methods – using solutions such as firewalls, intrusion detection systems and more – are no longer sufficient on their own. “Any data-centric approach must incorporate encryption, key management, strong access controls and file monitoring to protect data in physical data centers, virtual and public clouds, and provide the requisite level of security,” she says. “Today, it is table stakes Which does your company intend to hire? 11% 7% CISO Data loss prevention officer 8% 6% Chief security officer 7% 5% Chief risk officer 7% 4% Chief privacy officer 5% 2% Other non-USA USA Respondents say they are more likely to hire new security professionals compared to last year, although those intending to hire are at 0 20 a minority. 0 34% 20 40 40 60 60 80 7% 11% None of these 66% 71% 0 0 20 30 30 40 40 50 50 60 60 70 70 80 1010 20 80 www.scmagazine.com • March 2013 • SC 27 100 The 2013 survey: Guarding against a data breach Working with others Information security departments also are becoming more adept at connecting data protection efforts with other departments beyond IT, such as human resources, public relations, legal, boards of directors and others, Bayuk says. Indeed, compared to the results of past data breach surveys, this year, a higher number of respondents across the regions queried say they are meeting with various departments more frequently than in previous years – usually monthly or quarterly. As well, business continuity and recovery plans are reviewed much more frequently than in the past. “Security is not a department, it’s an architecture,” says Bayuk. “These links are part of your everyday security pro- dropped, 6+ persons in the department has increased. 16 to 24 11 to 15 24% 8% 8% 13% 26% 4% 9% USA 28 SC • March 2013 • www.scmagazine.com 5% 1 to 5 9% 63% 6 to 10 15% SECRET MESSAGES AS TATTOOS ON PEOPLES' HEADS 350 BCE PROTECT WHAT MATTERS agencies still need to protect what matters — their sensitive data — from both internal and external threats. In a world of Advanced Persistent Threats (APTs), Vormetric helps many of the global and most security-conscious organizations and government agencies, including 17 of the Fortune 25, 15% 15% a Since the beginning of time, information needed protection. Present day, enterprises and government How many are people in your company IT department? 25 or more SPARTANS CONCEAL quer Mace Con do ni Build Delphi “We actually exist because of busigram – an evolving part of your ability to ness,” Brixius says. “So how do we get respond. It’s observe, orient, decide, act. to the point to have an effective risk It’s a living thing.” mitigation plan and communicate that This is especially true in bolstering to the board because they’re becoming an organization’s business continuity more concerned about security overall? and response efforts in times of both ITLet’s identify the data. Let’s classify the based attacks and physical disruptions, data. Let’s put retention policies around such as those experienced by many that data and then really think about companies in New York, New Jersey and who needs access to this data.” other Northeastern states during Hurricane Sandy. Dennis Brixius, vice president of risk Pondering the future management and CSO with McGrawThis year’s survey revealed that more Hill, the New York-based global CISOs actually are recognizing and financial information and education espousing their stake in the business. company, knows all too well the need And that trend is important since “techto ensure that organizations stay up and nical people don’t make business decirunning. Mobile security issues became sions,” says Rick Doten, CISO of DMI, a much more critical when Sandy hit, and Bethesda, Md.-based provider of mobile his company lost a major data center in solutions and services for smart devices. the heart of Manhattan, which resulted An embrace of corporate needs by in 4,500 employees going mobile. While security pros also indicates that there is the company slowly is moving back to more understanding of “business risks the data center, most of these staff have from the departments, what data is been working from home and the road important, what applications are critical, since November, he says. what behaviors are risky,” and what conNaturally for him, security is not trols ultimately must be put in place, he about just putting together a security adds, noting that “bringing the business architecture or understanding all the into the process is critical.” nuances of a risk management plan. With And with hacktivists, organized crimicyber criminals focused on attacking the nals, espionage actors, state-sponsored key business resource of today – data, attackers and still others overrunning understanding where critical a wide variety of organizations’ information is, how it flows networks, making security The number and who is accessing it no a natural part of everyday of people assigned to handle infosec has matter their location or activities has never been increased: i.e., although the technology or service more central to an enter1-5 person departments prise’s success. This is why they are using is vital. ts Athens fea De α Spártē άρτ Σπ with other technologies, such as mobile security, two-factor authentication, cloud security services and data loss prevention getting some attention. Consultant Bayuk adds that some organizations that often find themselves the targets of APTs, such as government contractors or public agencies, are enlisting attack “kill-chain-monitoring” techniques. In undertaking these more advanced monitoring methods, organizations avoid confusing a series of malicious activities as standalone happenings, which enable them to suss out the patterns behind attacks and therefore better prepare for them in future. “That’s the state of the art now – knowing enough about the individual steps of attacks.” to protect their sensitive data with advanced data security and data security intelligence. 63% 41% Vormetric.com/ProtectWhatMatters non-USA © 2013 Vormetric, Inc. – All Rights Reserved The 2013 survey: Guarding against a data breach “strong risk management cultures that take systematic approaches to measuring risk” and then apply the appropriate resources to address the greatest dangers among them can remain viable even in the toughest times, says Rob Goldberg, vice president of audit services for information technology and eCommerce at Wal-Mart. “The economy is an interconnected web with many interdependencies,” says Goldberg. “An attack on one or multiple pieces of that web can have widespread impact[s] on a country’s welfare. Organizations that do not maintain diligence in this area make themselves the weakest link in the chain and put every other part of the web at risk.” n A more extensive version of the Global Data Breach Survey is available on our website, www.scmagazine.com. Increased capabilities A deeper look at the cloud Cloud services, mobile security threats, social networking vulnerabilities, among other security concerns, all need attention. What most information security leaders understand, though, is that “implementing any new technology lags with securing that technology,” says Rick Doten, CISO of DMI. Cloud, though, in particular has its own set of issues that must be addressed prior to contracting with a provider, says Stephen Fridakis, CISO of UN FAO. For starters, many cloud environments use shared infrastructure that must be monitored and controlled. “We recommend that cloud providers provide a clear understanding of their safeguards and potentially a SAS-70 audit,” he says. Below are a few other areas Fridakis says information security and executive leaders must think about and answer when turning to cloud service providers. Here, mostly verbatim, are his suggestions: A cloud environment does not provide clear control over our confidential information. Insider access to sensitive information needs to be controlled. And, this time, insiders also include the cloud provider’s employees and their contractors. The cloud provider needs to provide information about who has access to sensitive information. If a lot of employees have access to sensitive information, our risk of insider abuse is much higher. Cloud environments are shared, and our data is in the same environment alongside data from other customers. Breaches can easily happen from one database to another. How does the cloud provider protect sensitive data in storage? Are access logs available? Is the data encrypted (at rest, in transition, and for disposition)? How’s the key management handled? The cloud provider should enforce security processes for their integration with third parties. Is there a certification process to make sure that third-party applications are secure and won’t allow hackers to get into the cloud provider environment through one of these partners? Hackers can obtain access to a cloud provider (e.g., Google Apps) and plant botnets. Cloud is also susceptible to a lot more 30 SC • March 2013 • www.scmagazine.com About the survey: Email invitations to take a web survey were sent to approximately 62,000 security professionals who subscribe to SC Magazine across the United States, United Kingdom and Australia. A total of 531 respondents completed the survey. All surveys were completed between Nov. 15, 2012 and Jan. 6, 2013. The resultant data was not weighted, and the margin of error is +/–4.2% at the 95% confidence level. DoS attacks. As a result, cloud providers need to ensure that their perimeter is secure and the barrier to attacks is high. What devices is the cloud provider using to stop bad guys from getting in through the perimeter? Do they have strong network firewalls? How are they kept updated? Do they have good IDS/IPS systems in place? How do they monitor the events? Do they have a SIEM or log management software in place? Does security ownership transfer to the infrastructure provider? What’s the impact on security in the SDLC? How do they ensure protection against key vulnerabilities, like XSS, SQL injection, CSRF, session management, etc.? What happens in case of a breach? Who’s responsible? What are the security issues around APIs (integration is very important when you move to the cloud) and what kind of encryption keys are used for these integrations? Does the cloud provider use scanning tools and services to find vulnerabilities in applications? What is the process of remediating or blocking those vulnerabilities? Would the cloud provider allow you to run your own vulnerability assessment tools? And, given all the attack types being used by a number of cyber criminals who have different motivations, alongside the continuous deployment of various business-enabling technologies, it is up to security pros to keep up with all the risks. “Anything can be secured if committed to it – cloud, mobile, security as a service (SaaS), but most don’t focus on it first,” says Doten. As well, information security leaders should understand that they can’t go it alone, adds Fridakis. “We are very concerned with industrial espionage impacting every sector of the economy in developed countries,” he says. “The problem we face is that we do not have the resources to adequately defend ourselves against this kind of attack.” Beyond acknowledging the inevitability of being attacked, organizations like his must engage in more information sharing to stay on top of the threats and modify their security postures as needed. “The CISO who [operates] in the current economic environment needs to negotiate with other entities, utilize his networks and collaborate with his peers to better detect and also identify the best potential approach to address a problem,” Fridakis says. Product Section Fortinet gateprotect Offers power over Ethernet ports P40 Makes policy creation easy and granular P41 UTMs becoming universal U TMs – universal threat management systems – probably are the poster product for convergence in the information security space. What started out as an evolution from multipurpose devices some years back has morphed into a well-defined product that now has morphed again into a catch-all for security functionality. Conventional wisdom says that you should consider your network compromised and worry now about how to keep the family jewels in the family. Today’s batch of UTMs can help with that. They help by enabling the common sense defenses that we know we should deploy if only we had the tools to implement them. For example, assuming that your enterprise has been compromised, the next task is to detect data exfi ltration. If a firewall is part of the UTM functionality, we now accept that it needs to look at traffic in both directions, not just penetration attempts from outside. If anti-malware is part of the functionality, it needs to see malware that is brought in by user carelessness or other client-side attack. This month, SC Labs Manager Mike Stephenson took half the products and Kevin O’Connor took the rest. It was an interesting batch, to be sure. In addition, I looked at four very cool products in our periodic Emerging Products group. This time it’s security for virtual environments. While we all probably would agree that the cloud is virtual, it does not stand that all virtual systems are clouds. There are multiple ways to secure a virtual system. Some hook into VMware’s API, but some don’t, and, while one might think that the API is necessary to provide good security, this month you’ll fi nd out that it’s not always necessary to hook directly into the VMware kernel. Spending a lot of my time in a virtual environment has taught me that the world – while most of it may be VMware – has more than one virtual environment. Those other environments need securing too. Most of the products in our Emerging Product group address the popular virtual systems and are hypervisor agnostic. I think that there is a lot to like this month – that generally is the case here – and I also think that this month we really have hit some of the most timely product types around. Enjoy! —Peter Stephenson, technology editor Sophos This Best Buy offers a hefty feature set P45 How we test and score the products Our testing team includes SC Labs staff, as well as external experts who are respected industry-wide. In our Group Tests, we look at several products around a common theme based on a predetermined set of SC Labs standards (Performance, Ease of use, Features, Documentation, Support, and Value for money). There are roughly 50 individual criteria in the general test process. These criteria were developed by the lab in cooperation with the Center for Regional and National Security at Eastern Michigan University. We developed the second set of standards specifically for the group under test and use the Common Criteria (ISO 1548) as a basis for the test plan. Group Test reviews focus on operational characteristics and are considered at evaluation assurance level (EAL) 1 (functionally tested) or, in some cases, EAL 2 (structurally tested) in Common Criteria-speak. Our final conclusions and ratings are subject to the judgment and interpretation of the tester and are validated by the technology editor. All reviews are vetted for consistency, correctness and completeness by the technology editor prior to being submitted for publication. Prices quoted are in American dollars. What the stars mean Our star ratings, which may include fractions, indicate how well the product has performed against our test criteria. ★★★★★ Outstanding. An “A” on the product’s report card. ★★★★ Carries out all basic functions very well. A “B” on the product’s report card. ★★★ Carries out all basic functions to a satisfactory level. A “C” on the product’s report card. ★★ Fails to complete certain basic functions. A “D” on the product’s report card. ★ Seriously deficient. An “F” on the product’s report card. LAB APPROVED What the recognition means Best Buy goes to products the SC Lab rates as outstanding. Recommended means the product has shone in a specific area. Lab Approved is awarded to extraordinary standouts that fit into the SC Labs environment, and which will be used subsequently in our test bench for the coming year. www.scmagazine.com • March 2013 • SC 31 » PRODUCT SECTION Unified threat managers (UTM) How unified is “unified”? Judging by this year’s crop of unified threat managers under review, pretty doggone unified, says Peter Stephenson. THE WHEEL CIPHER WAS INVENTED PICK OF THE LITTER For its rich feature set and excellent pricing, we make the eSoft InstaGate 604 our Best Buy. The Sophos UTM 220 offers a comprehensive feature set and integrates perimeter and endpoint security into one product. We make this one Recommended. The Watchguard XTM 830 offers an outstanding feature set, powerful hardware and flexible device management options. It is well worth the expense for larger enterprises. Recommended. U TMs – unified threat managers – have been with us in one form or another for some time. The earliest ones were multipurpose appliances and really were little more than a bunch of point solutions to various security challenges packaged in the same server-grade appliances. Somewhere along the line, the term UTM was coined and, along with it, came a sort-of definition: UTMs had to have a firewall, anti-virus and a VPN. The next step was to start adding all sorts of gateway-applicable functionality – back to the multipurpose boxes – and now definitions seem to be drifting back to the original, more structured UTM description. Today, we can pretty much trust Gartner when the analyst group tells us that a UTM has, “firewall/intrusion prevention system (IPS)/virtual private network, secure web gateway security (URL filtering, web anti-virus) and messaging security (anti-spam, mail AV).” However, even Gartner admits that we still are in the “point-solution-in-a-box” mode. No matter. The types of functionality described in the most current credible definition subsume most information security functionality anyway. That begs the question: How unified is “unified”? Judging by this year’s crop of UTMs, pretty doggone unified. The notion of the individual parts of a UTM working well 32 SC • March 2013 • www.scmagazine.com together is sort of an expected goal. Over the course of UTM history, playing cooperatively with others was equally desirable, but somewhat more rare than it is today. We saw quite a range of possibilities in this year’s batch. First, there are some indications that a large part of what makes a UTM a UTM is stabilizing. That suggests maturity. The user interfaces are about the same as we are used to – with a bit of refinement in dashboards, perhaps – and the integration of functionality continues to improve. Where we saw some noticeable improvement came in two specific areas: defense-in-depth and new functionality. UTMs often have been criticized – certainly by me – as killing defense-in-depth since they place all of the security eggs at the perimeter in one basket. That is not necessarily true anymore. Now we are seeing good integration with clientside protection, especially in anti-malware. The second area – functionality – is growing as well. One of our reviewers observed that this year’s batch seems to be heading toward the “super appliance” that does everything security in a single box. While we didn’t see any of these super boxes this year, we did see some that are clearly heading in that direction. The added functionality is not radical, either. It is refinement of what the traditional UTM has, certainly of the UTM as defined today by Gartner. As you make your decisions about which of these merit further attention, though, remember that at SC Labs we don’t do shoot-outs. The products are not compared against each other. They are tested and graded on their own merits. What this means to you is that there may be a product that has exactly the feature set you want, we liked its performance, but it is a bit pricey. If price is much less a consideration than the other factors, this might be just what you need – even though it might not have gotten our Best Buy this month. This is more important in UTMs because of the wide range of available functionality offered. In UTMs, functionality and performance to published specs are king and queen. If the device won’t do exactly what you need – assuming, of course, that anything can – it is not worth following up even if it is a five-star value for the money. While that always is true to some extent with our products, we see it most often in multifunction products, such as UTMs. So, with all of that in mind, we commend our current crop of tools to your consideration. This is a large group – it almost always is – and the competition is fierce. However, we believe you will likely find answers here, even if you don’t find the perfect product. So, onward into the month’s reviews. TO PROTECT DIPLOMATIC MESSAGES & SECRET DATA 1795 PROTECT WHAT MATTERS Since the beginning of time, information needed protection. Present day, enterprises and government agencies still need to protect what matters — their sensitive data — from both internal and external threats. In a world of Advanced Persistent Threats (APTs), Vormetric helps many of the global and most security-conscious organizations and government agencies, including 17 of the Fortune 25, to protect their sensitive data with advanced data security and data security intelligence. Vormetric.com/ProtectWhatMatters © 2013 Vormetric, Inc. – All Rights Reserved » GROUP TEST l UTM Specifications for UTM tools ●=yes ○=no Application control Integrates with client side anti-malware (A)ppliance or (S)oftware ● ● ● A 40% ● ● ● ○ A PEOPLE ● ● ● ● ● A ● ● ● ● ● ○ A ● ● ● ● ● ● ● A ● ● ● ● ● ● ● ○ A Kerio Technologies Kerio Control v7.4 ● ● ● ● ● ● ○ ○ S NETGEAR ProSecure UTM25S ● ● ● ● ● ● ● ○ A Panda Security GateDefender Integra eSeries eSB v5 ● ● ● ● ● ● ○ ● S WHAT MATTERS Sophos UTM 220 v9 ● ● ● ● ● ● ● ○ A Since the beginning of time, information needed protection. Present day, enterprises and government Firewall Intrusion prevention Gateway antivirus Gateway antispam Web content filtering Email content filtering Check Point Software Technologies Threat Prevention Appliance ● ● ● ● ● Cyberoam Technologies CR2500iNG v10.04.0 ● ● ● ● Dell SonicWALL NSA E8510 v5.8.1.9 ● ● ● eSoft InstaGate 604 v5.0.20121127 ● ● Fortinet FortiGate 60C-POE ● Gateprotect GPZ5000 v9.2 Product MORE HAD PERSONAL INFORMATION HACKED IN 2012 THAN IN 2011 2013 PROTECT agencies still need to protect what matters — their sensitive data — from both internal and external VASCO Data Security aXsGUARD Gatekeeper v7.6.5 ● WatchGuard Technologies XTM 830 ● ● ● ● ● ● ● ○ A Wedge Networks 1005G AntiMalware Gateway v4.0.2 ● ● ● ● ● ● ● ● A ● ● ● ● ● ○ ○ A threats. In a world of Advanced Persistent Threats (APTs), Vormetric helps many of the global and most security-conscious organizations and government agencies, including 17 of the Fortune 25, to protect their sensitive data with advanced data security and data security intelligence. Vormetric.com/ProtectWhatMatters © 2013 Vormetric, Inc. – All Rights Reserved 34 SC • March 2013 • www.scmagazine.com GROUP TEST l UTM Check Point Threat Prevention Appliance (4809) T Details Vendor Check Point Software Technologies Price $28,500 Contact checkpoint.com Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★½ Overall rating ★★★★★ Strengths Comprehensive functionality that is easy to manage. Weaknesses None that we found. Verdict A solid product that rolls out nicely. 36 SC • March 2013 • www.scmagazine.com he Threat Prevention Appliance from Check Point provides fullscale threat protection at the perimeter, as well as incorporating with endpoint security applications to provide a comprehensive security infrastructure. This appliance consists of several components that Check Point refers to as security blades. These include firewall, identity awareness, advanced networking and clustering, IPsec VPN, mobile access, web URL filtering and anti-malware. These blades all function together in a single appliance that can be centrally managed through the Check Point SmartConsole. We found setup and management of this appliance to be much simpler than many of the Check Point products we have seen in the past. It seems as though Check Point has started to refine its product integration with the SmartConsole management junction. The initial setup is done in two stages. The first is to set up the appliance itself. This is done by connecting the device to the network and running through a web-based setup wizard on a machine connected to the same network. This wizard helps get a base configuration in place on the appliance, including network and administrator information. Once the appliance has a base configuration, it can be integrated with the SmartConsole dashboard installed on a machine in the management network. All further configuration and management now can be done through the SmartConsole. This tool offers a lot in the way of configurability and management functions. The SmartConsole dashboard offers a multitude of configurable security functions that help optimize the security capabilities of the Threat Prevention Appliance. Each software blade of the appliance can be easily managed and finetuned directly from this console, which also can manage other Check Point products. This integration allows for easy management across the entire network infrastructure. Documentation included a getting-started guide and several administration guides in PDF format. The getting-started guide provided a great amount of detail on initial configuration steps to get the appliance up and running, while the various administrator guides focused in on specific blades of the appliance. We found all documentation to be well-organized and to include many screen shots, diagrams and configuration examples. Check Point offers standard, premium and elite support levels to customers as part of an annual contract. These services include various levels of phone- and email-based technical help, as well as product replacement and on-site assistance. At a price of $28,500, it may seem a little steep. However, we find the Threat Prevention Appliance to be a very good value for the money. This price, while it does not include support costs, includes nine software blades – firewall, identity awareness, advanced networking and clustering, IPsec VPN, mobile access, IPS, URL filtering, anti-virus, anti-bot – to provide full perimeter threat protection. These blades combined with easy management and integration tools offer a solid threat management bundle. » » GROUP TEST l UTM Cyberoam Technologies CR2500iNG T he CR2500iNG unified threat management appliance from Cyberoam offers a multitude of security and threat prevention features for the network perimeter. This appliance features a stateful inspection firewall, intrusion prevention system, full gateway anti-malware suite, anti-spam, web content management, SSL VPN, web application firewall and controls for instant messaging applications, among many other security and reporting features. This appliance also offers identity-based controls integrated across all the appliance functions allowing for granular security controls based on user authentication and role. We found deployment and configuration of this solution to be easy and straightforward. The initial deployment was done by simply connecting the appliance to the network and browsing to the default IP address with a web browser on a machine connected to the same network. When we accessed the web-based interface for the first time, we were taken through a brief setup wizard that helped us not only set up the basic appliance configuration, but also allowed us to put a base security policy in place. After the initial setup was complete, we were able to manage and finetune our configuration using the intuitive web-based management GUI. This tool offers quite a lot of deployment and policy flexibility. The appliance itself can be deployed in either gateway or bridge mode. Gateway mode allows the appliance to replace an existing firewall, router and perimeter security device, while bridge mode allows for keeping the existing devices and adding additional security using the Cyberoam appliance. Documentation included a short quick-start guide that provided a few simple steps to get the appliance up and running with a basic configuration, as well as a full user guide and several other supplemental configuration guides. The user guide featured full explanation of the product features and functions while illustrating configuration and use of the product through many screen shots and configuration examples. We found all documentation to be well-organized and easy-to-follow. Cyberoam offers customers no-cost, eight-hours-a-day/five-days-a-week phone- and email-based technical support along with access to an assistance area via the website. This includes product documentation, knowledge base and other resources. At a price just under $20,000 for just the appliance and a total cost up to around $35,428 for the appliance and a year of subscriptions to the various services provided by the appliance, this product comes with quite the price tag. However, we do find that this product does offer a very reasonable value for the money despite its high cost. The Cyberoam UTM appliance offers much more than just a perimeter security device, it offers a high level of granular security controls that can keep the network environment safe from many possible threats. Details Vendor Cyberoam Technologies Price $19,999 Contact cyberoam.com Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★½ Overall rating ★★★★★ Strengths Identity-based security controls. Weaknesses None that we found. Verdict A good choice if you can handle the price tag. www.scmagazine.com • March 2013 • SC 37 GROUP TEST l UTM Dell SonicWALL NSA E8510 T Details Vendor Dell SonicWALL Price $39,995 Contact sonicwall.com Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★½ Value for money ★★★★ Overall rating ★★★★¾ Strengths High-powered security device with many robust features. Weaknesses Expensive. Verdict Likely will be too much for the smaller enterprise. 38 SC • March 2013 • www.scmagazine.com he NSA E8510 from Dell SonicWALL is a monster security appliance designed for the large enterprise environment. This product features a firewall and integrated intrusion prevention system that scans all network traffic for trojans, software vulnerabilities, application exploits and other malicious code. Aside from the powerful IPS, this product also provides granular user-based application controls that manage bandwidth, control web access, restrict file transfers and scan email attachments preventing data leakage. The appliance we were sent from the vendor was already licensed and contained an initial configuration, so we did not have a chance to go through the initial setup process. What we can say, however, is that the initial setup process looks quite straightforward based on the documentation. The first step is to register the appliance with SonicWALL by creating a mysonicwall account. After the appliance is registered, the initial configuration is done by accessing the web-based setup wizard using the default IP address of the appliance. This setup wizard allows for selection of the deployment mode and assists in getting the appliance up and running with a basic configuration. This tool features options that allow for deployment in almost any environment. The NSA offering can be deployed as a full security gateway appliance, in conjunction with another security device, such as an existing firewall or router, or in tandem with another SonicWALL appliance to provide additional security functionality. Aside from deployment flexibility, this product also includes a lot of configuration and policy options. Firewall and security policies can be made to be as granular or as broad as needed with the comprehensive policy engine that is included on the appliance. Each policy rule includes many checkable and configurable options. Documentation included a detailed getting-started guide that illustrated the steps necessary to get the appliance up and running with an initial configuration, as well as information on deployment options. Other documentation included a full administrator guide and a few supplemental configuration guides. The administrator guide was a massive 1,490-page PDF. It included a high level of detail on how to configure and manage the appliance and its features. This guide was well organized and included many screen shots, step-bystep instructions and configuration examples. SonicWALL offers support and maintenance contracts in one, two, and threeyear increments. Customers can purchase support at various levels of phoneand email-based technical assistance and other options based on contract level. As part of its support offerings, SonicWALL also offers access to a knowledge base, product documentation and product downloads. At a price just shy of $40,000, this product features quite the price tag. We find it to be a good value for the large enterprise, but probably overkill and way too expensive for smaller environments. With that said, this solution does have a lot to offer in the way of features and functionality – if you can afford it. The SonicWALL NSA E8510 offers robust security features with the high capacity throughput that is needed for even the largest of environments. » » GROUP TEST l UTM eSoft InstaGate 604 T he InstaGate 604 from eSoft is an appliance we have seen come back year after year with an array of great features and functionality at a reasonable cost. This product offers a stateful firewall with deep packet inspection capabilities, proxy-based scanning, real-time threat monitoring, scanning of both web and email for worms and viruses, and protection from bots and other network attacks. This product can be loaded with functionality by using specific SoftPaks made available from eSoft, allowing for complete customization of features and services. We found this product is about as plug and play as a network security appliance can get. The initial setup process takes just a few minutes and the appliance is pretty much up and protecting the network with just a few clicks of the mouse. To begin the setup, we plugged the InstaGate into our network so it could grab a dynamic host configuration protocol (DHCP)assigned address. Once it had an address, we were able to access the web-based setup wizard through a web browser. This short setup wizard helped us get a base configuration in place, as well as download and update the SoftPaks that were registered to the appliance. After the wizard was complete, we were able to access the webbased management console for all further administration and management. We continue to find this appliance to be one of the easiest appliances to configure, use and manage. On the policy and management side, most configurations are as simple as on or off, but that does not mean this product lacks flexibility or granularity. This solution can be easily configured for a multitude of environments. It also features a solid dashboard that is centered around the ThreatMonitor, which shows real-time reporting of events and traffic with clear charts and graphs that are easy to read even at a quick glance. Documentation included a short quick-start guide that detailed the initial setup process with clear step-by-step instructions and screen shots, as well as a full user guide. The user guide also provided many screen shots and stepby-step instructions on device and feature configuration, as well as overall device management procedures. We found all documentation to be well organized and easy to follow. eSoft offers 90 days of no-cost phone support to help get the appliance up and running. After 90 days, customers can purchase phone support on a per incident basis or as a yearly subscription for unlimited 24/7 support. Also available is a plan that includes unlimited phone support, hardware care, software updates and hot swap service. All customers also can access a web-based assist area that includes product documentation and a knowledge base. At a price just shy of $2,000, plus an annual cost of around $1,500 for software, maintenance and technical support, we find this product to be an excellent value for the money. The eSoft InstaGate is powerful enough to protect some of the larger environments with an impressive feature set, but it has a price tag that even small environments can easily handle. We find this product to be a solid value for the money. Details VVendor eSoft Price $1,999 Contact esoft.com Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ Overall rating ★★★★★ Strengths Feature rich with a low cost. Weaknesses None that we found. Verdict For its rich feature set and excellent pricing, we make this our Best Buy this month. www.scmagazine.com • March 2013 • SC 39 GROUP TEST l UTM Fortinet FortiGate-60C POE T Details Vendor Fortinet Price $1,998 Contact fortinet.com Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ Overall rating ★★★★★ Strengths Many easy-to-manage network security features in a box with power over Ethernet ports. Weaknesses None that we found. Verdict An extremely strong contender, especially for smaller enterprises. 40 SC • March 2013 • www.scmagazine.com he FortiGate-60C POE offers a combination of the functionality of a security appliance with the capabilities of a power over Ethernet switch. This product can protect the perimeter of the network with a firewall, intrusion prevention system and IPsec and SSL VPN, along with providing direct connectivity to power small ethernet devices and access points. This product also features many network security functions, including web content and URL filtering, application control and anti-virus, along with botnet protection and data leakage protection capabilities. It can be configured and managed in multiple ways for added flexibility. The FortiGate-60C is compatible with FortiGate’s FortiExplorer setup application. This can be run from a Windows- or Mac-based system to easily and quickly configure the appliance using a wizard-based structure. The appliance also can be manually configured without the use of the wizard through the web-based management interface or the command line interface. We chose to run FortiExplorer to configure the appliance. We found this method of setup to be easy to follow and we were up and running within minutes. For more granular configuration, the web-based management interface can be accessed after the appliance is configured. We found this interface to be quite easy to use overall and a lot less awkward than some of the older versions of the FortiGate interface. It also was intuitive to navigate – we were performing advanced configuration with no trouble at all. Overall, we found this appliance to include many robust and configurable options and features. Documentation included a short quick-start guide, along with a full administrator guide and a few other pieces of supplemental documentation. The quick-start guide provided simple step-by-step instructions for each of the initial setup scenarios, as well as an overview of the appliance specifications. The administrator guide focuses on configuration and management of the product with many step-by-step instructions and configuration examples. Both guides also included many screen shots and diagrams. Fortinet offers various levels of support contract lengths and assistance levels. Customers can purchase support in one-, two- or three-year increments and at eight-hours-a-day/five-days-a-week or 24/7 levels. This help includes phone and email technical support, as well as software and firmware updates and hardware replacement in case of failure. Customers also can purchase additional professional services from Fortinet, including on-site visits and dedicated support engineers. Additionally, Fortinet offers a support area online at no cost that includes product documentation, a knowledge base and other resources. At a price just shy of $2,000, we find this little appliance to be an excellent value for the money. The FortiGate-60C POE offers a full suite of perimeter security features, along with the added functionality of an Ethernet switch to power access points and other devices – all from one easy-to-manage unit. This product offers a comprehensive feature set at a reasonable cost for almost any size environment, but really shines for smaller enterprises. » » GROUP TEST l UTM gateprotect GPZ5000 T he gateprotect GPZ5000 is the ultimate multifunction security gateway appliance. This product features a full firewall with intrusion detection and prevention system; anti-malware at the gateway, including protection from viruses, worms and spyware; spam protection; web and URL content management; and application control. This appliance is built for the large enterprise with high throughput and multiple VLAN capability, along with QoS and user-based controls. A couple of years ago when we reviewed this product, we said that the management console was difficult to use and hard to understand. After getting the chance to spend a bit more time with the product this go around and consequently becoming comfortable with the design of the gateprotect eGUI, we actually found that this tool has become a bit more easy to configure and use. The eGUI, especially, added to the process becoming somewhat more simple as it replaces the standard management interface with something more visual. Rules are created simply by establishing a map of the network and assigning rules or policies based on connections, users or groups. The initial configuration of the appliance is done by connecting it to the network and then installing the management application on a machine on the same network. Once the appliance is powered on, it can be seen from the application, and the eGUI interface can be accessed by logging in. There is a setup wizard available, but it is actually much easier to configure the appliance from scratch using the drag-and-drop method of the eGUI. Overall, this appliance seems to get easier and easier to use every time we see it. Documentation included a one-page quick-start guide – that provided the steps to access the appliance initially – and a full administrator guide. The administrator guide covered the appliance from initial configuration all the way through advanced management and use of the appliance features. This also included many step-by-step instructions, configuration examples and screen shots. We found all documentation to be well-organized and to provide a good amount of detail. The company offers no-cost phone and email technical support during evaluations and the first 30 days after purchase of the product. After the first 30 days, customers can purchase additional assistance through a contract. The company offers both eight-hours-a-day/five-days-a-week and 24/7 support options, which include phone- and email-based technical help. Customers also have no-cost access to an online support area that provides a knowledge base, FAQ section, user forum, product downloads,and other resources. At a price just shy of $20,000, this product is not inexpensive by any means. However, we find this solution to be an excellent value for the money. While the price may seem high at first, it is balanced by the overall ease of use of this appliance. Not only is this appliance easy to manage overall, it has a very high degree of flexibility in policy configuration, with the help of the eGUI interface. Details Vendor gateprotect Price $19,995 Contact gateprotect.com Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★¾ Overall rating ★★★★★ Strengths eGUI interface makes policy creation easy and granular. Weaknesses Can be too expensive for many environments. Verdict The strength here is in the policies – a solid, configurable product that can be finetuned for your requirement. www.scmagazine.com • March 2013 • SC 41 GROUP TEST l UTM Kerio Technologies Kerio Control v7.4 T Details Vendor Kerio Technologies Price $265 for software appliance, plus five users, $26 per additional users. Contact kerio.com Features ★★★★½ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★¾ Support ★★★★¾ Value for money ★★★★★ Overall rating ★★★★★ Strengths Simple setup, documentation geared for novice administrators. Weaknesses VPN implementation is currently proprietary, light on reporting. Verdict Great for small businesses or novice administrators, administrators with more complex environments may want to wait for v8.0. 42 SC • March 2013 • www.scmagazine.com he term “unified threat management” can sound intimidating to administrators lacking in information security experience. Fortunately, basic UTM protection doesn’t need to be overly complex, and Kerio Technologies’ Kerio Control product is a great example of that. The product we tested was provided as a VMware virtual appliance. Following the quick setup guide, it was a simple matter of importing the appliance into our ESX environment and starting the tool. Through the console, we set up our trusted and untrusted interfaces and chose an administration password. All further configuration was performed through the product’s web interface. On first login, we were presented with a configuration assistant wizard, which guided us through installing our license and setting up a basic traffic policy. Kerio Control provides a clear, snappy interface for administration. The administrator is provided with a clean, configurable dashboard on login, which offers a number of system status charts. All device features are listed in a hierarchal menu on the left-hand side, with configuration options presented on the right. All of the features we’d expect are present, including a basic firewall, intrusion prevention system, content filter, perimeter anti-virus scanner and VPN. It also can serve as a dynamic host configuration protocol (DHCP) and domain name system (DNS) server. While intended to be used as the default gateway, the product also can be configured as a proxy server for content filtering purposes. The intrusion prevention system (IPS) is signature-based, with signatures updated automatically on a configurable schedule. Anti-virus services are provided by Sophos, with signatures again updated on a configurable schedule. The content filter supports rules based on IP address groups, URL groups and keywords. Lightweight directory access protocol (LDAP) integration is supported, which makes user-based content filtering extremely easy to implement. The product’s documentation is very good. Guides are provided for the initial appliance installation, initial configuration and ongoing administration. Presented as PDFs, they are well-organized and seemingly tailored for administrators without extensive UTM experience. One negative thing we noticed was their recommendation that administrators allow access to the administration front-end from the untrusted interface. While we acknowledge that it would make remote administration easier, it really does not follow best practices, so we recommend reading the documentation with a critical eye. Product support is offered on a 24/5 basis, and is provided via phone or email. Kerio also maintains an online knowledge base and active user support forums. Kerio Control starts at a cost of $265 for the software appliance with five user licenses. Additional user license are priced at $26 per user. Software maintenance is $9 per user per year. Support is free during an initial 90-day implementation period. After that, Kerio allows two free support calls per year and charges $80 per incident after that. » » GROUP TEST l UTM NETGEAR ProSecure UTM25S U nified threat management solutions shouldn’t be limited to large corporations with unlimited budgets. NETGEAR agrees, and offers their ProSecure UTM25S at a price point that should be attractive to small businesses. We began the setup process by unpackaging the device and connecting one of its four local area network (LAN) interfaces to our network. After configuring a network interface on our administration workstation with an IP address of 192.168.1.2, we were able to reach the device’s web configuration screen. After logging in with the default username and password, we were presented with a basic system status screen displaying CPU/RAM utilization and other statistics. Clicking on the “wizards” link took us to a page that allowed us to begin a basic setup wizard, which guided us through configuring the LAN IPs, the WAN interface, connection to an network time protocol (NTP) server, basic service scanning and update scheduling. Once the wizard was complete, the system rebooted and came back up ready to begin protecting our network. The ProSecure UTM25S offers a number of protections, including a firewall, email, web content and application filters, VPN services and anti-virus scanning. The content filter works as we’d expect, allowing for blocking based on category, keyword, file extension and URL black/whitelisting. Schedules can be set to expand or relax filtering rules and the website categorization database is regularly updated. LDAP integration is supported, and installing the domain controller agent allows for single sign-on authorization allowing administrators to be granular in the application of content filtering rules. A basic IPS is also included. It is signature based and also offers basic protections against port scans and DDoS attacks. VPN setup is made easy with a set of wizards to assist with creating IPsec and SSL VPN tunnels. Point-to-point tunneling protocol (PPTP) and Layer 2 tunneling protocol (L2TP) also are supported. Its two WAN interfaces allow for load balancing or WAN failover, and owners of two UTM25s can configure them into a high-availability cluster. The device also supports a couple of addon modules: a wireless LAN module can provide wireless services for five to 20 users in either the 2.4GHz or 5GHz band (but not both simultaneously), and the optional digital subscriber line (DSL) network module can be configured as the primary WAN link, or as a failover or load balancing link. Unfortunately, the interface that administrators are required to use to control all these great features is the device’s main weak point. It’s clunky and simplistic. NETGEAR’s product documentation is well done. Quick start, installation and administrator’s guides are available as PDFs on the included support CD and on NETGEAR’s website. They’re very detailed and well-organized with bookmarks, screen shots and diagrams where appropriate. We were pleased with the thoroughness of the system log and error message appendix in the administrator guide, which provided detailed explanations of log entries and remediation suggestions for error messages. The ProSecure UTM25S is priced at $695, which includes the hardware and a one-year support and update subscription. The optional wireless module is $56, and the optional DSL module is $91. Details Vendor NETGEAR Price $695 (includes hardware, plus one year subscription bundle) Contact netgear.com Features ★★★★¾ Ease of use ★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ Overall rating ★★★★¾ Strengths Low cost, included support, good feature set. Weaknesses Ugly, clunky interface. Verdict A great option for small businesses. www.scmagazine.com • March 2013 • SC 43 GROUP TEST l UTM Panda Security GateDefender Integra eSeries eSB P Details Vendor Panda Security Price $1,505/year (50 users) Contact pandasecurity.com Features ★★★★★ Ease of use ★★★★¾ Performance ★★★★★ Documentation ★★★ Support ★★★★★ Value for money ★★★★ Overall rating ★★★★½ Strengths Well-done interface and low cost. Weaknesses Mostly comprised of freely available software, poor documentation requires some familiarity with UTMs. Verdict While it’s hard to get over the fact that this product is essentially a collection of open source software, the interface is so well put together that we believe it’s worth the fee for support, provided one is familiar with the individual components. 44 SC • March 2013 • www.scmagazine.com anda Security’s GateDefender Integra eSeries eSB is both easy to set up and offers a rich feature set with a great deal of flexibility. To get the most out of the product, however, administrators should be familiar with a number of open-source technologies. The product was provided to us as bootable ISO. Upon boot, we were presented with a DOS-style GUI installer. We were prompted to input an IP address for the LAN interface, after which the OS installation proceeded to completion. After a quick reboot, the console directed us to access the product’s web interface, where a post-installation wizard began. We chose a root password for console access and an administrator password for use in the web interface. We then configured the WAN interface and an administrator’s email for notifications. This brought us to the end of the wizard, and a message was displayed indicating services were being restarted. However, there was no progress bar or any indication of activity until an authentication window popped up about a minute later. The GateDefender Integra eSeries eSB provides all of the functionality we’d expect from a UTM, featuring a firewall, HTTP proxy, content filter, spam and anti-virus filters, intrusion prevention system and VPN functionality. However, the product, almost in its entirety, is comprised of freely available open source software. For example, the base operating system appears to be RedHat Linux, IPS services are provided via Snort, the HTTP proxy via squid, spam filter via SpamAssassin, and so on. The real value, then, comes from the included support and the outstanding administration interface. Panda Security has clearly put a great deal of effort into unifying these disparate software packages into a single, high-performance UTM. In addition, the company has built in a remote administration service that, when activated, permits an administrator to open a secure tunnel to their device via Panda Security’s website. Documentation is barely passable. While a number of PDFs are available – including quick-start, installation and user guides – they are extremely textheavy. No bookmarks or indexing are included and, of the few diagrams and screen shots provided, some of them are in Spanish and some in English. The administrator’s guide can be found on the website, but it is an HTML document; again, very text heavy and at times difficult to navigate. In addition to these weaknesses, information on some of the UTM features is scarce. The documentation appears to be written with the assumption that the administrator is already familiar with the software encapsulated in the product, or that the administrator will make use of information available elsewhere. Information on the anti-virus engine was missing completely at the time of this writing. Panda Security offers only one tier of support, which is provided 24/7/365 via phone or email. The company also hosts an online knowledge base, FAQ and user support forum. The GateDefender Integra eSeries eSB is priced at $1,505 per year for up to 50 users, which includes support. » » GROUP TEST l UTM Sophos UTM 220 P erhaps best known for its anti-virus products, Sophos has produced a stellar UTM product with the UTM 220. Targeting small to midsized offices with up to 150 users, it combines standard UTM offerings with a few features we didn’t expect, making this product something definitely worth looking at. The initial product setup proceeded about as we expected. We first set our workstation IP to match the system’s default LAN network, then logged into the web interface with a default username and password. We were presented with a one-page form where we specified a hostname, administrator password and device location data. (Curiously, all fields were required, including the location city and country. We discovered later that those values are used to generate a root certificate for the product’s encryption features.) After accepting the device end-user license agreement (EULA) and submitting the form, the device performed a quick reboot and then launched a 10-step setup wizard where we installed our license file, configured our LAN and WAN interfaces, and made some simple selections to establish a basic rule base for the firewall and content filtering systems. Finishing the wizard initiated a final reboot and, at that point, we were ready for finetuning. Overall, the initial setup from unboxing to basic configuration took around 10 to 15 minutes. The UTM 220 has eight freely configurable network interfaces, providing plenty of space for WAN, LAN and DMZ zones. It can be easily managed with its excellent web interface or clustered and centrally managed via the Astaro Command Center software. It supports link aggregation and bridging, and offers border gateway protocol (BGP) or open shortest path first (OSPF) as routing protocols. Several types of authentication servers are supported, including LDAP/Active Directory, RADIUS and eDirectory. A standard category-based content filter is provided, with support for user/ group-centric rules and white/blacklisting. SMTP and POP3 proxies can be enabled, with S/MIME and PGP encryption options available for SMTP. The product also provided support for SIP and H.323 protocols, dynamically opening ports based on activity in the control channels of those protocols. It contained a signature-based IPS and web application firewall, with numerous VPN options ranging from a standard IPsec tunnel to Amazon Virtual Private Cloud integration and an HTML5 SSL VPN. Sophos also extends its perimeter protection to the endpoints. By installing a workstation agent, the UTM 220 can provide centrally managed AV protection, as well as provide limited control over predefined storage, network and short-range devices. The logging options on the device are impressive as well. Syslog is naturally supported, as well as log archival to FTP, SSH, SMB shares or email. Numerous charts are available and live scrolling views of all logs are easily accessible. The UTM 220 is priced at $1,275 for the unit itself or $3,135 for the unit and one year of updates and premium support. Continuing that package beyond the first year costs $2,979 per year. Details Vendor Sophos Price $3,135 (includes one year of support) Contact sophos.com Features ★★★★★ Ease of use ★★★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★★ Overall rating ★★★★★ Strengths Comprehensive feature set, integrates perimeter and endpoint security into one product. Weaknesses None that we could find. Verdict A strong product for its target market and aggressively priced. We make this one Recommended. www.scmagazine.com • March 2013 • SC 45 GROUP TEST l UTM VASCO Data Security aXsGUARD Gatekeeper A Details Vendor VASCO Data Security Price $775 Contact vasco.com Features ★★★★ Ease of use ★★★ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★ Overall rating ★★★★½ Strengths Inexpensive, good documentation. Weaknesses Very basic user interface; careful documentation review is a must; per user licensing fee for content filter; and relies on open source components. Verdict The product’s low upfront cost makes it a good choice for knowledgeable administrators in small, budget-conscious environments. 46 SC • March 2013 • www.scmagazine.com dministrators of smaller environments on a fixed budget could do very well by the aXsGUARD Gatekeeper by VASCO Data Security. While a little more complicated to use than some of the more expensive products, with a little attention to detail the device performs well. As usual, our setup process began by setting a workstation IP address to match the product’s default network. We logged in to the web interface and were immediately presented with a user-creation wizard, which we enlisted to create an administrator account. Upon completion of that wizard, we were automatically logged in with our new credentials. A menu was displayed with a series of separate wizards, which guided us through configuring the device hostname and location data, SMTP relay and administrator email accounts, time server and interface settings. Once the wizards were complete, a device reboot completed the initial configuration. While the product offers all of the features we expect out of a basic UTM, configuration of those features is not always completely straightforward. Administrators will want to keep the documentation close by. That said, once configured, the device performed very well. The firewall appears to use your standard iptables. However, rules are automatically put in place, allowing VASCO full access to the device. While ostensibly for support purposes, security-minded administrators will want to disable those rules straight away. The product uses Snort as the intrusion prevention system, which is great. Yet, administrators are expected to acquire their own registration code for signature updates. The content filter works well, but it is the only component of the device licensed on a per-user basis, so keep that in mind when comparing prices. Anti-virus protection is provided with ClamAV, another open source component. VPN services are provided via picture transfer protocol (PTP), IPsec and OpenVPN protocols, and support is also included for Vasco’s aXs GUARD product, as well as a basic SSL web portal. AD/LDAP integration is included. However, single sign-on features require an agent to be installed on each client workstation. One thing we really did like was the device’s multifactor authentication features, with support for Vasco’s DIGIPASS tokens and eID smart cards included. VASCO offers a number of different support options. Their standard package provides eight-hours-a-day/five-days-a-week phone and email support. This is upgradeable to a 24/7 support package. A VIP package is also available, which is completely customizable according to the customer’s needs. Additionally, per incident and emergency support services are offered, as well as a customer support area hosted on VASCO’s website, which offers a knowledge base and product tutorials. The VASCO aXsGUARD Gatekeeper is priced at $775 for the hardware unit, and includes the first year of support. Support renewal starts at $175 per year for a basic nine-hours-a-day/five-days-a-week support tier. The content filter is an optional extra and is licensed at $25 per user per year. » » GROUP TEST l UTM WatchGuard XTM 830 W hile best known for its firewalls, WatchGuard is no slouch in the UTM space. As we detail below, its XTM 830, somewhat pricey, provides an excellent enterprise-grade perimeter defense against viruses, spam and other unwelcome traffic – and includes a number of other features all in one easy-to-administer device. We began the setup process, as is usual for these types of devices, by connecting a specified interface to our LAN. After setting our workstation IP to fall within the default device network, we were able to access the product’s web interface. Upon logging in with the default username and password, we were presented with a first-run setup wizard, which stepped us through a basic device configuration. After configuring the WAN and LAN interfaces – setting admin and read-only passwords, location information and time settings – we were given the option to activate the device online. Completing the activation process (a simple, one-click affair) unlocked all of our licensed features and this ended the configuration wizard. The elapsed time from unboxing the product to having a functioning perimeter gateway was approximately 10 minutes. The XTM 830 is a centrally managed UTM with a rich feature set. While most device features are easily managed through its excellent web interface, the device’s true power is only unlocked by setting up the WatchGuard System Manager, a client-server application which enables management of all WatchGuard devices in one’s environment. The firewall works, as expected, with support for comprehensive rule sets, static network address translation (NAT) mapping and other standard features. Its signature-based IPS breaks threats out into critical, high, medium, low, and informational categories, and the signature database can be regularly updated on a predetermined schedule. Additionally, support is built in for signature exceptions, and notifications can be configured to be delivered via email or a simple network management protocol (SNMP) trap. The WebBlocker feature is a content-filtering system that can be configured to use one of two website categorization database services: either the default, cloud-based Websense service or up to five locally hosted WebBlocker servers. User/group-oriented filtering rules are made possible through the device’s AD/ LDAP integration support, and RADIUS and SecureID are offered also. WatchGuard has a reputation with us for providing excellent documentation and this product’s documentation falls right in line with that expectation. Installation, quick start, and two versions of the administration guides, tailored to either the device’s web interface or administered through WatchGuard System Manager, are available as downloadable PDFs from WatchGuard’s support site. These are superbly organized with bookmarks, hotlinks, screen shots and diagrams where appropriate. The administration guides are also available as a web document hosted on the product’s support site. The XTM 830 is a pricey $17,740, which includes one year of plus-level support. This may be upgraded to gold for $2,430. Standard (12/5) support afterward costs $2,725 per year and gold is priced at $5,145 for one year. Details Vendor WatchGuard Technologies Price $17,740, includes one year of support Contact watchguard.com Features ★★★★★ Ease of use ★★★★¾ Performance ★★★★★ Documentation ★★★★★ Support ★★★★★ Value for money ★★★★¾ Overall rating ★★★★★ Strengths Outstanding feature set, powerful hardware, flexible device management options. Weaknesses Expensive, requires client-server application to use some advanced features. Verdict Well worth the expense for larger enterprises. Recommended. www.scmagazine.com • March 2013 • SC 47 Wedge Networks 1005G AntiMalware Gateway T Details Vendor Wedge Networks Price $5,080, plus $1,270/year for basic support. Contact wedgenetworks.com Features ★★★★ Ease of use ★★★ Performance ★★★★★ Documentation ★★★★ Support ★★★★½ Value for money ★★★ Overall rating ★★★★ Strengths Flexible deployment options, high data throughput. Weaknesses Partially functioning features, some documentation lapses. Verdict Given the price, you may want to consider carefully before selecting this one. 48 SC • March 2013 • www.scmagazine.com he Wedge Networks 1005G looks good on paper, but in reality is a little disappointing. While the initial setup was easy enough, ease-of-use issues and documentation gaps made for a frustrating deployment experience. The 1005G setup procedure was a completely manual process. Given the choice between bridge and routing mode, we elected to deploy the device in a bridge configuration. After setting our workstation IP to the device’s default network, we were able to access its web interface. From there, we configured the Ingress interface to match our network, reset our workstation IP and reconnected to the web interface. We then connected the Egress interface to our WAN network logically just behind our firewall. After that, we reset the default route on our LAN to point to the 1005G, sending all of our outbound traffic through the device. We were then able to set up rules governing anti-virus scanning and SMTP and web content filtering. One of the first signs of trouble we encountered was when running one of the device’s built-in diagnostic tools. The Configuration Check tool tests the device’s network configuration by attempting to connect to various update and support servers. As we discovered, the configuration check consistently fails because one of the servers it attempts to connect to does not exist – or was at least unreachable up until the time of this writing. While not entirely critical, we considered it bad form. The 1005G encompasses anti-virus, anti-spam and content filter services. The anti-virus service offers a choice between the Kaspersky or Bitdefender AV engines, and can use Wedge’s GreenStreaming feature, which permits the device to begin relaying HTTP information to the client before the entire payload has been downloaded and scanned. Active Directory/LDAP integration is also supported. However, it requires login and logoff scripts to be implemented in order to append IP address information into users’ AD entries. That said, we were not actually able to get the device to connect to our AD environment due to an inability for the configuration submission form to parse our otherwise valid Search Schema DN string. While the documentation is adequate, we did encounter a few gaps. For example, we were not able to determine how to specify which of the two antivirus engines were used, even though the administrator’s guide says only one is usable at a time. It also offered no workaround from our AD configuration issue. Outside of those issues, there was enough information to make the other features function, and the PDFs were easily navigable and well-organized. Wedge Networks offers three tiers of support: basic, advanced and advanced 24/7. Basic provides nine-hours-a-day/five-days-a-week phone and email support. The Advanced option adds next-day advanced hardware replacement, and the Advanced 24/7 tier upgrades support hours to 24/7. The company also maintains an online knowledge base and a user support forum, albeit a sparsely populated one. » PRODUCT SECTION » GROUP TEST l UTM Emerging products: Virtual system security Don’t presume the vShield will protect you. That actually is not the case, says Peter Stephenson. T his month, we continue our periodic look at the hot product groups that are shaping the information security marketplace. One of the hottest is, of course, security in the virtual world. We have four products this month that are focused on securing virtual systems. Virtual system security is a mixed bag of security at the hypervisor, security at the VMware API (vShield), and relatively independent security applications. We saw examples of all of this and a bit more. For example, while we generally think of security as being some sort of direct protection – such as encryption, firewall and more – sometimes configuration and other management offers improved security within the enterprise environment. We have learned the truth of this in the physical world when the enterprise is quite large. The challenges of keeping configurations consistent must be met or there could be vulnerabilities resulting from misconfigured devices that are not noticed in the forest-and-trees environment of a really big enterprise. In the virtual world, the problem is exacerbated by the simple fact that it is way too easy and inexpensive to spin up new servers. This results in virtual-world-unique challenges, such as server sprawl. Once a server is built for whatever reason, it seems to be a law of virtual nature that it will live on forever – even if it is not needed anymore. The end result is that there usually are lots of servers that have been retired, but still consume resources and may even still be accessible. Server sprawl is not the only problem that is more or less unique to the virtual environment. Another not so obvious challenge is the scan flood. Scanning floods occur when one has an automated vulnerability scanner that lives in the virtual and scans the virtual. Because it is not uncommon to have a large number of virtual devices in the enterprise, that means that lots of packets are flying about looking for security holes. Some control certainly seems like a good idea here. But scanning for vulnerabilities is not the only type of security scanning that can cause trouble in the virtual. Anti-malware scans are at least – if not more so – as problematic. In a well-managed enterprise, virtual or physical, everything that comes in or goes out of the virtual environment should be scanned for malicious content. That can be a lot of scanning – more, even, than vulnerability scanning. In a large environment – one of our vendors this moth reported a customer with 40,000 virtual machines – one can depend on the fact that there are scans occurring constantly. Another challenge is access to the virtual environment by mobile devices. That’s not unique to the virtual, of course, but it can be somewhat more challenging to manage in a virtual data center. Unfortunately, managing mobile devices is not a luxury in the virtual – something that we do in the physical world but think of as an option in the virtual. Rather it is one of those “must haves” that plague us with each new wave of emerging technology. All of these and many more obvious and not-so-obvious challenges are either unique to or exacerbated by the virtual world. Our products this month address these and many more. I enjoyed looking these over and I learned a lot about where threats live in the virtual world. Even though I spend most of my computing time in a virtual environment, I fi nd that I take security in these environments for granted. Like most users, I assume that vShield will protect me. That actually is not the case. It is important to understand the virtual environment in one’s virtual data center. One needs to recognize where it is similar to and where it is very dissimilar from the physical world and then to seek out the appropriate security solutions to the problems uncovered. Sometimes those will be the old standbys that we have lived with for decades in the physical world. But sometimes they will be totally unique. Something new Each quarter, Technology Editor Peter Stephenson and his team at the SC Lab address emerging technologies and markets. The purpose is to look at market segments in the information assurance space that represent new technologies, needs and capabilities. In those emerging segments there always are new entries and old pros that want to expand into the space. We will be looking at both – and bringing you the companies and products that we believe will shape the future. To view the first installment of Emerging Products, click on www.scmagazine.com/emerging-products/grouptest/266/. www.scmagazine.com • March 2013 • SC 49 GROUP TEST l Emerging products » » GROUP TEST l Emerging products McAfee MOVE Anti Virus his is one of those products that one would think is a no-brainer. Virtualized data centers can get very large and complicated. Managing is a challenge. So why doesn’t someone come up with a unified approach to managing configuration, security, deployment and monitoring. It should be easy. After all, in a virtual environment we can spin up a management server with little effort and almost no cost. As it turns out, it’s not quite a walk in the park. But, like a virtuoso musician who “makes it all look so easy,” the clean simplicity of VMC’s deployment is deceptive. A lot of thought clearly went into this product. VMC takes advantage of the nature of a virtual data center. Part of that nature is that there is a lot of data moving on the virtual network. That data tells all about the environment – and if one can just collect and analyze all of that streaming data, it can be managed. And that is exactly what VMC does. Some of the product’s capabilities seem to flow naturally from the straightforward analysis. For example, if one is seeing all of the data in the enterprise, it follows that the user should be able to understand how the system is behaving. That, logically, includes capacity measurement, security and other types of monitoring. VMC can handle monitoring, performance and capacity, security and configuration management, all behind a single pane of glass. Bitdefender GravityZone Symantec Critical System Protection (CSP) T T Reflex VMC (Virtualization Management Center) At a glance Product: Reflex VMC Company: Reflex Systems reflexsystems.com Price: Call Reflex Systems for pricing based upon deployment. What it does: Provides monitoring, performance, capacity, configuration management and security for virtual data centers in a single product. What we liked: Simplicity of deployment without sacrificing comprehensive management capabilities. At a glance Company: Bitdefender http://enterprise.bitdefender.com Price: Modular pricing based on one’s requirements. What it does: Unifies security management for physical, virtualized and mobile environments. What we liked: Single security platform for virtual, physical and mobile systems, enabling seamless security interactions between the various environments. A nti-malware today suffers from a frustrating dichotomy. First, it is, arguably, the most mature of all of the capabilities in the security practitioner’s toolkit. And, certainly, McAfee is one of the grand old products of the genre. On the other hand, a huge percentage of today’s threats – especially advanced persistent threats – are delivered using increasingly sophisticated malware. Throw virtualized environments into the mix and one has a witch’s brew of potentially bad news. McAfee has successfully brought together the application of a centralized policy engine – ePO – with its anti-malware capability in the physical world. There is a strong suite of enterprise-class protection for the physical data center. Today, though, most enterprises of any size are becoming virtualized, so this protection needs to reach into the virtual to be effective. Because today’s virtualization extends from servers to endpoints, the notion of pervasive anti-virus (AV) is even more important. Data and other transmittable files – especially bad files, such as malware – can move extremely quickly across a virtualized network backbone, so controlling malware in a virtualized world may well be more important than it is in the physical world. MOVE AV addresses this challenge head-on. MOVE is optimized for the virtual – and it is hypervisor agnostic. It is managed through ePO policies and it integrates cleanly with other McAfee capabilities in the physical enterprise. Nowhere is a scan storm more threatening to system performance than when it results from AV scanning across a virtual network. MOVE monitors all of the loads – memory, CPU, IO, disk, hypervisor and more – in the virtual environment and manages itself accordingly. T his sounds a bit like one of those inflatable toys at local fairs inside of which kids bounce around. Or, perhaps, some science fiction environment that surrounds a planet. Actually, although it is neither, it has some similar characteristics. Like the kid’s toy, GravityZone lets users bounce between various computing environments: physical, virtualized and mobile. Like a gravitational field around the planet, it pulls the paradigms together and down to a single security management environment. Each of the paradigms has its own security requirements, but as part of a coherent enterprise each needs to work in concert. The focal point is the GravityZone Control Center. Each of the management modules plugs in separately. Consider the typical virtualized – or, hybrid, if you prefer – enterprise. The servers live in the virtual. The endpoints are physical, with some of them mobile devices. Each has its own requirements, operating systems and, of course, security quirks. Certainly it would be pleasantest to take the security management from each of the portions – each quite different from the rest – pull it together in a single management console and facilitate security interaction between them. That is exactly what GravityZone does. GravityZone comes as a virtual appliance and it supports an extremely wide range of physical virtual and mobile systems, operating systems, mobile environments and hypervisors. For today’s enterprises, it is unlikely that one will have something that GravityZone can’t support. But if something is present – a hypervisor, for example – Bitdefender will configure it for you. 50 SC • March 2013 • www.scmagazine.com he notion of wrappers has been with us for a long time. Back in the early days of Unix and Linux, we used wrappers to provide security to not-so-secure applications, such as telnet. Today that concept has matured and we see it popping up in modern apps. Symantec CSP is a good example. One might characterize CSP as a security wrapper for mission-critical environments. That means that if it is a crucial piece of the computing infrastructure – such as a SCADA system or a medical device controller – it gets the security protection it needs. But that protection does not stop with those systems. Because CSP is integrated with the enterprise’s security infrastructure, it becomes an extension of that environment, extending seamless protection across the enterprise, physical or virtual. CSP consists of two pieces: a detection and a prevention component. Detection watches behavior on the enterprise to determine if something is going on that shouldn’t be. The component even extends to watching system admin accounts, something that is a sort of Holy Grail for security administrators. The key to CSP is data. The detection piece monitors everything in the virtualized environment from the hypervisor up through the applications. It looks for disallowed or potentially dangerous actions and kills or de-escalates the process. So an administrator doing something inherently dangerous – inherently because as an admin he/she has total superuser rights – may be de-escalated to a normal user without those rights. We liked this product for its ability to address important, but hard to secure, systems and still integrate cleanly into the virtualized enterprise as a whole. At a glance Product: MOVE Anti Virus Company: McAfee, an Intel company mcafee.com Price: $34.73 per virtual desktop and up, depending on number of desktops/servers. What it does: Provides ePO managed anti-virus for virtualized environments. What we liked: Ease of use combined with the ability to integrate a virtual environment into the overall hybrid environment for an ePO-managed, anti-malware capability that is seamless across all of the hybrid, physical or virtual, components. At a glance Product: Symantec Critical System Protection Company: Symantec symantec.com Price: Starts at $995 per user license. What it does: Wraps mission critical environments – OS, applications and more – in protection on the detection and prevention levels. What we liked: Ability to address critical systems that are not typical – such as SCADA, ATMs and point-of-sale terminals – as well as the more prosaic servers and endpoints. www.scmagazine.com • March 2013 • SC 51 2013 SC Awards U.S. Optimistic despite threats Feb. 26, 2013 • San Francisco When it comes to data protection and risk management planning, information security professionals are feeling more hopeful than ever. According to our annual “Guarding Against a Data Breach” survey, compared to previous years, a majority of IT security pros say their organizations are taking appropriate steps to protect critical data. As promising as this feedback is, one has to juxtapose it against the less upbeat happenings of our collective reality. For starters, advanced persistent threats (APTs) and other more methodical and sophisticated cyber crime attacks are becoming the norm, according to most experts. Just look to the recent attacks against The New York Times, Twitter or the U.S. Department of Energy to get a sense of things to come. Internet-based thieves aren’t as easy to catch in the act or stop altogether nowadays, which means organizations have to stop relying on traditional network protections alone and step up their games with advanced monitoring techniques, application and other endpoint controls, better security awareness training and more. Because spear phising, custom malware and targeted attacks are happening at a rate never witnessed before, a datacentric approach to security now is vital, say experts. And most security pros have to achieve this desired end with flat budgets. I suppose, though, it’s telling that CISOs generally are upbeat despite myriad problems. Improving risk management plans, bettering policies, strengthening training and bolstering controls, along with constantly educating C-level executives about data security being a necessary part of day-today activities, are all recurring duties. Yet, survey respondents – SC Magazine readers – are at the ready to tackle these seemingly endless challenges with zeal. And, for a fortunate growing number, undertaking them deftly is paying off as more CEOs and other business leaders register understanding and embrace IT security for what it is – a necessary pillar of good business. It’s that passion and commitment that drives us every year to celebrate these industry leaders, their many achievements and the varied contributions they make without hesitation to help advance this essential and vibrant industry. Congratulations to you all. – Illena Armstrong, VP, editorial, SC Magazine Contents The Judges .............................................................................. 54 The Sponsors .......................................................................... 55 Word from the co-chair........................................................... 56 Reader Trust Awards Best Anti-Malware Gateway ................................................... 56 Best Cloud Computing Security ............................................ 57 Best Computer Forensic Tool ................................................. 57 Best Data Leakage Prevention (DLP) .................................... 58 Best Database Security Solution .......................................... 58 Best Email Security Solution .................................................. 59 Best Enterprise Firewall .......................................................... 59 Best Fraud Prevention Solution.............................................. 60 Best Identity Management Application ................................. 60 Best IDS/IPS Product .............................................................. 61 Best IPsec/SSL VPN ................................................................ 61 Best Managed Security Service ............................................. 62 Best Mobile/Portable Device Security .................................. 62 Best Multifactor Product ........................................................ 63 Best NAC product ................................................................... 63 Best Policy Management Solution ......................................... 64 Best SIEM Appliance............................................................... 64 Best UTM Security .................................................................. 65 Best Vulnerability Management Tool ..................................... 65 Best Web Application Firewall ................................................ 66 Best Web Content Management Product.............................. 66 Excellence Awards Best Customer Service........................................................... 67 Best Emerging Technology ..................................................... 67 Best Enterprise Security Solution .......................................... 68 Best Regulatory Compliance Solution................................... 68 Best Security Company.......................................................... 69 Best SME Security Solution ................................................... 69 Rookie Security Company of the Year.................................... 70 Professional Awards Best Cyber Security Higher Education Program .................. 70 Best Professional Certification Program ................................ 71 Best Professional Training Program ........................................ 71 Best Security Team ..................................................................72 CSO of the Year ........................................................................72 Editor’s Choice Award ..............................................................73 EDITORIAL VP, EDITORIAL Illena Armstrong DESIGN AND PRODUCTION U.S. SALES ART DIRECTOR Michael Strong EXECUTIVE EDITOR Dan Kaplan MANAGING EDITOR Greg Masters VP AUDIENCE DEVELOPMENT & OPERATIONS John Crewe VP, SALES David Steifman (646) 638-6008 2013 SC AWARDS U.S. PRODUCTION MANAGER Krassi Varbanov EVENTS DIRECTOR Natasha Mulla EVENTS COORDINATOR Maggie Keller SENIOR EVENTS COORDINATOR Anthony Curry REGIONAL SALES DIRECTOR Mike Shemesh (646) 638-6016 WEST COAST SALES DIRECTOR Matthew Allington (415) 346-6460 EVENT SALES DIRECTOR Mike Alessie (646) 638-6002 ACCOUNT MANAGERS Dennis Koster, Samantha Amoroso SALES/EDITORIAL ASSISTANT Roo Howar (646) 638-6104 ACCOUNT EXECUTIVE, LICENSING AND REPRINTS Elton Wong AUDIENCE DEVELOPMENT DIRECTOR Sherry Oommen MANAGEMENT CEO OF HAYMARKET MEDIA Lee Maniscalco EXECUTIVE VICE PRESIDENT Tony Keefe 2013 SC AWARDS U.S. 53 2013 SC Awards U.S. 2013 SC Awards U.S. The Judges The Sponsors SC Magazine would like to thank all of our sponsors for their generous support of the 2013 SC Awards U.S. Their involvement has made this event possible, which helps raise professional standards in the information security industry worldwide. Co-chair Illena Armstrong VP, editorial, SC Magazine Co-chair Rich Baich CISO, Wells Fargo Philip Agcaoili CISO, Cox Communications Rebecca Bace CEO, Infidel Jennifer Bayuk principal, Jennifer L. Bayuk LLC Bruce Bonsall senior security strategist, BT US&C Dennis Brixius VP and CSO, The McGraw-Hill Cos. Leahy Center for Digital Investigation at Chris Camacho information security officer, The World Bank John Johnson senior security program manager, John Deere Larry Whiteside CISO, Spectrum Health Jaime Chanaga CEO, The CSO Board Cedric Leighton colonel, USAF (Ret.); founder and president, Cedric Leighton Associates Spencer Wilcox special assistant and lead security strategist, Exelon Rafael Diaz CSO, Department of Central Management Services, state of Illinois Yonesy Nunez SVP, Citi Dov Yoran CEO, ThreatGRID Rick Doten CISO, DMI Enterprise Transformation Jim Reavis executive director, Cloud Security Alliance Gene Fredriksen global CISO, Tyco International Ariel Silverstone CISO, self-employed Stephen Fridakis senior IT officer, FAO Ward Spangenberg director, information security, pearl.com Pamela Fusco director/CISO, Apollo Group Chenxi Wang vice president, Forrester Research Bradford Networks Bradford Networks enables secure network access for corporate-issued and personal mobile devices. Imperva Imperva provides a comprehensive solution for monitoring and controlling all data usage and business transactions across the data center. Champlain College Champlain College has been providing education in the field of digital forensics and cyber security for more than six years. Qualys Qualys is a leading provider of cloud security and compliance solutions with more than 6,000 customers in more than 100 countries. CipherCloud CipherCloud provides cloud encryption and tokenization gateways to enable organizations to securely adopt cloud applications. Schwartz MSL Schwartz MSL helps technology companies leverage public relations to create visibility and tell their innovative story. Entrust Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Solutionary Solutionary reduces the information security and compliance burden, providing flexible managed security and compliance services. ForeScout Technologies ForeScout enables organizations to accelerate connectivity by allowing users to access network resources without compromising security. Splunk Splunk software collects, indexes and harnesses the machinegenerated big data coming from the devices that power business. Halon Halon Security is a prominent technology leader of email security and firewalls, protecting millions of users worldwide. Symantec Symantec is a global leader in security, backup and availability solutions. HP Enterprise Security HP Enterprise Security provides information security solutions to protect the hybrid enterprise. West Coast Labs West Coast Labs is a leader in independent testing, certification and real-time performance validation for information security products. IBM IBM Security offers one of the world’s broadest portfolios of enterprise security products and services. 54 2013 SC Awards U.S. 2013 SC AWARDS U.S. 55 2013 SC Awards U.S. 2013 SC Awards U.S. Welcome from the co-chairman Reader Trust Awards Reader Trust Awards Reader Trust Awards Best Anti-Malware Gateway Best Cloud Computing Security Best Computer Forensic Tool WINNER WINNER WINNER Symantec for Symantec Web Gateway Reflecting back on information security and cyber threats in 2012 can be quite exhausting. The volume of cyber agitation and threats in the online world is increasing, and the distribution continues to evolve. As an industry, we have been busy, and as a result we have seen many technologies emerge to help address these complex, ever-changing threats to our companies. Innovation and tradecraft are the tools needed to align our security efforts to meet regulatory requirements, ensure compliance, provide actionable cyber threat intelligence and establish proactive techniques to get ahead of the cyber risks. We need to be able to notice indicators of compromise and have good visibility into what is happening within and beyond our own ecosystem. Timeliness of incident identification combined with lapse time taken to address the incident is a key performance indicator of an organization’s ability to address the new reality we live in today. Understanding why an organization is at risk can be even more valuable than the forensics of root cause because the organization may be able to change a behavior, increase operational security or take other actions to deter any possible impact to their business. Asymmetric practices, innovative solutions, determination to succeed, creativity and dreams can be found tonight in this room. You are all the supply chain to those fighting the cyber threats each day. Your efforts, technologies and ideas enable countless information security professionals to do their jobs. The internet world depends on you, needs you to keep innovating and appreciates your partnership in dealing with the unprecedented threats we all face every day. – Rich Baich, co-chairman, 2013 SC Awards U.S.; CISO, Wells Fargo Symantec Web Gateway 5.0 is a web security solution that protects organizations against all types of web-borne malware. The tool is powered by Symantec Insight, which provides proactive protection against new, targeted or mutating threats. Insight enhances protection and can’t be evaded or coded around by self-mutating malware. Also, Symantec Web Gateway can integrate with Symantec Data Loss Prevention seamlessly, which allows for a robust web and data loss prevention solution from a single vendor. This helps stop sensitive data from leaving the corporate network via the web, and also allows for users to receive real-time education on company security policies with notifications for policy violations. Symantec Web Gateway 5.0 presents organizations with many business and technical advantages. Companies can dynamically allocate resources as web traffic increases. SSL encryption capabilities provide safe transmission of web traffic to popular sites that employees and companies often use for business purposes. Real-time scanning of pages as they load prevents any latency in web browsing and decreases calls to the IT helpdesk. Symantec Web Gateway’s in-depth reporting gives organizations the detailed view they need into their network, to ensure they are protected from today’s complex and dangerous malware related threats. Symantec Web Gateway’s ability to be deployed as a proxy or cache helps companies save money by reducing bandwidth usage, and avoiding the need to purchase another solution to perform these functions. Customers who already have a valid subscription of Symantec Web Gateway and Protection Suite Enterprise Edition are also entitled to perform a simple upgrade to the new version at no additional cost. vGW is a solution specifically designed for virtualization as opposed to a pale retrofitted alternative. Compared to competing solutions, the hypervisor-based vGW delivers protection, throughput, scalability, automated deployment, operational efficiencies and value. vGW has a highperformance stateful firewall, integrated IDS, compliance monitoring/enforcement, VM Introspection, reporting, access controls, AV protection, support for IPv6 and groundbreaking scalability. vGW offers granular customer resource isolation, layers of protection, superior performance and regulatory compliance mechanisms that help users trust in the security of their data – and online business. vGW can help organizations take advantage of cloud computing sooner rather than later, optimize investments in virtualization infrastructure and make the most of existing network security investments. It accomplishes this by providing cloud-enabling, purposebuilt security and integrating virtualization security with physical network security. Organizations want to virtualize to save money. Yet, many still hesitate to virtualize because of security concerns. vGW removes barriers to virtualizing, as well as to implementing large-scale virtualized environments for global organizations and cloud service providers. How? By ensuring security doesn’t impede virtualized workload performance and, moreover, maximizing secured VM-tohost compression ratios. With vGW, businesses can plan to support more VMs on a host while ensuring security and without compromising performance. vGW was built specifically for virtualized environments and takes a fast-path approach to security. Thanks to this design, vGW can clearly and positively impact budget. Guidance Software for EnCase Guidance Software’s EnCase software is a powerful solution that provides the foundation for government and law enforcement agencies to conduct thorough and effective digital investigations of any kind, including intellectual property theft, incident response, compliance auditing and responding to e-discovery requests – all while maintaining the forensic integrity of the data. EnCase allows customers to conduct more complete investigations than its competitors with additional integration to CaseCentral’s secure hosted review platform and with security information and event managers (SIEM) for automated incident response. EnCase software includes the EnCase Enterprise platform with software applications EnCase Cyber Security and EnCase eDiscovery built on top of the platform. The product line also includes EnCase Forensic and EnCase Portable. The tool provides security specialists, investigators, computer incident-response teams and litigation specialists with everything they need to immediately and thoroughly search, collect, preserve and analyze data from servers, workstations, mobile devices and cloud-based data sources. With EnCase, users can be confident in their ability to complete a comprehensive analysis of whatever evidence they may encounter for virtually any business purpose. Moreover, users of the EnCase solution have the ability to customize how the solution functions, adding capabilities to the product to meet their specific needs. With EnCase, organizations can improve effectiveness of their staff, as processes and procedures associated with the acquisition, analysis and reporting of a forensic investigation can be automated, eliminating redundant manual work. This allows examiners to focus on their specialty of completing digital investigations. Finalists 2013 Finalists 2013 Finalists 2013 • Dell SonicWALL for Dell SonicWALL TZ 215 • IBM for IBM Cloud Security Services • AccessData Group for Forensic Toolkit (FTK) • McAfee for McAfee Web Protection • Juniper Networks for vGW Virtual Gateway • FireEye for FireEye Malware Analysis System • Symantec for Symantec Web Gateway • Sophos for Sophos SafeGuard 6 • Guidance Software for EnCase • Trustwave for Secure Web Gateway • Websense for Websense TRITON Security Gateway Anywhere 56 2013 SC Awards U.S. Juniper Networks for vGW Virtual Gateway • Symantec for Symantec O3 Cloud Identity and Access Control • Trend Micro for Trend Micro Deep Security 9 • Websense for Websense TRITON Enterprise • RSA, the security division of EMC, for RSA NetWitness • Websense for Websense Cyber Security Intelligence (CSI) On-Demand 2013 SC Awards U.S. 57 2013 SC Awards U.S. 2013 SC Awards U.S. Reader Trust Awards Reader Trust Awards Reader Trust Awards Reader Trust Awards Best Data Leakage Prevention (DLP) Best Database Security Solution Best Email Security Solution Best Enterprise Firewall WINNER WINNER WINNER WINNER Symantec for Symantec Data Loss Prevention Symantec Data Loss Prevention delivers a unified solution to discover, monitor and protect confidential data wherever it is stored or used. Symantec offers comprehensive coverage of confidential data across endpoint, network and storage systems – whether users are on or off the corporate network. By measurably reducing risk, Symantec gives organizations confidence to demonstrate compliance while protecting their customers, brand and intellectual property (IP). Symantec Data Loss Prevention v11.6 is the current release of Symantec’s data security suite. It introduces expanded data loss coverage, advanced multidimensional reporting, improved usability and new security integrations. It features DLP for Mobile, which monitors and protects sensitive data sent from an iPad and iPhone mail client, browser and apps, like Face- book, Twitter and Dropbox. It also secures sensitive data without stopping business or personal use. Protecting IP is a significant challenge for organizations because it is spread out, and subtle differences between what is sensitive and what is not make finding it timeconsuming and costly. With ever-increasing amounts of sensitive data in corporate environments and accessed on mobile devices, with or without permission from IT security, traditional DLP detection technologies cannot effectively and accurately identify and protect IP, like source code documents that change daily. Collecting and fingerprinting 100 percent of confidential data is too time-consuming and expensive, while identifying the data with keywords sacrifices accuracy. Symantec DLP 11 enables organizations to easily define and locate their unstructured data so that they can quickly prioritize which data needs to be fixed, saving time and money. Databases store information, the crown jewels of today’s organizations. For this reason, they are targeted in the overwhelming majority of breach attempts by external hackers and malicious insiders. Perimeter security and the security features of native database management systems (DBMS) prove insufficient as the critical last line of defense for the sensitive, valuable information that databases hold. McAfee Database Security offers real-time, reliable protection for business-critical databases against external, internal and even intra-database threats. This non-intrusive, softwareonly solution requires no architectural changes, database downtime or additional security management silos. With this tool, organizations of all sizes can gain complete visibility into their overall database landscape and security posture, Barracuda Networks for Barracuda Email Security Productivity losses due to spam and other email security issues can cost businesses millions of dollars each year. The Barracuda Email Security solutions, including the Barracuda Spam & Virus Firewall appliance and Vx appliance and the Barracuda Email Security Service cloud solution are extremely powerful and provide complete email protection for organizations of all sizes. The email security solution features ease of use and deployment for hardware, virtual, cloud and hybrid offerings with no per-user fees. It provides detailed email monitoring; scans outbound emails and attachments; and blocks disclosure of sensitive data, such as Social Security and credit card numbers. Its outbound scanning also blocks spam from leaving an email server causing reputation loss and blacklisting. Too, the integrated cloud encryp- tion service lets users encrypt customized emails – at no extra cost. Barracuda Networks leverages 12 defense layers to provide defense capabilities for any email server within large corporate or small business environments. Online resources are available and include a portal for opening a support case, a searchable knowledge base, technical support forum and more. Without software to install or modifications required to existing email systems, installation of the Barracuda email security solutions are quick and painless. As well, a key technical advantage for enterprises or SMEs deploying a Barracuda email security solution is access to Barracuda Central, an operations center that works 24/7 to capture the latest data on spam and other email threats from a vast network of honeypots, as well as submissions from the more than 85,000 Barracuda Networks customers worldwide. Check Point Software Technologies for Check Point R75.40 Internet use has changed dramatically with the wide adoption of virtualization, mobile computing and Web 2.0 in the enterprise. Security used to be handled by simply blocking specific applications, ports or websites entirely. However, the Web 2.0 also drives communication through fewer ports and protocols. Check Point R75.40 includes Check Point ThreatCloud, the first collaborative network to fight cyber crime. It gathers data from global threat sensors and distributes threat intelligence to security gateways around the globe. The tool also features new anti-bot and enhanced anti-virus software blades, powered by ThreatCloud. Check Point GAiA adds a unified secure operating system for all Check Point appliances, open servers and virtual systems. SmartLog is a new feature of the logging and status software blade that provides split-second search results from billions of log records. Check Point R75.40 allows companies to consolidate security protections with an integrated solution that can be tailored to meet specific security and performance needs. Because R75.40 is based on Check Point’s Software Blade Architecture, customers can expand their security as needed without new management or hardware. This significantly reduces costs. The tool’s newest security appliances are designed to optimize all of the software blade protections available with R75.40 and leverage the company’s multi-core and acceleration technologies – delivering outstanding firewall performance capable of up to 200 Gbps throughput and less than five-microsecond latency. The result is an integrated firewall solution that keeps businesses safe and information available, without impacting network performance. Finalists 2013 Finalists 2013 Finalists 2013 • Dell SonicWALL for Dell SonicWALL E-Class Network Security Appliance (NSA) 8510 • BeyondTrust for PowerBroker Database - Monitor & Audit • AT&T for AT&T Network-Based Firewall Service • Identity Finder for Identity Finder • RSA, the security division of EMC, for RSA DLP • Symantec for Symantec Data Loss Prevention • Trend Micro for Trend Micro Integrated Data Loss Prevention • Websense for Websense Data Security Suite 58 2013 SC Awards U.S. McAfee, an Intel company, for McAfee Database Security Solution fully align their security policy administration practices and efficiently maintain regulatory compliance. By delivering a complete family of products, fully integrated through McAfee ePolicy Orchestrator’s dashboard, McAfee significantly simplifies the deployment and monitoring of the security infrastructure. McAfee Database Activity Monitoring requires no changes to the database itself and no configuration changes to the network, and yet can provide real-time alerting or session termination with minimal overhead. The memory-based sensor model catches threats from all potential sources, including privileged users, and the fully distributed architecture also can be deployed in virtualized environments and in the cloud. McAfee Virtual Patching for Databases identifies and blocks attempts to exploit known vulnerabilities on unpatched servers, as well as common threat vectors of many zero-day attacks. • Check Point Software Technologies for Check Point R75.40 • DB Networks for Adaptive Database Firewall ADF-4200 • IBM for IBM InfoSphere Guardium Finalists 2013 • Imperva for Imperva SecureSphere • McAfee for McAfee Email Protection • McAfee, an Intel company, for McAfee Database Security Solution • Barracuda Networks for Barracuda Email Security • Proofpoint for Proofpoint Enterprise Protection/Proofpoint • Dell SonicWALL for Dell SonicWALL SuperMassive E10800 • Fortinet for FortiGate-800C • Sourcefire for Sourcefire Next-Generation Firewall (NGFW) Enterprise Privacy • Symantec for Symantec Messaging Gateway • Websense for Websense Email Security Gateway Anywhere 2013 SC Awards U.S. 59 2013 SC Awards U.S. 2013 SC Awards U.S. Reader Trust Awards Reader Trust Awards Reader Trust Awards Reader Trust Awards Best Fraud Prevention Best Identity Management Application Best Intrusion Detection/Prevention Product Best IPsec/SSL VPN WINNER WINNER WINNER WINNER RSA, the security division of EMC, for RSA Adaptive Authentication As organizations migrate customers and partners to the web, they must look at two primary considerations: Implementing flexible security that adapts to the ever-evolving world of online threats, and doing so without sacrificing usability. RSA Adaptive Authentication is a comprehensive, risk-based authentication and fraud detection platform that balances security, usability and cost. Powered by the RSA risk engine, Adaptive Authentication monitors and authenticates online activities in real-time by correlating behavioral analysis, device profiling and data feeds from RSA eFraudNetwork. Because the Risk Engine works behind the scenes to validate devices and behavior, the vast majority of users are authenticated invisibly, without impact to their user experience. Available in both SaaS and on-premise deployments, it is scalable to millions of users, and provides login and transaction protection for users accessing websites, mobile applications/ portals, SSL VPN applications and web access management applications. As a risk and policy-based platform with the ability to leverage the depth of the eFraudNetwork, RSA Adaptive Authentication helps organizations drastically improve fraud detection in real-time, thus decreasing fraud-related losses. In addition, its flexibility lowers operational overhead associated with deployment (i.e., there are no tokens to deploy and users can self-enroll). Most end-users are authenticated invisibly, causing the end-user little disruption, allowing them to access data faster and more efficiently. Finally, offering a solution that does not require tokens or extra passwords means fewer “lost token” or “forgotten password” calls to tech support. CA Technologies for CA IdentityMinder Managing the identities and access of users to key resources is a critical function for IT organizations under increasing pressure to cut operating costs while demonstrating continuous compliance. They must also deal with other challenges like protecting critical systems, applications and information from unauthorized access and use; increasinge efficiency and productivity, without sacrificing security across many platforms; efficiently prove proving compliance with internal policies, regulations and best practices; and easily adopting new technologies – such as virtualization and cloud – that support business initiatives. CA IdentityMinder helps improve the operational efficiency and effectiveness of IT organizations by providing a scalable and configurable identity management foundation that can organize identity information across the enterprise and within the context of business roles and processes. It helps streamline the on- and off-boarding of users, enables the business to manage access requests and automates identity compliance processes from distributed and mainframe environments. The tool provides a highly scalable end-to-end solution for automating and improving the many time-consuming tasks associated with identity management. The CA solutions for identity management also build structure around the complete identity lifecycle, enabling repeatability and the ability to leverage standardized processes for additional improvement. CA IdentityMinder delivers a scalable and configurable solution that accommodates enterprises’ unique needs at every level – from leveraging a role foundation that accurately represents their organizational structure to defining and enforcing unique business and regulatory policies to cost effectively extend automated provisioning to applications and policies. Check Point Software Technologies for Check Point IPS Software Blade Today’s threat landscape is dynamic, evolving and includes organized groups creating sophisticated attacks that specifically target the security weaknesses of their business target. Enterprises want to protect their business against the multitude of threats while simplifying their security deployment and reducing their total security costs. The Check Point IPS Software Blade provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds, resulting in IPS security and performance. The tool provides complete threat coverage for clients, servers, OS and other vulnerabilities, malware/ worm infections and more. The Multi-Tier Threat Detection Engine combines signatures, protocol validation, anomaly detection, behavioral analysis and other methods, including Finalists 2013 Finalists 2013 • CA Technologies for CA RiskMinder • Check Point Software Technologies for Check Point IPS Software Blade • Entrust for Entrust TransactionGuard • RSA, the security division of EMC, for RSA Adaptive Authentication • Dell SonicWALL for Dell SonicWALL SuperMassive E10200 • Symantec for Symantec Code Signing • Trusteer for Trusteer Pinpoint • HP Enterprise Security for HP TippingPoint Finalists 2013 • CA Technologies for CA IdentityMinder • Centrify for Centrify Suite 2012 • IBM for IBM Security Network IPS / Network Protection • Sourcefire for Sourcefire Next-Generation IPS (NGIPS) identity and application awareness, to provide the highest levels of network IPS protection. By quickly filtering 90 percent of incoming traffic without requiring deep inspection, the IPS engine inspects for attacks only on relevant sections of the traffic, thus reducing overhead and increasing accuracy. Customers require the flexibility of the Software Blade Architecture to enable more security functions as needed, ultimately migrating toward a next-generation firewall type of deployment. The IPS Software Blade leverages a sophisticated engine that uses multiple methods of detection and analysis to detect bad traffic and IPS Update Service delivers leading IPS coverage including our industry leading coverage of Microsoft applications. Deploying the IPS Software Blade dramatically reduces the complexity of customer network security infrastructure by reducing their hardware footprint, rack space, cabling, cooling, as well as power consumption. Juniper Networks for MAG Series Junos Pulse Gateways The Juniper Networks MAG Series Junos Pulse Gateways are a market-leading SSL VPN platform that provide secure remote access for both nonmobile and mobile devices. The offering secures clientless access to enterprise applications, data and resources, and ensure best-in-class endpoint security, granular access control and threat prevention. The MAG Series are scalable for companies of all sizes and support BYOD initiatives through support of all major mobile OSs. In addition to secure connectivity via SSL VPN, MAG Series gateways also can deliver NAC and application acceleration, offering a significant reduction in OpEx and CapEx costs, increased deployment density, extensive scalability and easily reconfigurable “personality” changes between secure mobile and remote SSL VPN access control and network access control (NAC) modes. Juniper’s SSL VPN capabilities are also available as a virtual appliance, offering added flexibility and scalability and lower cost. The MAG Series Junos Pulse Gateways product family includes models sized to meet the needs of SMBs with limited IT experience, all the way up to high capacity products for large enterprises and service providers requiring the utmost authentication, authorization and accounting capabilities for employee, partner (extranet) and customer access. In addition, a virtual SSL VPN appliance is available. The solution uses SSL, with no client software deployment required, and offers cross platform support across any webenabled device and all major OSs, including Windows, Mac, Linux, iOS, Android and others. Additionally, Host Checker scans endpoints for compliance, including mobile devices used in BYOD, and the tool enables single sign-on capabilities to clouds and web-based applications via SAML 2.0. Finalists 2013 • Barracuda Networks for Barracuda SSL VPN • Dell SonicWALL for Dell SonicWALL Aventail E-Class SRA EX9000 • HOB GmbH & Co. KG for HOB RD VPN • Juniper Networks for MAG Series Junos Pulse Gateways • NCP Engineering for NCP Secure Enterprise Management 3.0 • Cyber-Ark Software for Privileged Identity Management Suite • IBM Security Systems for IBM Security Identity Manager • NetIQ for NetIQ Identity Manager 4 60 2013 SC Awards U.S. 2013 SC Awards U.S. 61 2013 SC Awards U.S. 2013 SC Awards U.S. Reader Trust Awards Reader Trust Awards Reader Trust Awards Reader Trust Awards Best Managed Security Service Best Mobile/Portable Device Security Best Multifactor Product Best NAC product WINNER WINNER WINNER WINNER Verizon Business for Managed Security Services Commercial The continued increase of new technologies and systems introduced to the workplace results in an ever-wider spectrum of business risks – in addition to the challenge of maintaining appropriate technical risk levels, which present themselves as operational challenges, vulnerabilities and evolving internet threats. In order to reduce risk, organizations must move away from standalone and isolated security products as they only provide an incomplete view of enterprise security. In order to reduce risk exposure, businesses need a methodology and a security platform to manage risk exposure which allows them to anticipate problems, take corrective action and demonstrate results. Verizon offers a process framework and global infrastructure for consistency in handling threats and poli- cies, as well as direct access to experts and best practices. As a result, organizations have one consistent view of their security and risk management posture. Customers leverage Verizon’s expertise and global infrastructure to address a wide range of challenges, including cyber threats, regulatory compliance and the adoption of cloud-based computing services. The SEAM engine is Verizon’s intellectual property and provides the technology to detect security incidents and to assign a risk rating, which allows the customer to define the business impact based on their asset information. Security incident creation is based on threat information generated by the security devices. Verizon can help determine risk and its impact by taking into account threat, vulnerability, and assets through its proprietary SEAM engine, and can provide valuable insight on recommending corrective action when mitigating threats. Marble Security (formerly IronKey) for Marble Access Criminals, hackers, hacktivists and hostile governments are attacking mobile devices and desktops to steal information, break into online accounts and humiliate governments and enterprises. Marble Security’s Marble Access provides an impenetrable layer of mobile, desktop and network security that protects all endpoints from all threats, both known and unknown, including keystroke loggers, viruses, man-in-the-browser trojans, zero-day malware, malicious Wi-Fi hotspots, network hackers and poisoned DNS attacks. Marble Access provides a unified user experience across PC, Mac, Android and iOS mobile devices. Marble Access combines a virtualized secure browser with encryption, mutual authentication, URL whitelisting and Marble Access technology to isolate users from any threats on the device or the internet. Personal data is never stored on the device, and cannot be stolen or leaked. At the same time, Marble Access reduces IT costs, secures broader use of the cloud, achieves compliance and risk management goals and enables secure use of BYOD initiatives. Marble Access differs starting with its virtualized secure browser. Unlike signaturebased countermeasures, such as anti-virus or firewalls that are vulnerable to zero-day attacks, the secure browser works with jailbreak detection, keyboard encryption and other technologies to isolate users inside an invulnerable “cocoon.” Marble Access delivers a unified user experience on all platforms: iPhones, iPads, Android, BlackBerries, PCs or Macs. Another major differentiator, the Marble Access, uses encryption, authentication, whitelists, blacklists and other technologies to protect against phishing and network-level attacks, such as DNS poisoning or malicious hotspots. RSA, the security division of EMC, for RSA SecurID Protecting access to information – and assuring the identities of users requesting that access – is a core element of any security initiative. Whether a small organization or large enterprise, password authentication is not enough to protect against today’s security landscape. Aanother layer of protection is required. RSA SecurID is the standard for two-factor authentication solutions. It reliably proves the identities of users, devices and applications by using a unique symmetric key combined with a proven algorithm to generate a one-time password that changes every 60 seconds. RSA SecurID helps legitimate users gain secure access to VPNs, wireless access points, applications in the cloud, on the web and mobile, and network operating systems. Adding in that additional layer, RSA SecurID helps organizations protect private information and assure the identities of people, devices and applications exchanging that information. RSA offers a broad range of easy-to-use form factors to suit a variety of organizations and requirements. These include both hardware and software authenticators to support the leading mobile platforms, SMS authenticators and software developer kits to custom build API calls into third-party mobile applications. RSA has more than 400 partners to ensure out-of-the-box integrations with the widest range of applications that are jointly tested by each organization to ensure a positive experience that significantly reduces deployment, testing and integration costs. RSA SecurID is a costeffective way for organizations to address authentication and compliance concerns and provide an extra level of security for networks, VPNs, and other business assets. RSA SecurID offers a broad array of form factors and authentication mechanism to meet all budgets. Trustwave for Trustwave NAC Trustwave offers full network access control protection for all endpoints, managed and unmanaged, and works in any network infrastructure. Trustwave NAC combines agentless network access control with zero-day threat prevention and automated policy enforcement and is available in three configurations: Enterprise NAC – A highly scalable, full-cycle NAC solution designed for large organizations with thousands of endpoints, providing centralized and unified web-based management with unified configuration and reporting support, deployed virtually inline. Managed NAC – Trustwave’s MSS operation offers full-function NAC as a managed service, including the same feature/ function support as Enterprise NAC, while maintaining sensor integrity and health, and providing reduced cost with no capital expense. Plug-n-Play NAC – Offered as an add-on software module with Trustwave’s Managed UTM service for smaller, distributed enterprises, Plug-nPlay NAC automatically detects and optionally blocks rogue devices and network service, providing automatic updates of firewall rules for access policy enforcement. Agentless deployment works for every endpoint regardless of device type or operating system, including BYOD assets, enabling an organization to quickly start monitoring both existing and new devices that come on and off the network. The solution requires zero integration with existing switch fabrics or a lengthy implementation process for discovery or enforcement. Trustwave NAC operates virtually inline as needed with a fail-open architecture and self-contained enforcement, with zero latency. Any device on the network is detected, and patented technology further identifies rogue devices as well as unauthorized routers and gateways. Finalists 2013 • CA Technologies for CA AuthMinder • Entrust for Entrust IdentityGuard • PhoneFactor, a Microsoft company, for PhoneFactor • RSA, the security division of EMC, for RSA SecurID Finalists 2013 Finalists 2013 • Dell SecureWorks for Dell SecureWorks Managed Security Services • AirWatch for AirWatch Enterprise Mobile Management • IBM for IBM Managed Security Services • Marble Security (formerly IronKey) for Marble Access • Bradford Networks for Network Sentry • Mandiant for MCIRT Managed Defense • Verisign for Verisign MalDetector Service • Sophos for Sophos Mobile Control 2.5 • StillSecure for StillSecure Safe Access • Verizon Business for Managed Security Services – Commercial • Symantec for Symantec Mobile Management Suite • Trustwave for Trustwave NAC 62 2013 SC Awards U.S. • AVG for AVG AntiVirus FREE for Android • Symantec for Symantec VIP Finalists 2013 • ForeScout Technologies for ForeScout CounterACT 2013 SC Awards U.S. 63 2013 SC Awards U.S. 2013 SC Awards U.S. Reader Trust Awards Reader Trust Awards Reader Trust Awards Reader Trust Awards Best Policy Management Solution Best Security Information/Event Management (SIEM) Appliance Best UTM Security Best Vulnerability Management Tool WINNER SolarWinds for SolarWinds Network Configuration Manager (NCM) SolarWinds Network Configuration Manager (NCM) simplifies managing network configuration files in multivendor network environments by backing up configuration files, as well as continuously monitoring device configurations and providing immediate notification of configuration changes to help resolve problems before they impact users. SolarWinds NCM can check regulatory compliance of all network devices, including routers, switches and firewalls, and generate detailed reports from a single instance. These reports can be launched ondemand or scheduled on a periodic basis and emailed to security personnel. The compliance checks available cover many different standards, including HIPAA, SOX, PCI, DISA STIG and FISMA, and can be customized by the users based on their company-specific rules and best practices. Users also can create their own checks from scratch. Both customized and entirely new checks can be shared on thwack, the SolarWinds online IT management community. NCM combines powerful network configuration management features, rapid time-tovalue, an easy-to-use web-based interface, and affordability into one package. NCM is part of SolarWinds’ IT management suite, which includes solutions for network, application and server, log and security information, virtualization, storage, IT help desk, remote support and mobile IT management, and real-time troubleshooting and diagnostic tools. Additionally, SolarWinds’ unique Thwack.com community of more than 100,000 members is extremely active. In particular, the NCM section, one of the most active areas of thwack, receives on average dozens of postings per day – questions and answers, shared content, blog postings, feature requests and tips. WINNER Splunk for Splunk Enterprise Splunk is a Big Data security intelligence platform that is used by more than 1,500 customers to search and investigate, proactively monitor user and machine behavior, perform statistical analysis to identify anomalies and unknown threats, and create dashboards and visualizations for executives. Splunk’s architecture makes all machine data in an organization useable and valuable to the IT security team. It can index any type of machine or log data without upfront normalization, and allows users to create correlations and reports on the raw data. The platform is agile, flexible and lets security customers address a wide range of security use cases – from basic log management and incident investigation/forensics to fraud detection and correlation/ alerting – to find known and unknown threats. In regards to traditional SIEM use cases, the Splunk App for Enterprise Security comes with out-of-thebox reports, dashboards, incident workflow and correlation searches for SIEM use cases. Splunk can ingest any type of machine data from any source, whether from files, syslog, a script, and more. Splunk stores this data in a flat file data store, not a fixedschema SQL database, so is not limited to indexing and searching only data that fits a database schema. Splunk leverages a powerful search technology and language that enables fast, advanced searches against terabytes of data to find threats. Searches can leverage Boolean and statistical logic to identify outliers and abnormal behavior that may represent an advanced, unknown threat. Also, Splunk is software-only and installs on commodity hardware, thus is cheaper and easier to upgrade. Lastly, Splunk enables the fast creation of new reports and dashboards. WINNER Symantec for Symantec Endpoint Protection Last year, attackers unleashed more than nine new mutated viruses every second of every day, resulting in more than 403 million distinct threats. This huge volume and variety of threats has made it virtually impossible for security companies to protect users. Traditional security software is reactive, looking for digital fingerprints of viruses after they have been discovered. But today’s criminals work differently, mutating their malware and creating new, unique threats for each user. Symantec Endpoint Protection v12 offers advanced protection while improving system performance to businesses of all sizes. It includes a new detection system that includes Symantec Insight, a cloud-based technology that tracks more than three billion files from more than 200 million systems to identify new and rapidly mutating threats, as well as SONAR, Symantec’s system for real-time monitoring and blocking of malware. Symantec Endpoint Protection protects both physical and virtual systems. By tracking nearly every program file on the internet, Symantec can identify new or rapidly mutating files. Leveraging, Insight and SONAR technologies, Symantec Endpoint Protection blocks new and unknown threats missed by traditional signature, heuristic, behavioral and HIPS-based security solutions. Symantec Insight provides performance advantages. Because Insight knows the security status of most of the files on a system before it scans them, it eliminates up to 70 percent of scan overhead – providing performance so fast users won’t know it is there. Symantec Endpoint Protection 12 provides unrivaled security, blazing performance and optimization for virtual environments. The tool offers comprehensive defense against all attacks on physical and virtual systems. WINNER Qualys for QualysGuard Vulnerability Management QualysGuard Vulnerability Management (VM) automates network auditing and vulnerability management across organizations, including network discovery and mapping, asset management, vulnerability reporting and remediation tracking. Driven by a comprehensive knowledge base of known vulnerabilities, it enables cost-effective protection against vulnerabilities without substantial resource deployment. It is used by more than 5,800 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Delivered as a cloud solution accessible from any web browser, QualysGuard VM is easy to deploy and manage – even across globally distributed environments – enabling organizations to accurately scan their networks and applications to identify and fix vulnerabilities and collect compliance data. Organizations report 50 to 90 percent lower costs and can more efficiently remediate vulnerabilities using the solution’s powerful tools and features, including centralized reports, verified remedies and risk rankings to prioritize remediation steps, and full remediation workflow capabilities with trouble tickets. QualysGuard VM delivers a powerful, scalable solution at a low cost. It requires no infrastructure to deploy or manage, saving time and resources, providing a continuous view of security across the organization. Qualys also maintains the industry’s largest vulnerability database, updated daily for more than 35,000 unique vulnerabilities. Automated signature regression testing ensures quality/accuracy, scoring six sigma accuracy (fewer than 3.4 defects per million scanned). Updates are rolled out immediately, and users can scan globally without requiring additional infrastructure. Finalists 2013 Finalists 2013 • Check Point Software Technologies for Check Point 2200 and 4000 Series Appliances • GFI Software for GFI LanGuard 2012 • Dell SonicWALL for Dell SonicWALL TZ 215 • Qualys for QualysGuard Vulnerability Management • Rapid7 for Rapid7 Nexpose • Tenable Network Security for Tenable Security Center • Trustwave for TrustKeeper Vulnerability Manager • Fortinet for FortiGate-100D Finalists 2013 Finalists 2013 • IBM for IBM Endpoint Manager • HP Enterprise Security for HP ArcSight • AirWatch for AirWatch Enterprise Mobile Management • IBM for IBM Security Q Radar SIEM • NetIQ for NetIQ Secure Configuration Manager • LogRhythm for LogRhythm • SolarWinds for SolarWinds Network Configuration Manager (NCM) • NetIQ for NetIQ Sentinel 7 • Tripwire for Tripwire Enterprise 8.2 • Splunk for Splunk Enterprise 64 2013 SC Awards U.S. • Sophos for Sophos UTM 9 • Symantec for Symantec Endpoint Protection 12 • SolarWinds for SolarWinds Log & Event Manager (LEM) 2013 SC Awards U.S. 65 2013 SC Awards U.S. 2013 SC Awards U.S. Reader Trust Awards Reader Trust Awards Excellence Awards Excellence Awards Best Web Application Firewall Best Web Content Management Product Best Customer Service Best Emerging Technology WINNER WINNER WINNER Barracuda Networks for Barracuda Web Application Firewall A recent study by Forrester Research found that 67 percent of vulnerabilities can be found at the web application layer. The Barracuda Web Application Firewall is a complete and powerful security solution for web applications and websites. The tool quickly protects web servers from data breaches, and websites from defacement, without administrators waiting for clean code or even knowing how an application works. Additionally, it can increase the performance and scalability of these applications. Content caching, data compression and SSL acceleration optimize application performance while reducing impact on servers. Integrated load balancing further optimizes performance and provides high availability. Unlike traditional network firewalls or intrusion detection systems that simply pass HTTP or HTTPS traffic for web ap- plications, the Barracuda Web Application Firewall proxies traffic and inspects it for access by hackers. For added security, the solution provides full PKI integration for use with client certificates to verify identities of clients accessing the web applications. The Barracuda Web Application Firewall performs deep inspection of all web traffic, enabling it to provide a wide range of intrusion prevention capabilities at both the network and application layers. It provides protection from common attacks on web applications, including SQL injections, cross-site scripting attacks, session tampering and buffer overflows. As a full proxy, the Barracuda Web Application Firewall blocks or cloaks attacks, while preventing sensitive outbound data leaks of information. Overall, customers benefit significantly from ensuring data, applications and websites are secure – and that bandwidth and performance are optimized. Websense for Websense Web Security Gateway Anywhere Web access opens the door to malware, data theft, legal liabilities, productivity issues and bandwidth loss. In early 2012, 42 percent of Facebook activity was streaming media, many with video lures to malware. Also, there’s been an increase in spear phishing with embedded links to advanced threats. Too, Osterman Research says the costs associated with a malware infection are approximately $110 per user. Clearly, new technology is needed to reduce these costs. Websense Web Security Gateway Anywhere meets that need with zero-day malware prevention and DLP to address risks not covered by basic URL filtering, anti-virus and firewall solutions. Websense Web Security Gateway Anywhere (WSGA) offers complete protection against malware and data theft. It uses TruHybrid technology to combine on- site appliances with cloud security for web security and content management – with a unified console and policy for employees in all locations. WSGA offers TruWeb DLP for data theft and loss protection, and Advanced Classification Engine (ACE) to provide realtime security and data analysis. Websense ThreatSeeker Network inspects three billion to five billion requests from 900 million endpoints daily. The tool offers a single management console and policy that manages defenses for office, remote and mobile users. It’s part of the TRITON solution that unifies web, email, data and mobile security across on-premise and cloud platforms for a lower cost. ACE protects against malicious scripts and zero-day threats that circumvent antivirus products. It analyzes web traffic in real-time, categorizing dynamic web content/ threats offering detection of advanced payloads, exploited documents, mobile malware protection and much more. Finalists 2013 Finalists 2013 • Barracuda Networks for Barracuda Web Application Firewall • Barracuda Networks for Barracuda Web Security • Dell SonicWALL for Dell SonicWALL SRA Web Application Firewall Service • EdgeWave for iPrism Web Security Barracuda Networks for Barracuda Customer Service and Support Barracuda Networks offers multiple hard copy and online tools to make setup and installation quick and easy for customers. This includes quick-start guides and installation manuals, as well as more detailed administration guides. This documentation outlines step-by-step processes to get up and running quickly and efficiently, as well as tips and best practices to make our products most effective. Barracuda Networks provides documentation that is easy to understand and is effective. In fact, SC Magazine conducted a review of its flagship email security offering in September 2012 and said, “We found deployment of this product to be quick and easy.” Barracuda Networks strives to provide awesome customer service with live people always on the receiving end to help trouble shoot – there are no phone trees and no automated service. Also, Barracuda Networks customers are provided with telephone support. Since inception, Barracuda Networks has prided itself on the “IT Guy Next Door” mentality – making sure that there is always a live person available to help with any customer issues 24 hours a day, seven days a week. This is included as part of the purchase price /at no additional charge. Too, Barracuda Networks customers are provided with web-based downloads at no additional charge. This includes a variety of overview information (whitepapers, best practice tips, user guides), as well as set-up quickstarts, admin guides and more. Barracuda Networks customers are provided with online forums and FAQ sections online at no additional charge. Additionally, it provides Live Chat directly on the website, LinkedIn User Groups with best practice sessions, and more. WINNER CipherCloud for CipherCloud Gateway CipherCloud is helping businesses and governments that could otherwise not adopt the cloud because of data privacy, residency, compliance and security concerns. Using real-time format and operations preserving encryption, CipherCloud ensures that customers are the only ones that can access data in the cloud while preserving the native user experience of cloud applications across browser, desktop, and mobile interfaces. CipherCloud addresses the top six cloud computing threats as identified by the Cloud Security Alliance: insecure interfaces and APIs, malicious insiders, shared technology issues, data loss or leakage, account or service hijacking and unknown risk profile. For those using the cloud, significant data privacy, residency, compliance and security challenges exist. Encryption is the most widely and universally recognized means to ensure that sensitive data remains private and always in control of the enterprise. Gartner estimates that by 2016, 25 percent of all enterprise will use a cloud encryption gateway. CipherCloud launched its first product in February 2011. As of September 2012, CipherCloud has more than 40 large enterprise customers in production with more than one million users. This includes two of the top five U.S. banks and two of the top five Canadian banks. CipherCloud encryption gateways are delivered as virtual appliances and can run across virtualization systems from VMware, Microsoft, and Citrix as well as IaaS platforms from Amazon, Microsoft, and Google. CipherCloud encryption gateways can quickly be enabled and disabled and scaled with simple load balancing. A production deployment supporting more than 100,000 users is deployed with two gateways always running and two more on standby to support additional load. • Websense for Websense Web Security Gateway Anywhere • Fortinet for FortiWeb-400C • IBM for IBM Security Network IPS/Network Protection • Imperva for SecureSphere Web Application Firewall Finalists 2013 Finalists 2013 • Black Lotus for Human Behavior Analysis • CipherCloud for CipherCloud Gateway • Barracuda Networks for Barracuda Customer Service and Support • CloudPassage for CloudPassage Halo • eSoft for eSoft Customer Support • Microsoft for Enhanced Mitigation Experience Toolkit (EMET) 3.0 • Kaspersky Lab Americas for Kaspersky Business Products • Pindrop Security for Fraud Detection System • Qualys for QualysGuard Technical Support • Webroot Software for Webroot SecureAnywhere Business Endpoint Protection • Vanguard Integrity Professionals for Vanguard Customer Service 66 2013 SC Awards U.S. 2013 SC Awards U.S. 67 2013 SC Awards U.S. 2013 SC Awards U.S. Excellence Awards Excellence Awards Excellence Awards Excellence Awards Best Enterprise Security Solution Best Regulatory Compliance Solution Best Security Company Best SME Security Solution WINNER WINNER WINNER Tenable Network Security for SecurityCenter With more than 15,000 customers, more than 1,000 of the world’s largest organizations and a community of more than one million users, Tenable is a leader in the vulnerability and compliance management market. Its company founders are widely recognized technology leaders – CEO Ron Gula (IDS/ IPS innovator), Chief Research Officer Renaud Deraison (creator of Nessus), and Chief Security Officer Marcus Ranum (developed the first commercial proxy firewall) – who spend time daily responding to questions. Tenable also provides detailed white papers, webinars, videos, and blog posts designed to help customers with detailed instructions for achieving compliance initiatives. Tenable’s SecurityCenter has a low total cost of ownership and a rapid return on investment. The solution is quick and easy to deploy, manage and scale, and comes stocked with hundreds of prebuilt dashboards and reports that automate audits, vulnerability, attack path, threat analysis and information sharing across the organization – saving enterprises hundreds of thousands of dollars annually. Tenable maintains one of the industry’s largest research teams, staffed by award-winning security experts delivering updated security content daily. During 2012, Tenable introduced new features including advanced malware detection, patch and configuration management integration, and mobile device detection helping customers stay ahead of threats. Tenable’s unique combination of vulnerability scanning, network monitoring, log and event analysis, and analytics helps customers eliminate vulnerabilities, identify attack paths and respond to attacks even from new technologies: mobile, cloud and virtual infrastructure, the fastest growing sources of theft, disruption, and compliance violations. Websense for Websense Data Security Suite Due to the increased fines levied by agencies for non-compliance and new regulatory requirements, organizations have reprioritized their approach to audits. Organizations recognize the need for a solution that can monitor and ensure sensitive data is not transmitted to unauthorized users, while being able to walk through the incident details and generate reports for audits. The latest report by The Corporate Board Member/FTI Consulting, “Legal Risks on the Radar,” ranked data security as the top concern of corporate America. With increasing external threats from hackers using advanced malware, organizations realize they need to account for both accidental data loss from employees and deliberate attacks from external entities. In 2011, the number of customers with Websense DLP exceeded 2,000. Websense DLP is now deployed in more than 50 countries with approximately two million users. All customers receive specialized support from technical engineers in support centers worldwide, which regularly average 8.91 (out of 10) in satisfaction surveys. An online knowledge base, a forum of more than 19,000 individuals, technical alerts, monthly training webinars and personal myWebsense.com accounts are also available. Websense Data Security Suite offers more than 1,600 policies and templates out of the box, many of which are regulatory requirements. These extensive built-in regulatory policies enable customers to quickly deploy the necessary controls for regulatory compliance. With the constant release of new and updated regulations, Websense provides new regulatory policies monthly. Websense also offers a custom policy service for free, if customers are challenged with crafting a regulatory policy for their specific needs. Mandiant Founded in 2004, and named “Best Security Company” by SC Magazine in 2012, Mandiant solutions, services and expertise set the standard in advanced threat detection and incident response. Mandiant counts more than 30 percent of the Fortune 100 as clients, many referred by law enforcement agencies. Its products and services help guide customers through the process of detecting, responding and containing an attack. Its responders and forensic investigators are directed by the latest technical and investigative intelligence from the front lines. Mandiant Intelligent Response (MIR) is today a leading incident response technology for combating advanced threats. The company’s MCIRT Managed Defense product combines the technology of MIR with its Computer Incident Response Team (MCIRT) whose combined experience in advanced threat detection and response, along with Mandiant’s proprietary network intelligence, provides customers with effective incident insight – from host to network – along with actionable intelligence. The company’s R&D efforts are evidenced by eight free forensic software offerings to improve incident response and forensics technology. In July, Mandiant announced its new research division, Mandiant Labs, to bring together reverse engineers, malware analysts and researchers onto a single team to drive innovation and automation across the company and support products and services via intelligence gathering and analysis and advanced analytics and service delivery automation. The company offers clients training program built on realworld consultant experiences. Through incident response, malware analysis and memory forensics tracks, students learn the skills necessary to solving crime in the field. WINNER Kaspersky Lab Americas for Kaspersky Endpoint Security for Windows Workstations The core challenge in today’s environment isn’t that there are no tools available, it’s that each individual tool adds to the complexity users face when trying to implement security policies. Businesses need to reduce the number of tools used and number of consoles managed, so they can get back to focusing on their core business competencies. With Kaspersky Endpoint Security 8, customers can protect data, improve overall efficiency and secure mobile computing with encryption and device management. By combining multiple technologies into a single, centrally-managed solution, Kaspersky Endpoint Security 8 for Windows Workstations offerns an extensive set of tools to ensure security and control over an array of applications, devices and web content. Kaspersky features range from a ready-to-use template to granular policy controls, all of which help administrators customize Kaspersky’s solution to their own organizations’ unique needs, thus simplifying the user experience while providing extensive security and management. In addition to anti-malware, Kaspersky Lab’s solution manages software vulnerabilities, provides data encryption in case laptops are lost or stolen and provides security for smartphones and tablets. Kaspersky Endpoint Security 8 provides all this functionality from a single pane of glass and is built from the same code-base to work together, providing a significantly easier user experience and true value to the customer. Kaspersky Lab continues to make major investments in R&D to develop in-house new technologies to strengthen its portfolio. All its technologies are built from the same code base and work together seamlessly, not cobbled together on the backend. The result is solutions that are more efficient and easier to manage. Finalists 2013 Finalists 2013 • CA Technologies for CA Content-Aware IAM Solution • AirWatch for AirWatch Enterprise Mobile Management • FireEye for FireEye Malware Protection System • Kaspersky Lab Americas for Kaspersky Endpoint Security for Windows Workstations • Qualys for QualysGuard Enterprise • Sourcefire for Sourcefire Next-Generation IPS (NGIPS) Finalists 2013 • Tenable Network Security for Tenable SecurityCenter • Cyber-Ark • Varonis Systems for Varonis Data Governance Suite • Dell SonicWALL Finalists 2013 • Agiliance for Agiliance RiskVision with Agiliance Compliance Manager Application • Qualys for QualysGuard Policy Compliance • Qualys for QualysGuard Express • Sophos for Sophos UTM 9 • SpectorSoft for SPECTOR 360 • Mandiant • Sophos • Sourcefire • Verizon • RSA, the security division of EMC, for RSA Archer eGRC • Symantec for Symantec Control Compliance Suite 11 • Websense for Websense Data Security Suite 68 2013 SC Awards U.S. 2013 SC Awards U.S. 69 2013 SC Awards U.S. 2013 SC Awards U.S. Excellence Awards Professional Awards Professional Awards Professional Awards Rookie Security Company of the Year Best Cyber Security Higher Education Program Best Professional Certification Program Best Professional Training Program WINNER WINNER WINNER WINNER Pindrop Security Originally, the belief was that Pindrop Security technology would provide call analysis for recorded calls to identify potential fraud. However, improvements to accuracy and the ability to detect specific niche cases, such as “dead air” calls and call forwards, have significantly expanded applicability to cover all areas of phone security. The process of authenticating customers through knowledgebased authentication questions is an unsatisfactory solution. It reduces satisfaction by treating customers like criminals, and by putting the burden on them to remember secret answers, passwords and more. It increases call length, therefore adding cost. And it’s ineffective since a fraudster can find most answers to these questions online. Pindrop Security’s technology allows companies to reduce or eliminate this process. Authentication is transparent to the customer. Detection of fraudsters is reliable and can be done prior to the call center. With Pindrop Security solutions, the call center can return to focusing on satisfied customers.Its products combine techniques to provide a multi-layered defense against fraud, using blacklisting and anomaly detection to uncover fraudsters. Pindrop Security provides services and solutions to the largest financial institutions in the world, including systems used inline in their call centers. Pindrop Security was founded out of research initiated at Georgia Tech’s Information Security Center (GTISC) by Vijay Balasubramaniyan (below) and the director of GTISC, Mustaque Ahamad. Balasubramaniyan is now CEO of Pindrop Security and Ahamad is chief scientist. National Science Foundation grants have continued to fund ongoing research into Balasubramaniyan’s original research, and Pindrop Security continues to grow its research in order to continually improve accuracy and capabilities of the technology. Champlain College for Computer Forensics and Digital Investigation Degree Programs Through its on-campus, online and graduate degree programs, Champlain offers more than 35 computer forensics and digital investigation courses – more than any other college in the country. Students can jump into digital forensic courses immediately, taking advantage of leading-edge courses, like mobile device forensics, network forensics, file systems forensics, and many more. Courses are developed and taught by industry experts who bring current industry best practices and techniques to the classroom. And, its Leahy Center for Digital Investigation enables students to get to work on active investigations, gaining valuable real-world experience, including developing and writing response plans. Champlain graduates are extremely well prepared to create and manage ever-evolving risk management plans. More than 90 percent of graduates have job offers within 30 days of graduation, and many even well before graduation. Champlain students are highly encouraged to participate in internships and the college offers assistance in those placements. The Leahy Center for Digital Investigation hires a large number of interns to work on projects supervised by professional investigators on active cases. This year, Champlain conducted an “Imagine College” program for under-served students. They were able to explore college as an opportunity they may not have considered to be within their reach. (below) Champlain College President David Finney and Sen. Patrick Leahy, D-Vt., at the opening of The Patrick Leahy Center for Digital Investigation, a new Center of Excellence at the college offering students an up-to-date facility in which to learn and practice digital forensic investigation techniques. Information System Audit and Control Association (ISACA) for Certified in Risk and Information Systems Control (CRISC) With more than 100,000 members in 180 countries, ISACA provides a vast pool of knowledge and research that is shared globally with members and nonmembers through conferences (both in-person and virtual settings), webinars, a bimonthly journal, training courses, social media groups, blogs and research publications. Additionally, ISACA offers a network of nearly 200 chapters worldwide, offering IT security professionals local training, professional networking, certification review courses and opportunities for the exchange of ideas and information. Members are also provided opportunities to take on leadership roles, participate in the development of research publications and speak at worldwide conferences. To ensure that certifica- tion candidates demonstrate up-to-date skills, job practices for ISACA certifications are closely monitored, analyzed and updated within every five years. To determine how to best serve the IT security professional, ISACA conducts a “Member Needs” survey annually. The CRISC certification was developed by a nonprofit, independent global leader in security, risk, governance and compliance. It provides a tool to help assess the proficiency of a professional’s IT-related risk management skills. CRISC is a highly desired certification because it is the only certification that positions IT professionals for future career growth by linking IT risk management to enterprise risk management. Nearly 17,000 professionals across a range of job functions – including IT risk, security, audit and compliance – have earned CRISC since it was established two years ago. This number includes more than 1,200 CIOs, CISOs and chief compliance, risk and privacy officers. (ISC)2 for The (ISC)2 Education Program (ISC)2 delivers efficiency in certification for individuals by tapping into innovative technologies and learning strategies. (ISC)2 Education Program engages current and future students and young and experienced professionals to support workforce initiatives and inspire a continuous supply of knowledgeable professionals. Technology is evolving rapidly. (ISC)2’s Education Program reflects this change through updated review seminars. The goal is to promote and increase a candidate’s ability to retain and transfer the knowledge gained in the certification training course by improving the study material, training experience and refining performance on the job. Recent changes include measuring knowledge gain through the use of pre- and post-test analytics; restructuring course content to be both practical in knowledge needed for exam study and applicable in order to increase retention, transfer and recollection on the job; and including value-added, real-world application activities to increase motivation for learning the skills and concepts necessary for success. The (ISC)2 common body of knowledge (CBK) defines the expertise needed in a framework that provides standardized information security principles. This framework establishes a way to assess a candidate’s mastery of certain domains of knowledge and includes the most relevant, current topics of the profession today. The (ISC)2 Education Program aims to change the landscape by helping professionals foster this. Virtual and in-person security leadership events offer exclusive access (free to 86,000 members) and continuing education opportunities to industry professionals looking for timely, relevant and “hot topic” content featuring expert speakers and unique networking opportunities. Finalists 2013 Finalists 2013 Finalists 2013 • Appthority • Champlain College for Computer Forensics and Digital Investigation Degree Programs • Inspired eLearning for Security Awareness Training • Iowa State University for Cyber Security Education Program • The SANS Institute for SANS Training • Pindrop Security • Seculert • Vaultive • viaForensics • Guidance Software for Guidance Software Training • (ISC)2 for The (ISC)2 Education Program • Secure Ninja for SecureNinja Cyber Security Training Program • Kennesaw State University for Bachelor of Business Administration in Information Security and Assurance (BBA-ISA) Finalists 2013 • University of Maryland University College for Cyber Security Degrees and Certificate Programs • ISACA for Certified in Risk and Information Systems Control (CRISC) • GIAC for GIAC Security Expert (GSE) • GIAC for GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) • ISACA for Certified Information Security Manager (CISM) • ISACA for Certified Information Systems Auditor (CISA) 70 2013 SC Awards U.S. 2013 SC Awards U.S. 71 2013 SC Awards U.S. 2013 SC Awards U.S. Professional Awards Professional Awards Professional Awards Best Security Team CSO of the Year EDITOR’S CHOICE WINNER ICS-CERT Security Team for U.S. Department of Homeland Security The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Team responds to incidents, vulnerabilities and threats that can impact those industrial control systems (ICS) which operate critical infrastructure across the United States. These systems are vital for the processes used throughout many critical sectors that the nation depends on every day. The ICS-CERT Security Team’s mission is to reduce cyber security risks by offering four core products and services to the nation’s critical infrastructure sectors: Providing situational awareness to government and the private sector through national alerts and advisories that warn of cyber threats and vulnerabilities; conducting technical analysis of malware, system vulnerabilities and emerging exploits; performing cyber security incident response for asset owners and operators; and partnering with the control system community to coordinate risk management efforts and serve as the focal point for information exchange. The ICS-CERT Security Team has received national and international recognition as an essential element for coordinating cyber security risk reduction efforts among the nation’s critical infrastructure asset owners. Through its incident response, situational awareness and recommended practices efforts, the team is recognized as a national resource for cyber security guidance. It is also a key functional element of the DHS National Cyber Security and Communications Integration Center (NCCIC) and is integral to the department’s capability to coordinate national-level cyber events. ICS-CERT Security Team presence in the NCCIC Operations Center provides synergistic information-sharing value to the various public and private sector partners participants. WINNER John South, CSO, Heartland Payment Systems John South has established a best-in-class IT security team at Heartland Payments Systems by hiring the most talented practitioners to manage the various elements defined in the security program. Seeking team members that have strong communicative and technical capabilities, he stresses the importance of compatibility between the company’s risk/needs and individuals’ strengths. Once team members are identified and on-boarded, South ensures they have ample opportunities to continually expand their knowledge with access to a variety of security training resources. Further, South challenges his team members to grow their expertise by pursuing professional development opportunities. He encourages his staff to earn both CISSP and CISA credentials, as well as at least one additional expertise-specific certification. With this foundation, South empowers his team to take ownership of security initiatives and lead the application of security principles and guidelines to mitigate risks that face the enterprise. By aligning Heartland’s security program with the company’s corporate objectives, South and his team have won the support of corporate leaders and colleagues. In doing so, South has established the business of security at Heartland as a vehicle to support the organization’s various business units. Coming to the table with solutions that help leaders securely accomplish their objectives, and being able to effectively communicate these measures, South and his team have solidified their roles as true business partners for groups across the organization. Looking out for the best interests of business units and merchant customers, South and his staff have earned respect and even converted once-skeptical business leaders into internal champions for the group. Finalists 2013 Finalists 2013 • Go Daddy Security Team • Bobby Dominguez, director, IT security and GRC, PSCU Financial Services • Teleperformance Security Team • ICS-CERT Security Team for U.S. Department of Homeland Security • Nikk Gilbert, vice president and chief information security officer, CUNA Mutual Group • John South, CSO, Heartland Payment Systems • Bruce Wignall, CISO, Teleperformance 72 2013 SC Awards U.S. WINNER Electronic Frontier Foundation (EFF) In an environment that primarily measures achievement in net sales or visibility, it’s particularly rewarding for us to call out the work of an organization that can prioritize ideals – particularly privacy protection in our new age of digital connectivity. The nonprofit Electronic Frontier Foundation (EFF) takes on those who hold the reins – whether in government or industry – large, intimidating forces which, and can often, abuse their privilege, such as in overzealous prosecutions, as was just evidenced in the case of Aaron Swartz. The EFF has put its weight behind Aaron’s Law, a proposed update to the Computer Fraud and Abuse Act that, among other principles, aims to make certain that questionable innovations are not treated as criminal offenses and that penalties are proportionate to allegations of wrongdoing. Another initiative the technology watchdog group has recently undertaken is the Coders’ Rights Project. This effort aims to safeguard programmers and developers as they perform their work. As many of these security and encryption researchers come up against a slew of state, federal and international legal limitations, the EFF advocates that the momentum of these innovators should not be hindered. On their behalf, the group – which maintains an active presence at conferences, like Black Hat and DefCon – promotes education, stands ready to prepare legal defenses and carries on public programs to ease the path forward for technological innovation, including the work of hackers and others on the edges of digital exploration. In addition, the group has a presence on Capitol Hill, providing policy advice to legislators all of the sites encrypted with HTTPS on the web. The goal of the EFF SSL Observatory aided by a substantial gift from entrepreneur Mark Cuban and game developer Markus Persson, is to uncover vulnerabilities; substantiate the practices of certificate authorities, the organizations delegated to sign cryptographic certificates up the gaymers, arguing that the term had been in use for several years prior to the adversary’s claim and therefore belongs in the public domain. “Trademarks have one primary purpose: To protect consumers from confusion about the source of goods or services,” said EFF Staff Attorney Julie Samuels at the time involved in deciding new computer crime legislation. The group’s advocacy for privacy protections extends into many areas touching technological progress. Just last month, the EFF filed an amicus brief in a Maryland case to voice its concern about the collection of DNA from those arrested for a crime, insisting that warrants must be served by law enforcement before anyone is required to provide a genetic sample. The point, it argued, is that the accessibility of advanced technology should not undermine traditional privacy protections. Further, last year, the group began a project to delve into the certificates in use to secure trusted by browsers; and help those further developing the underlying encryption infrastructure of the web. Too, the EFF recently became involved in a case in San Francisco that pitted a group of Reddit “gaymers” – members of the lesbian, gay, bisexual, and transgendered community active in video games – against a website operator who had registered the term as a trademark. The trademark registration should be canceled, the group stated in its petition to the U.S. Patent and Trademark Office, so that the term can be used worldwide. The EFF, in association with the law firm Perkins Coie, is backing of the filing. “This registration isn’t being used to protect consumers – it’s being used to threaten free speech.” Whether it is there with an argument for what it believes is a dangerously narrow view of fair use, or debating in court with police departments to challenge the use of invasive technology, such as GPS tracking devices on a suspect’s car, the EFF stands up to the overseers – alleged and in place – to insist that powerful interests must not shun the rule of law. In doing so, it smooths the path for technological innovation and those whose thinking outside the box transgresses ordinary boundaries that only serve the privileged and powerful. 2013 SC Awards U.S. 73 LastWord SC Magazine readers, save $450 off conference rates Before you take the plunge... COMPLIANCE WEEK MAY 20-22 2013 Prior to a job switch, ask questions to learn if the company you are considering is in good shape, says former Yahoo CISO Justin Somaini. W hether we change jobs out of boredom and are looking for new challenges, or the decision to depart is made for us, too often we don’t take the time to evaluate what worked for us and what didn’t in our previous job, and what we’d like to gain from our new job position. But, even if we can’t predict what will be a good fit, I have found some principles that are essential to look at when considering a new job. Understanding a company’s standing is always impor- tant. Is the company losing revenue? Have executives and/or board members left? Is the company prime for a takeover? Are competitors dominating the industry? All of these questions help determine a company’s health: a factor that will be critical to know if you’re going to make the right move. While risks can pay off, you want to know what you are getting into. A company in turmoil will be more resistant to funding projects, hiring new staff, or making security a priority. Review the 10k and 10Qs and do some analysis and check out the headlines – you’d be surprised what a simple Google search can yield. It’s OK to enter a higher risk environment only if you are aware and prepared. When possible, find out what the company spends on IT and security. The financial health of the IT and security group is important before taking over the role. The general rule is that five percent of IT spending goes to security. Of course, this will vary, but it can be used as a marker. If you are performing a security turnaround, there will be more capital expenditures in the first few years than normal. Does this seem possible given the company’s financial outlook? Is the financial budgeting cycle ad-hoc or formal based on the annual fiscal cycle? Is there an IT budget governance committee managing it? How much was spent on security projects last year? It may not always be easy to get these answers, but they’ll tell you a lot about what your job will look like once you take the reins. One of the worst aspects of security groups, let alone IT, is staff management. It is common to have to restructure a team based on skills gaps. So always try to determine how large the team is in relation to the overall company and IT staffing. Typical security groups for companies of 10,000 to 15,000 full-time employees will have 25 to 30 staff. This does not include IT operational teams that I usually leave in a separate group. Is last year’s attrition rate at the typical 10 to 15 percent? Is the staff located in key areas for the company? Are there cascading goals from A company in turmoil will be more resistant to funding projects...” corporate objectives? Are reviews done quarterly and historically attached to goals? What are the results of the latest employee survey? Has there been a layoff or hiring freeze in the past 18 months? As with financial assets, not having the right human capital will only make your job tougher, so ask the questions. As with any security group, it is really the relationships with other groups that makes it a success or not. Understanding their structure and maturity goes a long way toward understanding what these relationships are. Get an overview of the organizational chart from the CEO to the third level down. Understanding attrition rate and longevity with the company will help you understand effectiveness and focus. While these questions and thoughts will not bring everything to light, they will help. More importantly, the answers to these questions will help you to map your strengths and objectives a bit better to the situation that is before you. Before jumping into that next leadership role, it’s important to know if the company is healthy and supports the function. Words are great, but actions speak much louder, and having some indicators where the company is can make the difference between success and failure. MAYFLOWER HOTEL WASHINGTON DC 2013 IT security and compliance converge at the Compliance Week Annual Conference, delivering powerful ideas, practical ideas and real solutions. Here are a few of the sessions and regulatory chats we’re excited about: Case Study: Putting Policies Into Practice at Dell Crafting Effective Privacy Policies This session will review how $62 billion Dell, the world’s largest maker of computer equipment, takes the ideas expressed in its policies and puts them into practice. How do you “game out” the procedures, manpower, and equipment for a new policy? What’s the training required, and the cajoling necessary, to win over employees? How do you ensure a new policy doesn’t contradict procedures for an old one? All that, and much more. In the modern age of the extended enterprise, social media, and mobile devices, standard corporate privacy policies no longer fit the IT and business landscape that exists today. So what sort of objectives should a privacy policy have? How do you manage consent, data capture, and security? This discussion will explore privacy policies from the perspective of the end goals compliance officers want to achieve—and then work backward to policies you can implement that actually work. Speaker(s): Kristi Kevern, director of operational compliance, Dell Additional speakers to come. Privacy Compliance, Step 1: Knowing Your Data The first step in assessing privacy risks sounds simple: know the data your company has. So how do you do that? How do you map out where your data is, identify the types of data you have, and monitor where your data is going (or equally important, where it shouldn’t be going)? This session will unpack that first step in plain language so you, the compliance officer, can see which risks are coming. Speaker: Alex Zadrozny, consultant, technology & information risk, Zmen Systems Additional speakers to come. Speakers: Allen Brandt, chief privacy officer, Graduate Management Admissions Council Jim Byrne, chief privacy officer, Lockheed Martin Gretchen Herault, VP, compliance and fraud prevention and deputy chief privacy officer, Monster Regulator Chat: National Labor Relations Board The NLRB is the federal government’s lead agency on corporate social media policies. The NLRB will be on hand to discuss its current thinking about proper corporate oversight of employees’ social media activity and offer further details about the guidance (and enforcement actions) the agency has published so far. Speaker: Jayme Sophir, deputy associate general counsel, division of advice, National Labor Relations Board Register today at conference.complianceweek.com and use discount code SCMag 74 SC • March 2013 • www.scmagazine.com Trust one. Identify all. T Learn about the assurance that comes with the Power of One. hidglobal.com/ powerOne or Scan this with a QR reader H E P O W E R O F O N E . Only HID Global has the capability to take care of all your company’s identity assurance needs through a single trusted source. From IT to corporate security, from credentials to authentication to management services, HID Global is the only one ready to provide a best in class Identity Assurance solution that goes beyond a simple password. Each user receives a single identity credential that can be authenticated across multiple access points and devices. One identity. One security policy. One trusted source. Only from HID Global. The Power of One. For more information, visit hidglobal.com/PowerOne-SCM © 2012 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo and the Chain Design are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.