throbber
‘Y TESTCENTER
`Plastic Fantastic
`Smartcards and tokens
`‘
`‘
`arebecoming more
`ub1quitous.We examine
`
`.
`
`=
`
`: MARKETSURVEY
`V»
`j
`- Keeping IT clean
`I Preserving e—commerce . * -' "
`: sites is a major issue
`j *
`-
`today. We look at 15
`‘
`:
`
`*4 * fr A,‘
`
`“
`
`ft
`*
`
`’ "
`
`- 5
`A"
`"
`,5)? X “ *’~‘
`
`ten products which cover I solutions to preserve
`various applications.
`' your web site intact.
`PAGE 50
`PAGE 58
`
`
`
`_
`-_:u'_ '
`
`_.
`3; 3: _
`
`click here
`for online
`news
`
`.h_
`
`-
`
`..‘.‘-u.-,9-..':‘ "1'; "F '''‘r:''.
`
`'
`
`"
`
`i
`‘_-5
`
`.
`
`I
`
`-
`
`I7
`
`?
`
`VOLUME 12 0 No. 3
`
` Radware Exhibit 1016
`
`Page 1
`
`

`
`gig:-_'_r‘.-"
`
`3-I.’"'9.T'_.‘l.'W';:-r‘r‘..~__r_1;.__
`
`
`
`
`
`
`
`
`Every day, more otyour company reiies on tecimoiogy for information. comrnuni'cation and management. And every day.
`that tecirnoiogy needs more protection. Symaotec“ Enterprise Security provides it. Our best—ot-breed tecimoiogy deiiv—
`ers inaximorn security witir minimai impact on performance. We ottera comprehensive range of services to design and
`impiement soiutions. And you can reiy on our giobai response network to distribute fixes to the latest dangers.
`in team
`more about the wortds #1 security software company; or to get a copy of our iatest White Paper. ‘Tundamentais of
`Secure information ieciinoiogy. " visit www.symantec.com/ses3 or ceit 8titi—745-5054 promo code 91123.
`
`id
`
`Page 2
`
`

`
`
`
`PRODUCTS
`42
`First Looks
`
`File Protector makes it easy to
`
`‘
`"
`
`if H keep yourfiles andfolders really
`private, with a range of
`
`'
`
`‘invisibility’ options.
`
`
`With IP address cloaking and
`AVprotection, GateLock
`X200 will keep you safe on
`
`the Internet.
`
`Eovggm ;_3TORY
`28 Biometrics Technolo
`Making Moves in the Security Game
`Biometric technology seems to offer an ideal
`-.
`solution for secure identification, based on who you
`"
`are. lllena Armstrong looks at some ofthe problems
`and possibilities.
`
`
`
`'
`
`Plastic Fantastic
`
`The use of smartcards and tokens forvarious forms of security is
`
`becoming an everyday occurrence. Jay Bellamy examines 10 products
`covering a range of applications.
`
`
`
`Thestrrrdycornbinatiorr lockand
`cable ofNotebook Guardian
`C0mboLock are a good way
`to deter thievesfi'0m stealing your laptop.
`
`44 Product Reviews
`Blade IDS Informer
`
`[MARE-4iiET'i‘ sunvev
`58 Keeping IT Clean
`
`In today's complex networking environment, preserving e
`commerce sites is a major issue. Berni Dwan looks at 15
`solutions to help keep yourweb site intact.
`
`l_SECCtNt"r FEATURE
`
`
`
`_
`
`; '2 - 1;; A unique product to ensure
`that your IDS is working as
`
`it should be.
`
`i
`
`46
`
`Product News
`
`Four of the latest hard— and software
`products looked at.
`
`uiished 12 tirrnas a
`so iitagazii-15'“ lrsshl No. 1095-?9?41 is
`year on _a monthly basis try west coast ubllshin im:.. in
`Worceeier Road. Suite 201. Fran-ii
`gn1.M.fl D1 01 |J.S.A.:
`phone (503: 373-9?92:
`In:
`|. GB} 8-79-2?55: Elrrall
`rue-youIigE'we§n:oa5t.cotl1. Fartoillcain pr.-Eta
`Ffanrirryram. MA 033132 and nridiiianm mulling
`M.:!5IEi'-t: Send address changes to SC Magazine“. P.O Box
`101.\Mncnes~f.ar.MA01B9(}01U1.Com.1lghlD 2002 by west
`Coast Puhlishinfl Inc. All rights reserved. Reproduction in
`viriroie or part. or storage In B-reti'iE_val si_rS'LI'.|rI1. or transnfi-salon
`In any [gun wimour. me rmar uurmixsinn ol the publishers in
`writing is prohibited.
`so M‘
`e"' is uisrrlboreri wimnm cnaége tn zauairrreu reader:
`in the
`.5. and Canada. Rnliual subacrimiuns In others: U.S..
`8-BO; Cmma and Mexico, $?5: other foreign d|5lI'ibu1J-on, $160
`(air-service}. Single-cow price: LF.5.. Canada and Mexico. 38:
`other iomigrr. 516. Fitness 2:-rciosa check or money oiaiur. oar
`3}; ';;f;_f}Efig§L1gP}'{;'}j*g.
`"‘°-,-*“"" i'°"'°""="”-$- *’°"a'=
`
`Pa e #
`9
`21
`49
`24
`
`Advertiser
`Computer Associates
`www.ca.com/elrust
`CyberGuard
`www.cyberguard.com
`Ecora Corporation
`WHIW.eCGta.0Us'I|’WOS9C
`9'DMZ Security ,
`EVIVVW-9:)’f'zf9CU"Ti’-00m
`7°".
`3'9
`“"“*’~'”'*!"’95'"%:59e’-Com’
`“Sammy Inc
`Mmjsea-Mm;’C_mm
`Fmuresoft
`WWW dc,-fine, mwsc
`GI“ . T h‘
`I
`'
`55
`Mn?‘ ",5: c?,‘,),,°g'es
`GI
`T i
`A
`23
`M35213?:gl,':°'°gy 55°C‘
`'
`.
`'
`'"°- 19
`
`51
`39
`
`55
`17
`
`Pa e #
`9
`8
`73
`45
`
`Advertiser
`lntemet Security arstems
`www.iss.net/ad/sc
`IDUG
`wvvw.idug org
`NFR Security
`wvvw.nfr.com
`PassGo
`www.passgo.com
`Pentasafe
`vvwvv.penlasafe.com
`Pest Patrol
`www.PestPatrol.com/promo/sc03
`Pricewaterhousecoopers
`www.pwcIgiobai.conr/secunty
`Sanctum, Inc.
`www. Sanctumlnc.com
`Sandstonn Enterprises, Inc.
`wwwsandslorm net
`§.$.°.r“.§°e£’rf.'.??‘..".‘i$'.i.-.i"f.‘.’.»I.l’.;..
`
`71
`
`11
`
`47
`33
`
`63
`22
`4‘
`
`Page#
`
`Advertiser
`Silent Runner
`www.sr'Ientrunner.com
`Sonicwall
`wwvrr.soni’cwall.corrWpncenler
`SSH Communications Sec.
`www.ssh.com
`Stonesoft
`www.sronesoft.com
`Sunsarrl Availability Services
`Mmsungmiconfsvaiiabrily
`Surfcontrol
`wvwv.surfconlro/.com
`sybarl S-ofprrrare
`wvwr.sytIai1.cwrVaal9$c03
`armantec
`wvvwsymanteccorrr/ses3
`Tivoli
`www.tivoli.com/safe
`-
`‘r’.‘r’r".‘r??.~?.'2"v§2§:.’!'.;-’.‘rf‘.‘;'..?§s°£""
`
`page #
`53
`31
`43
`
`Smartcards and Tokens
`Marching Onwards
`As smartcards and tokens finallyfind their place in today's cyber and
`5;] physical security infrastructure, lllena Armstrong asks a number of experts
`fortheir insight into where the technology is today.
`M 0 R E -9-»
`
`
`
`rd
`-"2.
`
`D
`
`_
`
`-
`
`-
`
`_
`
`'7
`
`Advertise;
`14».
`
`symp‘
`Aiariurn Knnwladne Wm,‘
`mm_9,-m3ddm_mWSc
`Appeam
`wrm.appgai’e.mm
`Blndview
`75
`MiMr.nr.rm::rw_com
`Bloscrypi
`37
`:11-\rv.broscryrrlcom
`omrn
`rr_...v;ir.?r’3rE5.$1.‘.i.“...‘.’.."?‘.l'.‘.t‘.';.._..,...... 2*‘
`
`
`March 2002 SC MAGAZINE E Pae 3
`
`
`Page 3
`
`

`
`_WEBS_I_'I'E
`
`
`
`.scmagazine.com
`
`EDITORIAL ADVISORY BOARD
`Peter Browne Senior V'u2Presidenl’
`Information Security Division
`First Union Corp.
`Barln'aG.GI.fi(Jrir_i’
`Security and Integrity Branch
`Social Security .-\drninjstra1ion
`IIermtIIJ.G.lIIerV'rcePrm'denr
`Infonnation Security Institute
`P&(Iru:
`Dir-mar offrrfornrntiorl Scruriz)-. Atomic Tangerine
`and Cyllr-rdrmr at Info rruatiort Security University
`Dt.I1ch!aoatad'ryProgrwr:Mur:r:ger
`National INFOSEC Education and
`Training Program
`National Secu rity Agency
`Ihllrlllhhw
`htfornrrtrian System Security Consultant
`Deloitte fir Touche LLP
`”
`%I'¢il'.FhrItzr
`Ernst 8: Young LLP
`lefls.Johnaon
`Infornrrttinrr Protection Manager
`Cartgill. Inc.
`Ra'Ii$liN.Sra'mII:Ge:u:mIDire¢wr
`In form;tt-ion Systems Security
`General Motors Corp.
`corny D. Sdiou Prafzaxor and Cirrrfrnrnn
`Computer Information Systems
`
`5l'€Ih"ll]‘ Btmm-$5 Security Manager
`SEC Services. 111:.
`
`SC Magazine" is circulated to key information ‘security
`personnel throughout all sagrnerrts of
`uammant and the
`financial. Insurance,-servrl-lie and menu at.-turlng Industries.
`Articles. product releases. nan-9, upcoming awards and other
`editorial carry are selected to provide a moadtrasad under-
`standing or information security Issues.
`services. products and their applications. west Coast Pub
`lishlng inc. reserves the right to refuseeny material that
`does not oonterm [0 its policies. West Coast Furnishing inn.
`is not responsible for the more nt. tBDrE.',i-|bl'I'l£Iti_OfIS or opin-
`luns in submitted material and interviews. la-nth editorial and
`atlvertisenterrts. or for transcription and reproduction emors.
`not can they be held legally responsible for any injuryand/or
`damage to persons or property from any use or operation of
`any rneIhod.s_. products. Instruction or ideas contained In the
`Ioularlai published herein. All trademarks are acknowledged
`as U123 om-96111 of their respective owns re.
`
`15
`
`16
`
`Commentary
`lllena Armstrong The Body Slam Invaders of Privacy
`
`or Not?
`
`Executive Security Digest
`Stratum8 Scores $10 Million/lTSecurity Start-Up Secures $5 Million/Redsiren and
`Central Command Team Up/l/endors Help Australian Companies/Zone Labs and iPass
`Work Together/Joint Order for Datakeyand Rainbow/Websense and SonicWALL Partner/
`RSA, Waveset Team/CyberGuard Expands Presence in Europe/Impento Opens HK and
`London Offices/New Security Research Company/Fmally Software Opens U.S. Offlce/
`Caradas Adds New Executives/Kroll Hires New Director, D. C. Manager/NAI Expands
`European Team/Bush Appoints Microsoft CS0 to CIP Board
`
`20
`
`News
`
`U.S. and global security issues.
`
`72
`
`Industry Watch
`‘Good’ Viruses Crucial to Self-Healing Internet by Cyrus Peikari.
`
`72
`
`Events 2002
`
`Conferences and Exhibitions for the next three months.
`
`74
`
`The Last Word
`
`Looking Out vs. Looking In by Harold Kester.
`
`
`
`9 Advertisers’
`
`Index
`
`MORE ->-D
`
`Vfl
`
`You want the latest
`information security news?
`
`says it all!
`
`The name
`
`www.scmagazlne.com
`
`
`
`Searching for Onlin
`
`Both individuals and companies have legitimate fears
`that private data held digitally may be unlawfully
`accessed. lllena Armstrong explores some of the
`dangers and solutions.
`
`48 SC 2002 Awards
`
`
`

`
`.
`
`I
`‘W
`
`
`' ’ I
`
`I M if. Your chance to influence the selection of winners in this year's Awards.
`
`Page 4
`
`

`
`
`
`LE;
`
`
`
`real—time access is the whole point of the exercise. In
`u
`It’s all a question of trust, and secure,
`es usually deploy web applications somewhat hur-
`fact, it is probably true to say that cornparu
`riedly, anxious to make new features available to customers. Testing for security holes there
`fore is usually way down the list of priorities, not to mention the fact that the specialized
`expertise and financial resources required for such a task is not readily available.
`
`Doubtless, many web server deployments
`are done on a wing and a prayer, but this could
`hardly have been the case with the 13.5. De«
`partment of Justice web site where-Janet" Reno's
`picture was replaced with one ofAdolph Hit-
`ler. It's a fact of life that network topologies
`are becoming ridiculously complex and that
`the roller coaster progression of e-commerce
`as the de facto standard of conducting busi~
`ness is doing nothing to appease this situa-
`tion. Do we trust the concoction of computer
`technology that enables us to engage in e-busi-
`ness? If the -answer is yes, then we will not
`require any of the network security, web server
`security. intrusion detection and vulnerability
`testing, fl1'l.ll.“Vl.|'|.l§, firewall or virtual private
`network WPN) products currently available.
`If the answer is no, then we must embark on
`a fact-finding mission to ascertain the correct
`mix of products to protect our e—assets. The
`hardware, software, systems and applications
`that make today’s business possible have also
`transformed our previously safe environment
`into a veritable minefield, and by merely en-
`gaging in e-business we have become risk tak-
`ers extraordinaire.
`
`SC MAGAZINE March 2002
`
`Protecting applications raises the goalpost.
`presenting businesses with new challenges un-
`like those associalcdwith protecting the network.
`Traditional security products targeted the biggest
`threats that emerged as computer networking,
`email and web applications were adopted by cor-
`porations. These. were perimeter protection
`{firewalls}, network protection (network-based
`intrusiondetection) and filc- based security (anti:
`virus), and corporations purchased the products
`to solve these security issues. But these technolo-
`gies do not addrem new attacks that circumvent
`existing protocols to attack applications, or new
`content-based attacks that attack wstcms be.-
`fore vendors are able to release and distribute
`signatures and other counter-measures. as pointed
`out in OKBNA. l.r1c.'s Technology Best Practices
`forlmrusiou Preverrtfon (www.okena.com).
`Herésjust a taste of what you are up against:
`changes to information in hidden fields. _e-shop-
`lilting. tampering with CGI parameters, modifi-
`cation of data in uneucrypted cookies, planting
`malicious code in text fields, and use of debug
`options or backdoors left in applications. And
`you thoughtyou onlyhad to worry about debas-
`ing the site. and information theft! Changing
`
`hidden fields is a good example we can all relate
`to if we have merely tjnkered with HTML. Of»
`ten included in web pages to maintain session
`information such as price, hidden fields are just
`that, and the t‘eg'u_lar user is oblivious to them
`However, ifthe user-opens the page in an HTMl
`editor, which is easy to do, the hidden fields art‘
`revealed and can be altered (if the user is mali-
`cio us), enabling problems such as e-shoplifting.
`No two applications are alike, and applica-
`tions that are alike are used differently by each
`organization. This rnoveahle feast then. need»
`something more than traditional network secu-
`rity ro capture all its foibles. These foibles. av-
`outlincd by 'KaVaDo on th eir web site-
`(www.kavado.corrI!thrcats.htm}. include IT in
`frastructure vulnerabilities and misc-
`onfigurutions, third party andcustomized soil ~
`warevulnerabilities, and database manipulatiu n
`and vulnerabilities. With software bugs legion.
`it’s a battle of the patches out there.
`Exploiting
`-IT
`infrastructure
`vulnerabilities is probably the casi.est.wa'y to
`attack an application, as there are literally
`thousands of known vulnerabilities in the
`basic components commonly used to set up
`
`www.scmagazIne.com
`
`Page 5
`
`

`
`
`
`Version: 4.0
`Supplier: Sanctum Inc.
`Price: on application
`contact: (408) 8559500
`sanctumsaIes@sanctuminc.oom
`www.sanctumInc.oom
`
`FOR There is even an option to hide sensitive data like
`passwords and credit card numbers in logfilesl It's easy
`to do and itworks.
`AGAINST None.
`VERDICT This is a massive product, and I haven't even
`scratched the surface. It is sophisticated with an
`incredible range of services.
`
`Features
`Ease of use
`Perfomtanoe
`Documentation
`§uppoi't
`valuefurrmnay
`Overall Ratlng
`
`‘k‘k*‘k‘k
`Vktittfi
`**1\'**
`it-A"k'i'rir
`'k_1--A-~A_'~k
`_
`I_'l@-
`***.fl
`
`Most products in the business ofweb server
`protection do the regulation blocking, log-
`ging and alerting of the illicit activity. but
`rip,-i3lu'eld goes a step further by actually
`sending a warning to the possible perpetra-
`tor that the questionable behavior has been
`detected and recorded. Appsliicld is a 2427
`automated web application firewall secur-
`ing both your site and applications even if
`your site generates content dyuzirnically or
`you continually develop andlaunch new ap-
`plications. Employing Sanctunfs patented
`Policy Recognition engine, Appshfelrl cre-
`ates, automatically and on the fly, rules for
`legitimate behavior based on the HTML code
`within the page. It is then able to check that
`every request conforms to the specific policy
`for that user session and page. It is also worth
`noting that r‘IppSlI.le‘lrl is the first security
`product to achieve certification for web ap-
`plication policy enforcement (WAPEJ from
`ICSA Labs.
`The current dichotomy of e-commerce
`lies in the fact that at one end of the spec-
`trum you have economic success, while at
`the other end you have an explosion of new
`software code to keep abreast of dynamic
`web applications, which need constant
`patching and updating to remain secure.
`Really a web application flrewa||.AppS.lrield'
`secures the web site by blocking any type of
`online application manipulation.
`I always warru to a system that gives you an
`escape route if you mess up, and AppS}Ir'eld
`has some handy escape features. For example,
`each time you modify therlp_oSlu'rld configu-
`
`Revert Configuration command and try again.
`There are four configuration modes available
`that should cover the majority of network
`topologies. Tasks like certificate installation
`that could prove tedious if you have lots of
`web servers can be dramatically simplified
`using the copy procedure. You only need to
`install a certificate on one web server and
`merely edit the IP address and port on all
`subsequent servers.
`/ippSln'cld employs URL mapping, and
`this could be avital feature for readers with
`higher than average security requirements.
`An embedded reverse proxy feature, it ena-
`bles you to map a route for requests received
`through »lppSlIieItl, from the requested URL
`to a different URL. This is completely trans-
`parent to the client and its implementation
`is extremely advantageous, the most obvious
`being that true path information and direc-
`tory structures are hidden.
`You can define the level of security you
`want Appfihield to perform on your site or
`customize your own level. There are three
`predefined levels available: strict, intermedi-
`ate and basic. These are designed by Sanctum
`to hit the optimal balance between ease of
`configuration and the level of security desired.
`Whichever one you choose. you can select an
`enforcement mode of active or passive de-
`pending upon whcther you want active pro-
`tection or merelylogging ofsecurity alerts.
`
`
`
`Verslon: 2.0
`
`Supplier: Entercept Security Technologies
`Price: on application
`contact: (800) 599-3200
`saIes@enteroept.com
`vNvw.entetoept.oom
`
`FOR Instant update feature opens a secure connection
`to Entercept Security Technologies to automatically
`dovmload updates.
`AGAINST None.
`VERDICT Easy to configure and use, providing
`excellent application and system protection for
`web sewers.
`
`Features
`Ease of use
`Performance
`Documentation
`Support
`VaIueforn'ion§y_
`Overall Ratlng
`
`A host—based, real—time intrusion prevention
`and security enforcement system, Entercept
`
`March 2002 SC MAGAZINE E Page6
`
` .-an integrated Internet environment. This
`
`. [fives service providers with the pernianent
`ongcli ng task of up_gra'ding and patching
`their systems to prevent those vulnerabilities
`from compromising-the‘-security ofthe whole
`_g[[_\fi moment. But attackers, keeping them-
`selves up to date with new vulnerabilities,
`find it extremelyeasy to penetrate the serv-
`ice provider environment.
`Third party and cu.storniz_ecl software
`vulnembillt_ies_provide attackers with endless.
`pppttrtunltles to penetrate systems. as creating
`and maintaining a-sejcuife htlp-based'applica-
`tion is a burdensome task requiring constant
`quality assurance and_secun‘t'yao"a_lysis.Custom.-
`-icing software'de'vE1oped bythird-partyvendors
`exposesyou both to errors made by the software
`vendor and to vulnerabilities created during the
`customization process.
`The databa'se,'bciI:tg the heart of most sys-
`tems, is them_os_t lucrative_tar-g,-etto attack. While
`the database itself is usually secured, it is still
`open tothe application usingil.
`inmost
`cases applications. need to perform both read
`‘and write operations. 'tiI_Ie.a_t>t'J1lcation is usually
`aul ltorized to interact freely with the database
`While that problem can be addressed by care-
`fully defining access ‘rights in a modestsystem,
`approach becomes insurmountable in more
`complex systems. The multitude of difierent
`inrerfaeesaod maintenance applicationsaooess-
`ing the same database militates against design-
`ing 3 fail-safe system.
`So what are we to do in the face ofthese new
`vulnerabilities eloquentlydescribedl:)‘KaVnDo2
`Wt-11. Okena have listed ten best practices that
`can he-"appreciated by anyreader,
`of
`their productloyalties. They advise host-based
`protection. enforcing security at the desktops
`and servers, where the actualworkis performed
`and the potential for damage" is grea'tesL ‘.‘As
`technologies such as high-speed networks-,
`switching, and end.-to,-end encryption are more
`widelyadopted, providingdesiredsecurity atfl-re
`network level becomes a major challenge!’ Re-
`gnrd'mgreal«tir'n'eprevention decisions theysogs
`gest that application ‘cells must be intercepted
`at ihekemellevel. Recognizing that attacks have
`nmltiple phases, they advocate a defense in
`depth, where each phase ofan attack-gets it re-
`sponse.-byintercepting all-major points ofcom»
`niuuication between applications and the
`Underlyiogs-ystem.
`survey address
`The products in this
`above. and a lotmore
`all theproblems
`besides. I worry sometimes though, when I see
`product literature dcsclibing eve1ypossible-vul-
`Uilrability inrgreat-detail. and how they occur. Is
`this fodder for the malicious user, or did they
`kn ow all ofthis already anyway?
`
`
`
`Page 6
`
`

`
`Security Manager
`with ESM for Webservers
`
`..
`
`E § i
`
`ss
`
`Version: 5.5 and 1.0
`Supplier: Symantec
`Price: on application
`contact: (408) 253-9600
`FAX (408) 253-3968
`www.syrrmtec.corn
`
`FOR With Live Updatecapabilitiesand secure remote
`update functionality, adrninistrators can safelydeploythe
`latestsecurityoheckagentsworldwideviathe Internet
`AGAINST None.
`VERDlcTProvidesaoomprehensive$ourityartalysisof
`
`Featues
`Easeof_use
`Pertommoe
`Doctmentation
`Sigyxt
`Y3’-'*l°*‘""!H__
`Overall Rating
`
`Enterprise Security Manager is a comprehensive,
`policy-hasetl security assessment and tnanagc-
`ment tool, which intelligently assesses network
`vulnerabilities with over 1,500 security checks,
`on Windows NT 4.0, 2000, XP, Solaris, HP—UX,
`AIX, Linux, IRIX, Digital UNIX, NetWare,
`Scquent a nd VMS. ESM security checks provide
`protection in three key areas — user accounts and
`-.mthorizatinns, network and server settings, file
`systems and directories. It takes the approach of
`managing security through vulnerability assess-
`ment and policy compliance, from a central con-
`sole and/ or delegate control over sections to
`different individuals, even over the Internet.
`Like some other vulnerability checking prod-
`ucts in this market survey ESM checks multiple
`systems simttltaneousiy for deviations from se-
`curity policies. such as missing O5 patches, inap-
`propriate user password settings, unauthorized
`privileges, incorrect file access, changes to secu-
`rity settings. and incorrect system configurations.
`Vo!J1et'abil ity checking and policy compliance is
`an automated all"-ai r for all systems across the
`enterprise from a single location. This means
`atttomatically measuring security on servers.
`workstations, routers, hubs, applications, and
`even databases.
`While ESM focuses on network resources
`
`and the policies applied to protect those resources.
`ESMf0I'WCi1S€rl*tir5, a module that sits on top of
`ESM, uses it nctwork—based assesstnent approach
`to actively examine web sewers in an enterprise.
`It then reports the W l ner-abilities it finds on the
`ESM Enterprise Console. Each of the 270+ se-
`
`www.scmagazine.colfiage 7
`
`I
`
`work-wide intelligent agents on workstations
`and servers to enforce appropriate behaviors
`is clever. Stormwatch takes a layered approach ,
`that responds to each stage of an attack
`lifecycle. While it proactively defends against
`attacks at the host level, it goes on to pre-
`vent network damage if its host protection is
`defeated. The Stormwatch policy rules as-
`signed to each server and workstation are ap-
`plication-centric access control rules and are
`not based on users or IDs.
`-
`Best Buy goes to MFX's
`- WebSiteLock for its novel object
`code technology (OCT). OCT does a
`byte-by-byte comparison between a
`working copy of a file and a master
`copy of the same file, and if any
`byte difference is detected, the working file is
`corrected at the byte level ratherthan replacing
`the entire file. Employing this rather than the
`more commonly used checksum method ensures
`file integrity. Furthermore, WebSiteLock|iterallyl
`locks the contents of your web site, and protects
`the files available to public users from any form
`of tampering. As well as being an intrusion detec-
`tion system through its immediate reporting of
`any attack to the system administrator,
`WebSiteLockfacilltates an immediate and au-,
`tomatic rebuild of any damaged or deleted files
`with the original files.
`
`
`
`M.=\GA2'.[h."E
`
`
`
`1 Not wishing to sound like a schoolteacherjudging
`‘ the class projects, I have honestly to say that it
`3 gets increasingly difficult to extract the best buy
`‘ and recommended products from the list. Any prod-
`‘ uct attempting to tackle the needs of a complex.
`l enterprise ecommerce environment has given it-
`, self a tall order anyway, and a brave one to whit.
`PentaSafe's WgilEnt Security/tgent
`for Web Servers gets a Recommended
`Award, reducing the trauma of a ca-
`tastrophe as it does by providing one
`click restoration of corrupted files, as
`well as being able to automatically
`restore a corrupted web site to its desired state.
`Proactively protecting your servers by auditing them
`; against security best practices and automating the
`management of security, VSA for Web Servers pro
`vides stepby-step instructions on how to fix identi-
`fied vulnerabilities. VSA for Web Servers also scans
`, systems to determine if the script mapping running
`: on the web server makes it vulnerable to Code Red,
`‘. Code Red It and Nimda. as well as scanning your
`i system to identify inadequate patch levels and flag-
`ging you if they are not up to date.
`~
`Okena's intrusion prevention
`Stormwatch, with its patent-pend-
`ing INCORE technology, also gets
`a Recommended Award. its ap-
`proach of protecting against uni-
`dentified threats by applying net-
`
`
`
`Web Server Edition is designed to protect
`both OS resources and web server applica-
`tions. It does so using three components —
`agents, console and a database of signatures
`and behavioral rules — while the server is the
`conduit of communication between these
`components.
`Agents are installed on each host you
`want to protect, forming a protective layer
`around the host operating system, provid-
`ing application—specific protection and
`monitoring the http data stream. Like most
`similar products, any requests to the operat-
`ing system are matched against the database
`of known security breaches and malicious
`behavior. Legitimate ones are passed on for
`processing, while suspected malicious re-
`quests are handled ztccordirtg to user—defined
`security policies.
`There is a distinct advantage though to the
`way the agent shields the configuration and
`resources of specified applications. Having
`scanned the host to find the applications it is
`designed to protect, the agent creates a set of
`rules for each application. Once a set of rules
`is created, it becomes part of the agent’s data-
`base and functions just like a signature. The
`most important advantage of this system is
`that applications are protected from unknown
`as well as known attacks, making them more
`difficult to subvert.
`Seven areas of application activity are moni-
`tored and these are worth listing because they
`show the impressive level ofprotection at the
`application level. Program files are protected
`from being modified, deleted, or in some cases
`
`m SC MAGAZINE March2002
`
`viewed, and any service related to an applica-
`tion is protected from being stopped, modi-
`fied or deleted. Only certain processes are given
`access to data files, while an applications reg-
`istry settings are protected from modification
`at the process level. User settings defined by
`an application cannot be changed or deleted,
`and any vulnerability in an application that
`might allow remote access to the system is
`blocked. Finally, protected applications are
`prevented from being misused to make unau-
`thorized changes to the system.
`You are free to configure four aspects of
`the Enterceptsystem: signatures, security poli-
`cies, exceptions and notifications. Four secu-
`rity levels categorize signatures, and while they
`come as defattll you can change them to suit
`your particular environment. info indicates
`changes to the systcni configttration that usu-
`ally occur during normal system activity, but
`thcmetically could create a ht-ttigtt security hole.
`Low indicates a modification that may be in-
`dicative of suspicious behavior that might cre-
`ate a more serious security hole. Medium
`indicates a known attack or highly suspicious
`behavior with low to medium risk, while High
`indicates a known attack or malicious behavior
`posing a serious threat to the system.
`Agents will respond to security events
`based upon their security policy, and there
`are four possible responses — ignore, log,
`prevent or terminate. Of course, some seem-
`ingly serious security alerts may be just some-
`body doing a routine task, and you can invoke
`the exception function to override a secu-
`rity policy in this instance.
`
`Page 7
`
`

`
`ofweh server security — CGI script vulnerabilities,
`frp utilities vulnerabilities. and bastion host serv-
`ices vulnerabilities. In short, the ESM for
`'lA"'¢‘l.l,\‘t'-'F‘lv"{.'l'$ module extends Enterprise Security
`Mnmager’s security policy compliance and vul-
`nerability assessment capabilities, providing ad-
`ditional valuable infonrtation about the web
`servers in your enterprise network.
`it is important to understand that it is purely
`an additional module and does not replace any
`of the ESM features or perform operating sys-
`te in security checks. An ESM Agent installed on
`a web server will cater for about 80 percent of all
`necessarysecurity checks relating to the web serv-
`er‘s operatutg system and patch levels, while an
`installation of ESM for Welisrrvers [ills the gap,
`providing additional security checks specifically
`pertaining to web server vulnerabilities.
`ESM for Welrsrrvers need only be in-
`stalled on a single host that is already run-
`ni ng an Enterprise Sectrrily Manager Agent,
`and that Agent then conducts assessments
`over the network. A license will be needed
`for each web server to be scanned. This
`Agent will still communicate with the ESM
`l\-‘lanager, but it is not necessary for them to
`be installed on the same system. So, the
`bottom line is that ESM for Wet"iservers is
`installed on the E-‘SM Windows NT Agent.
`but it can also access web servers running
`on Windows 2000, UNIX and Linux plat-
`forms. Utilizing both Enterprise Security
`
`eserver Secure
`
`
`
`Version: 2.1
`
`supplier: Turillion Software Technologies
`Price: on application
`Contact: (800) 604-3228
`sales@turiIIion.com
`www.turillion.oom
`
`malicious weh—hased attacks by monitoring web
`requests directed at protected sewers and scan-
`ning for malicious patterns. it detects, logs. and
`controls I 18 web server requests based on at user-
`defined security policy. Somewhat similar to
`Vigilfitit Security Agent for Web Servers. cserver
`Secure provides protection and control access
`without requiring you to install frequent vendor
`sccttrity hot fixes and patches. Security, adminis-
`trative and activity lugging are provided. as well
`as remote log viewing, remote administration,
`and email—alert notification. The main benefit
`ofthis type ofsystem is that it reduces the main-
`tenance costs and considerable downtime asso-
`ciated with system patching and testing.
`Easy to navigate. with an intuitive GUI,
`the statistics tab displays information on a wide
`array of security activity, allowing administ ra-
`tors to view server activity statistics and verify
`security conliguratiotts in real time, as well as
`the current status of the server itself. You can
`clearly see the most recent attempted attacks,
`including date. time, source ll’ and attack sig-
`nature. When malicious activity is detected.
`cserver Secure can respond in either of two
`ways — deity the malicious request and close
`the connection. or deny the malicious request
`and redirect it. The recent audit events view
`lists the most recent aclmittistrator user activ-
`ity, including changes to the security policy,
`user logins. etc.. while the recent system events
`
`
`FOR Reduces the maintenance costs and considerable
`downtime associated with system patching and testing.
`AGAltts'_r None.
`Ifyou t""Hlt'!3_at1'e-
`in
`secui'ityintricacies,theneServerSecure is perfectforyou.
`
`_
`
`Features _
`_Ease_of use
`'
`_
`'
`Performance
`D0ct_lf£lTl3ll0n_ _ _
`
`Valu<=L'_;fQI'.I'i'|IlI_l'E.'tt.-.'
`overall Rating
`
`***~k~k
`‘_I_r_*~k'kirj
`*-**3'It*-‘it
`-~k-.-~k'*it
`3;‘.t'_='t"-'k.1tr.!£
`hffi
`*k‘k:_1_r_'.~kI
`
`_
`
`.
`
`e'DMZ Security offers the strongest
`combination of security and availability at
`the best cost. Based on experience gained in
`the financial services sector, our solutions
`have a proven record for stability and scale.
`Using our highly automated approach, we
`can deliver world class service at prices well
`below the industry average.This is the result
`of experience meeting ingenuity.
`
`NOW 0 F F E RING :
`YE; Managed Firewall Service
`Q Managed Unix Security Service
`Professional Security Services
`
`To find out more,
`Call us at 302-793-4984
`Go to our Web Site: www.e—dmzsecurity.com
`Or eMail us at contact@e—dmzsecurity.com
`
`SECURITY
`
`Your _
`Iniormatlon
`Securlttl
`
`AL LY
`
`Page 8
`
`

`
`security, theAdminStealth utility conceals the
`administrator GUI from non—admin staff.
`
`Again, like VigilEnt Security Agent for
`Web Servers, eSer1/er Secure is designed to
`counteract the damage done to IIS servers
`by the likes of Nimda and Code Red, and in
`fact it gives instant, out-of-the—b0x protec-
`tion from these. Web—based remote admin-
`istration capabilities eliminate the need for
`additional workstation software to admin-
`
`ister the eServer Secure application. Author-
`ized and unauthorized administration
`activities, including specific changes to the
`active security policy, are logged, while the
`DynamicAlerts feature reduces the number of
`alert emails you receive during Internet—wide
`web server attacks automatically. This is made
`possible through thresholds configurable alerts,
`ensuring that you only receive email alerts that
`are valid and absolutely necessary.
`Email alerting is obviously a vital component
`in a product like this, but ifyou have networki

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket