throbber
|
`
`
`
`VOLUME 12 « No. 3
`Radware Exhibit 1016 Wd
`
`‘
`
`*¥*
`" at
`- Keeping IT Clean
`‘
`_ Preserving e-commerce . —
`' sites is a major issue
`* ™
`y
`-
`today. We look at 15 ‘> Aue =
`: solutions to preserve

`‘ your website intact.
`’ PAGE 58
`
`
`=
`
`click here
`for online
`
`
`Bara ie eas
`“ar
`——
`
`f
`ut
`
` 7,0
`
`]SECURITY:
`\GAZINE
`
`Plastic Fantastic
`Smartcards and tokens
`are becoming more
`ubiquitous. We examine
`ten products which cover
`variousapplications.
`PAGE 50
`
`
`
`Page 1
`
`

`

`a ‘
`
`OPYRIGHT OFLS
`
`74a<
`a> -
`
`Ae,
`
`aaawet
`
`os
`
`
`
`vata)
`
`aaahieta
`
`Every day, more ofyour companyrelies on technology for information, communication and management. And every day,
`that technology needs more protection. Symantec”Enterprise TATATMT eeeCe
`ers maximum security with minimal impact on performance. We offer a comprehensive range of services to design and
`implementsolutions. And you canrely on our global response POLEA CHOIRSATTNCRIN CMUGey CTee OL
`NIETOaM OTRaedMOTRCLICRU1DAI Ce)a ECMCHATAULL
`COATTen TOELEMeUNLE14A TELLSLLLLASCCL FLeeWel MULLSeA
`
`
`
`Page 2
`
`

`

`
`
`
`lreST CENTER
`
`
`
`Plastic Fantastic
`
`The use of smartcards and tokens for various forms of security is
`becoming an everyday occurrence. Jay Bellamy examines 10 products
`covering a rangeof applications.
`
`MARKEY SURVEY
`58 Keeping IT Clean
`
`Intoday's complex networking environment, preserving ¢-
`commercesites is a major issue. Berni Dwan looksat 15
`solutions to help keep your website intact.
`
`Four of the latest hard- and software products looked at.
`
`46
`
`Product News
`
`PRODUCTS
`42
`First Looks
`
`File Protector makesit easyto
`keep yourfiles andfolders really
`Z|
`
`ueae Pee ovinemaneter
`EN invisibility’ options
`enta
`
`With IP address cloaking and
`AVprotection, GateLock
`oa
`i) X200 will keep you safe on
`the Internet.
`
`
`
`Thesturdy combinationlock and
`cable ofNotebook Guardian
`ComboLock are a good way
`to deter thievesfromstealing your laptop.
`
`44 Product Reviews
`former
`A unique product to ensure
`that your IDS is working as
`it shouldbe.
`
`|COVERSTORY
`98 Biometrics Technolog?
`Making Moves in the Security Game’ oh
`.
`.
`.
`Biometric technology seems to offer an ideal
`oe
`solution for secureidentification, based on who you
`"aye
`are. Illena Armstrong looks at some of the problems
`and possibilities.
`
`
` WWW. ecora.cominfosec
`
`v3
`ISECC Nby FEATURE
`IAS
`
`published 12 times 8
`SC Magazine™ (ISSN No, 1096-7974) is
`Worcester Road, Suite 201, Framingham, MAOL1701 U.S.A;
`Publishing
`yearon a monthly basis by West Coast
`phone (508) 872-9792:
`fax (508) 879-2755; Emall
`rdeyoung@westcosst.com. Periodicals postage
`
`Framingham, MA 01702 and additional mailing
`MASTER: Sand address changes to SC Magazine™, P.O Box
`101, Winchester, MA 01890-0101. Copyright © 2002 by West
`Ceast Publishing Inc: All tights resenied, Reproduction in
`Whole of part, of-storage In a-retrieval systom, ortransmirssion
`in any form withoutthe prior permission ofthe publishers in
` Marching Onwards
`ee ig Cee meee
`a
`inteUS,andGaneda hanasubsengonstoars:8,
`¢| As smartcards and tokensfinallyfind their placein today’s cyber and
`)
`Cann
`nd
`Mexico,
`7
`it
`fon
`(aibecvlasi:Single-copypricesU.S.,CanadaandMenico, $8;
`i physical security infrastructure, Illena Armstrong asks a numberofexperts
`other foreign, $16, Pisase enclose check or moneyorder, pay:
`ee
`|
`for their insight into where the technology is today. MORE eeeeeeeann aberrantaeees
`ie
`
`mar car S a I }
`
`O ens
`
`i
`
`i)
`
`.
`
`-—_
`
`a
`
`[)
`
`.
`
`Advertiser
`Computer Associates
`www.ca.convetrust
`CyberGuard
`
`www.cyberguard.com
`Ecora Corporation
`
`Page #
`21
`49
`
`24
`
`Advertiser
`Internet Security Systems
`www.iss.neVad/sc
`IDUG
`
`Page #
`
`Advertiser
`Silent Runner
`www,silentrunner.com
`Sonicwall
`
`Page #
`8
`13
`
`45
`
`14
`
`www.sonicwall.comvpncenter
`www.idug.org
`SSHCommunications Sec.
`NFRSecurity
`www.ssh.com
`www.nir.com
`Stonesoft
`PassGo
`61
`e-DMZ Security
`www.stonesoft.com
`www.passgo.com
`a
`Page # heapra
`Advertiser
`Avail
`ft
`Iron
`are
`4
`eeeetekg
`awtoaeetacon
`53
`www.infemetmanager.conY
`WaceooteanSymp.
`
`
`Aladin Knowledge Sytems, 47|SurfControl31 ao Pest Patrol
`
`WweAladdin.com/SC
`aauy Naca
`www.PestPatral.conypromo/sc03
`www.surtcontrol.com
`;
`55
`pGate
`43
`Fut . Soft
`:
`PriceWaterhouseCoopers
`Sybari Software
`{7
`33
`WWapngate.com
`wwcotter
`com!
`www.pwogiobal.cor/security
`wwwsyhar.com/ads!sc03
`
`Bindview 63|Symantec76. Lene eesclecs Sanctum,Inc.
`
`
`
`
`Beecon
`ear
`www.Sanctuminc.com
`65
`piereyrauconvses3
`ine
`37
`Global Technology Assoc.
`Sandstorm Enterprises,Inc.
`3
`22
`Tivoli
`www.sandstorm.net
`www.tivoli.com/safe
`CenunOscrypt com
`www.gta.com
`Unication Devices
`i
`Secure Computing
`Corp.
`Vanguard Enterprise Security
`26
`44
`Minioutofbandmanagement.com
`Seeanima Ing.
`19
`www,sobaadonputngcam
`www.Go2Vanguard,con/sci
`
`Scmagazine.com March 2002 SC MAGAZINE (2 Page 3
`
`Www,
`
`*,
`
`Page 3
`
`

`

`_ WEBSITE
`
`
`Searching for Onlin
`
`Both individuals and companieshavelegitimate fears
`that private data held digitally may be unlawfully
`accessed. Illena Armstrong explores someof the
`dangers and solutions.
`
`
`
`|
`
`
`
`saysit allt
`
`
`mae AS SC 2002 Awards
`www.scmagazine.com
`Bo aeatem Yourchanceto influencetheselection ofwinners inthis year’s Awards.
`EDITORIAL ADVISORY BOARD
`FirstUnionCorp.
`Barbara G. Cuffie Chief
`Security and tntegrity Branch
`Social Security Administration
`WeretciteVicePrien
`15 Commentary
`;
`InformationSecurity
`Institute
`Illena Armstrong The Body Slam InvadersofPrivacy ... or Not?
`ES
`PabicisGirrore
`Director ofInformation Security, Atomic Tangerine
`16 Executive Security Digest
`peteoe
`a be
`;
`+
`s
`+
`StratumScores $10Million/ITSecurityStart-Up Secures $5Million/RedSiren and ean
`CentralCommandTeam Up/Vendors HelpAustralian Companies/ZoneLabsandiPass
`eat tieeo
`WorkTogether/JointOrderforDatakeyandRainbow/WebsenseandSonicWALLPartner/
`InfpainSieSeerConsultant
`
`RSA, Waveset Team/CyberGuard ExpandsPresencein Europe/Imperito Opens HKand SayRadArter
`London Offices/NewSecurityResearch Company/FinallySoftware Opens U.S. Office/ a
`CaradasAdds NewExecutives/Kroll Hires NewDirector, D.C. Manager/NAl Expands
`CerimeeotectionManager
`European Team/Bush Appoints Microsoft CSO to CIPBoard
`RandolphN.SanovieGerwralDirector
`Information Systems Security
`20 N
`GeneralMotorsCorp.
`ews
`CoreyD. Schou ProfessorandChairman
`aa
`Computer Information Systems
`U.S. and global security issues.
`MLSTick
`Security Business Security Manager
`Industry Watch
`SBCServices,Inc.
`‘Good’ Viruses Crucial to Self-Healing Internet by Cyrus Peikari.
`SatebeasePaespoe foKonjnforenationseen
`Heeeseesrows, Upoomingeverisanstr
`*
`re}
`, EES, Uy
`72 Events 2002
`editorialcopyareselectedtoprovideaPacodtianadnee
`sane Seeeen See, technologie
`ee
`Services,
`ucts
`a
`eit applications, West Coast
`Conferences and Exhibitions for the next three months.
`lishing Ing. raserves the right o refuseeny material that
`does not conform toits policies. West Coast Publishing inc,
`isnot responsible for the content, representations or opin
`jons in
`submitted material and interviews, both editorial and
`74 The Last Word
`Beeman, orfortranscriptionandFaprodutionerrors,
`nor can they be held jegally responsible for any Injuryand/or
`Looking Out vs. Looking In by Harold Kester.
`ieeoiyhad-pelgeenhcnaLeehabishendta
`astliepropertyoftheirrespectiveowners, 9 Advertisers’ Index MORE == VWBPA
`
`You wantthelatest
`information security news?
`
`|
`
`
`
`
`
`
`Peter Browne Senior VicePresident
`InformationSecurity Division
`
`e
`
`es
`
`e
`
`
`
`dati
`
`>
`
`SEC
`
`i
`
`material published herein.All trademarks are acknowledged
`
`
`
`72
`
`|
`
`The name
`
`AR An, een RAL ANNY
`
`www.scmagazine.com
`
`Page 4
`
`

`

` A
`
`
`
`
`
`real-time accessis the whole pointof the exercise.In
`It’s all a questionoftrust, and secure,
`.
`es usually deploy web applications somewhat hur-
`fact, it is probablytrue to say that compani
`riedly, anxious to make newfeaturesavailable to customers. Testing for securityholes there-
`fore is usually way down thelist of priorities, not to mentionthe fact that the specialized
`expertise andfinancial resources required for suchatask is notreadily available.
`
`
`
`Doubtless, many web server deployments
`are done ona winganda prayer,butthis could
`hardly have been the case with the U.S. De-
`partmentofJustice web site whereJanet Reno's
`picture was replaced with one ofAdolph Hit-
`ler. It’s a fact oflife that network topologies
`are becomingridiculously complex and that
`the roller coaster progression of e-commerce
`as the de facto standard of conducting busi-
`ness is doing nothing to appeasethis situa-
`tion. Do wetrust the concoction of computer
`technology that enables us to engage in e-busi-
`ness? If the answeris yes, then we will not
`require anyof the networksecurity, web server
`security, intrusion detection and vulnerability
`testing, anti-virus,firewall or virtual private
`network (VPN) products currently available.
`If the answeris no, then we must embark on
`a fact-finding mission to ascertain the correct
`mix of products to protect our e-assets. The
`hardware, software, systems and applications
`that make today’s business possible have also
`transformedourpreviously safe environment
`into a veritable minefield, and by merely en-
`gagingin e-business we have becomerisk tak-
`ers extraordinaire.
`
`SC MAGAZINE March 2002
`
`Protecting applications raises the goalpost,
`presenting businesses with new challenges un-
`like those associatedwith protecting the network.
`Traditional securityproducts targeted the biggest
`threats that emerged as computer networking,
`email and web applications were adopted bycor-
`porations. These were perimeter protection
`(firewalls), network protection (network-based
`intrusiondetection)andfile-based security (anti-
`virus), and corporations purchased the products
`to solvethese security issues. But these technolo-
`gies do not address new attacks that circumvent
`existing protocolsto attack applications, or new
`content-based attacks that attack systems be-
`fore vendorsare able to release and distribute
`signaturesand other countermeasures, as pointed
`out in OKENA,Inc’s Technology Best Practices
`forIntrusion Prevention (www.okena.com).
`Here'sjust a taste ofwhat you are up against:
`changes to information in hiddenfields, e-shop-
`lifting, tampering with CGI parameters, modifi-
`cation ofdata in unencrypted cookies, planting
`malicious codein text fields, and use of debug
`options or backdoors left in applications. And
`you thoughtyou onlyhad to worry aboutdebas-
`ing the site and information theft! Changing
`
`hiddenfieldsis a good example wecan all relate
`to ifwe have merely tinkered with HTML. Of-
`ten included in web pages to maintain session
`information suchas price, hiddenfields arejust
`that, and the regular user is oblivious to them
`However,ifthe useropens the page in an HTMI
`editor, whichis easy to do, the hidden fields art
`revealed and can bealtered(if the user is mali-
`cious), enablingproblems such ase-shoplifting.
`Notwo applications are alike, and applice-
`tions that are alike are used differently by each
`organization. This moveablefeast then, needs
`something morethan traditional network secu-
`rity to captureall its foibles. These foibles, as
`outlined by KaVaDo on their web site
`(www.kavado.com/threats.htm), include ITin
`frastructure vulnerabilities and misc-
`onfigurations, third party andcustomized solt-
`warevulnerabilities, and database manipulation
`and vulnerabilities. With software bugslegion,
`it’s a battle of the patches out there.
`Exploiting
`IT
`infrastructure
`vulnerabilities is probably the easiestway to
`attack an application, as there are literally
`thousands of known vulnerabilities in the
`basic components commonlyused to set up
`
`www.scmagazine.com
`
`Page 5
`
`

`

`
`
`
`
`Version: 4.0
`Supplier: Sanctum Inc.
`Price: onapplication
`Contact: (408) 855-9500
`sanctumsales@sanctuminc.com
`www.sanctuminc.com
`
`FORThereis even an optionto hide sensitive datalike
`passwords andcredit card numbers in logfiles! It's easy
`to do andit works.
`AGAINST None.
`VERDICTThis is a massive product, and | haven't even
`scratched the surface.Itis sophisticated with an
`incredible range of services.
`
`Revert Configuration command andtry again.
`There are four configuration modesavailable
`that should cover the majority of network
`topologies. Tasks like certificate installation
`that could prove tedious if you have lots of
`web servers can be dramatically simplified
`using the copy procedure. You only need to
`install a certificate on one web server and
`merely edit the IP address andport on all
`an integrated Internet environment, This
`eaves service providers with the permanent
`subsequentservers.
`AppShield employs URL mapping, and
`ongoing task of upgrading and patching
`this could be a vital feature for readers with
`their systems to preventthose vulnerabilities
`higher than average security requirements.
`from compromisingthesecurity ofthe whole
`An embeddedreverse proxy feature, it ena-
`environment. But attackers, keeping them-
`bles you to map a route for requests received
`selves up to date with new vulnerabilities;
`through AppShield, from the requested URL
`find it extremelyeasy to penetrate the serv-
`to a different URL.This is completely trans-
`ice provider environment.
`parent to the client andits implementation
`Third party and customized software
`is extremely advantageous, the most obvious
`vulnerabilities provide attackers with endless
`being that true path information and direc-
`opportunities to penetrate systems,as creating
`tory structures are hidden.
`and maintaining asecure http-based applica-
`You can define the level of security you
`tion is a burdensometask requiring constant
`want AppShield to perform on yoursite or
`quality assurance andsecurityanalysis. Custom-
`customize your ownlevel. There are three
`izing softwaredevelopedbythird-partyvendors
`
`Features
`kkk
`predefined levels available:strict, intermedi-
`
`exposesyou both to errors madeby thesoftware
`Ease of use
`KKK
`ate and basic. These are designed by Sanctum
`
`vendorand to vulnerabilitiescreated during the
`Performance
`wk kkk
`to hit the optimal balance between ease of
`
`Documentation
`kkkkk
`customization process.
`configuration andthelevelof security desired.
`
`‘The database,being the heart of mostsys-
`Suppo
`TRI
`Whichever one you choose, you canselect an
`
`tems, is themostlucrativetargetto attack. While
`Valuefor money
`na
`enforcement modeof active or passive de-
`
`Overall Rating KK IK
`the databaseitself is usually secured,it is still
`pending upon whether you want active pro-
`open tothe application usingit. Because inmost
`tection or merely logging of securityalerts.
`cases applicationsneed to perform both read
`Mostproductsin the business of web server
`and write operations, theapplication is usually
`protection do the regulation blocking, log-
`authorized to interact freely with the database.
`ging and alertingoftheillicit activity, but
`While that problem can be addressed by care-
`AppShield goes a step further by actually
`fully defining access rights in a modestsystem,
`sending a warningto the possible perpetra-
`this approach becomes insurmountable in more
`tor that the questionable behavior has been
`complex systems. The multitude ofdifferent
`detected and recorded. AppShield is a 24/7
`interfacesand maintenance applicationsaccess-
`automated web application firewall secur-
`ing the same database militates against design-
`ing both your site and applications even if
`your site generates content dynamically or
`ingafail-safe system.
`So whatare weto doin theface ofthese new
`you continually develop and launch newap-
`vulnerabilities eloquentlydescribedbyKaVaDo?
`plications, Employing Sanctum’s patented
`Well, Okena have listed ten bestpractices that
`Policy Recognition engine, AppShield cre-
`can beappreciated by anyreader, regardless of
`ates, automatically and on thefly, rules for
`their productloyalties, They advise host-based
`legitimate behavior based on the HTML code
`protection, enforcingsecurity atthe desktops
`within the page.It is then able to check that
`and servers, wherethe actualworkis performed
`every request conformsto the specific policy
`and the potential for damageis greatest. “As
`for that user session andpage.It is also worth
`technologies such ashigh-speed networks,
`noting that AppShield is the first security
`product to achievecertification for web ap-
`switching, and end-to-endencryption aremore
`widelyadopted, providingdesiredsecurity atthe
`plication policy enforcement (WAPE) from
`networklevel becomes a major challenge.” Re-
`ICSALabs.
`gardingreal-timeprevention decisions theysug-
`The current dichotomy of e-commerce
`gest that application calls must be intercepted
`lies in the fact that at one end of the spec-
`at thekernellevel. Recognizingthat attacks have
`trum you have economic success, while at
`multiple phases, they advocate a defense in
`the other end you have an explosion of new
`
`Features
`depth, where each phase ofan attackgets a re-
`software code to keep abreast of dynamic
`
`Ease of use
`sponse,byintercepting allmajor points ofcom-
`web applications, which need constant
`
`Performance
`munication between applications and the
`patching and updating to remain secure.
`Documentation
`
`Really a web application firewall, AppShield
`underlyingsystem.
`
`Support
`Theproducts in this marketsurvey address
`secures the website by blocking anytype of
`
`Value formoney_na
`all theproblems discussed above, anda lotmore
`online application manipulation.
`
`Overall Rating Kaka
`besides. I worry sometimes though, whenI see
`L always warmto a systemthatgives you an
`product literature describing everypossibleval-
`escape route if you mess up, and AppShield
`nerability ingreatdetail,and howthey occur. Is
`has some handy escapefeatures. For example,
`this fodder for the malicioususer, or did they
`eachtime you modify theAppShield configu-
`know all ofthis already anyway?
`
`
`
`Version: 2.0
`Supplier: Entercept Security Technologies
`Price: on application
`Contact: (800) 599-3200
`sales@entercept.com
`www.entercept.com
`
`FORInstant update feature opens a secure connection
`to Entercept Security Technologies to automatically
`download updates.
`AGAINST None.
`VERDICT Easy to configure and use, providing
`excellent application and system protectionfor
`web servers.
`
`
`
`A host-based,real-time intrusion prevention
`and security enforcement system,Entercept
`
`March 2002 SC MAGAZINE Ey Page 6
`
`Page 6
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`cy SC MAGAZINE March 2002
`
`www.scmagazine.com@d@ 7q
`
`Security Manager
`with ESM for Webservers
`
`=3=
`
`3:a
`
`Version: 5.5 and 1.0
`Supplier: Symantec
`Price: on application
`Contact: (408) 253-9600
`Fax (408) 253-3968
`Www.symantec.com
`
`FORWith Live Update capabilities and secure remote
`update functionality, administrators can safely deploythe
`latest security check agents wortdwide via the Intemet.
`AGAINST None.
`VERDICT Provides a comprehensive security analysis of
`
`|
`
`
`
`work-wide intelligent agents on workstations
`| Not wishing to soundlike a schoolteacherjudging
`and servers to enforce appropriate behaviors
`'the class projects, | have honestly to say thatit
`is clever. StormWatch takesa layered approach|
`' gets increasinglydifficult to extract the best buy
`that responds to each stage of an attack
`_ and recommended productsfrom thelist. Any prod-
`lifecycle. While it proactively defends against
`‘uct attempting to tackle the needs of a complex,
`attacks at the hostlevel, it goes on to pre-
`| enterprise e-commerce environmenthasgivenit
`vent network damageif its host protectionis
`| self a tall order anyway, and a brave oneto whit.
`defeated. The StormWatchpolicy rules as-
`=
`PentaSafe's VigilEnt SecurityAgent
`signed to each server and workstationare ap-
`for Web Servers gets a Recommended
`plication-centric access control rules and are
`Award, reducing the trauma ofa ca-
`not based on usersor IDs.
`tastropheasit doesbyproviding one-
`Best Buy goes to MFX's
`click restoration of corruptedfiles, as
`WebSiteLock for its novel object
`well as being able to automatically
`code technology (OCT). OCT does a
`_ restore a corrupted website to its desired state.
`byte-by-byte comparison between a
`Proactively protecting yourservers by auditingthem
`working copy ofa file and a master
`against security bestpractices and automating the
`copy of the samefile, and if any
`managementof security, VSA for Web Servers pro-
`byte difference is detected, the workingfile is
`vides step-by-step instructions on howtofix identt-
`corrected at the byte level rather than replacing
`| fied vulnerabilities. VSA for Web Serversalso scans
`the entire file. Employing this rather than the
`_ systemsto determineifthe script mapping running
`more commonly used checksum method ensures
`onthe web server makesit vulnerable to Code Red,
`file integrity. Furthermore, WebSitel.ockliterally.
`| Code RedII and Nimda, as well as scanning your
`locks the contents of your website, and protects
`system to identify inadequate patch levels and flag-
`the files available to public users from any form
`ging youif they are not upto date.
`of tampering. As well as being an intrusion detec-
`Okena’s intrusion prevention
`
`tion system through its immediate reporting of
`StormWatch, with its patent-pend-
`Features
`
`any attack to the system administrator,
`ing INCORE technology, also gets
`Easeofuse
`
`WebSiteLock facilitates an immediate and au-
`a Recommended Award. Its ap-
`Performance
`
`tomatic rebuild of any damagedordeletedfiles
`proach ofprotecting againstuni-
`Documentation
`
`with the original files.
`dentified threats by applying net-
`Support
`
`Valveformoney_1
`Overall Rating KKK
`
`viewed, andanyservice related to an applica-
`Web Server Edition is designed to protect
`tion is protected from being stopped, modi-
`both OS resources and webserver applica-
`Enterprise Security Manageris a comprehensive,
`fied or deleted. Only certain processes are given
`tions. It does so using three components —
`policy-based security assessment and manage-
`access to datafiles, while an application’s reg-
`agents, console and a database of signatures
`ment toel, which intelligently assesses network
`istry settings are protected from modification
`and behavioral rules—while the server is the
`vulnerabilities with over 1,500 security checks,
`at the process level. User settings defined by
`conduit of communication between these
`on WindowsNT4.0, 2000, XP, Solaris, HP-UX,
`an application cannotbe changed ordeleted,
`components.
`AIX, Linux, IRIX, Digital UNIX, NetWare,
`and any vulnerability in an application that
`Agents are installed on each host you
`Sequent and VMS. ESMsecurity checks provide
`might allow remote access to the system is
`wantto protect, forming a protective layer
`protectioninthree key areas —user accounts and
`blocked. Finally, protected applications are
`around the host operating system, provid-
`authorizations, networkandserversettings,file
`prevented from being misused to make unau-
`ing application-specific protection and
`systems anddirectories.It takes the approach of
`thorized changesto the system.
`monitoring the http data stream. Like most
`managingsecurity through vulnerability assess-
`You are free to configure four aspects of
`similar products, any requests to the operat-
`mentandpolicy compliance, from a central con-
`the Entercept system:signatures,security poli-
`ing system are matchedagainst the database
`sole and/or delegate control over sections to
`cies, exceptions and notifications. Four secu-
`of knownsecurity breaches and malicious
`different individuals, even over the Internet.
`rity levels categorize signatures, and while they
`behavior. Legitimate ones are passed on for
`Like someother vulnerability checking prod-
`comeas default you can change them to suit
`processing, while suspected malicious re-
`ucts in this market survey ESM checks multiple
`your particular environment. Info indicates
`quests are handled according to user-defined
`systems simultaneously for deviations fromse-
`changes to the system configurationthat usu-
`security policies.
`curitypolicies, such as missing OSpatches, inap-
`ally occur during normal systemactivity, but
`Thereis a distinct advantage thoughto the
`propriate user passwordsettings, unauthorized
`theoretically could create a benignsecurity hole.
`way the agentshields the configuration and
`privileges, incorrectfile access, changesto secu-
`Lowindicates a modification that may be in-
`resources of specified applications. Having
`rity settings, and incorrect systemconfigurations.
`dicative ofsuspicious behaviorthat mightcre-
`scannedthe hostto find the applicationsit is
`Vulnerability checking and policy complianceis
`ate a more serious security hole. Medium
`designedto protect, the agentcreatesa set of
`an automatedaffair forall systems across the
`indicates a knownattack or highly suspicious
`rules for each application. Onceaset of rules
`enterprise from a single location. This means
`behavior with low to mediumrisk, while High
`is created,it becomespart of the agent’s data-
`automatically measuring security on servers,
`indicates a knownattack or malicious behavior
`base and functionsjustlike a signature. The
`workstations, routers, hubs, applications, and
`posing a serious threat to the system.
`most important advantage of this system is
`even databases.
`Agents will respond to security events
`that applications are protected from unknown
`While ESM focuses on network resources
`based upontheirsecurity policy, and there
`as well as knownattacks, making them more
`and the policies appliedto protect those resources,
`are four possible responses — ignore, log,
`difficult to subvert.
`ESMforWebservers, a modulethat sits ontop of
`prevent or terminate. Of course, some seem-
`Sevenareasofapplicationactivity are moni-
`ESM,uses a network-based assessmentapproach
`ingly serious security alerts may be just some-
`tored and these are worthlisting because they
`to actively examine webservers in an enterprise.
`body doing a routinetask, and you can invoke
`showthe impressivelevel of protection at the
`Itthen reports the vulnerabilities it finds on the
`the exception function to override a secu-
`application level. Programfiles are protected
`ESM Enterprise Console. Each of the 270+ se-
`rity policy in this instance.
`from being modified, deleted, or in some cases
`
`Page 7
`
`

`

`
`
`eServer Secure
`
`
`
`Version: 2.1
`Suppiler: Turillion Software Technologies
`Price: onapplication
`Contact: (800) 604-3228
`sales@turillion.com
`www.turillion.com
`
`FOR Reducesthe maintenance costs and considerable
`downtime associated with system patching and testing.
`AGAINST None.
`‘VERDICT Ifyou wanttoconcentrate onrunningan&
`
`security intricacies,then eServerSecures perfectforyou.
`
`ofweb server security— CGIscript vulnerabilities,
`malicious web-based attacks by monitoring web
`ftp utilities vulnerabilities, andbastion hostserv-
`requests directedat protected servers and scan-
`ices vulnerabilities. In short, the ESM for
`ning for maliciouspatterns.It detects, logs, and
`Webservers module extends Enterprise Security
`controls IIS webserver requests based on a user-
`Manager's security policy compliance and vul-
`defined security policy. Somewhatsimilar to
`nerability assessmentcapabilities, providing ad-
`VigilEnt Security Agent for Web Servers, eServer
`ditional valuable information about the web
`Secure provides protection and control access
`withoutrequiring youto install frequent vendor
`servers in your enterprise network.
`[tisimportant to understandthatit is purely
`security hotfixes and patches. Security, adminis-
`an additional module and does not replace any
`trative andactivitylogging are provided,as well
`as remote log viewing, remotead ministration,
`of the ESM features or perform operating sys-
`temsecurity checks. An ESM Agent installed on
`and email-alert notification. The main benefit
`4 webserverwill cater for about80 percent ofall
`ofthis type ofsystem is that it reduces the main-
`necessarysecurity checksrelatingto thewebserv-
`tenance costs and considerable downtime asso-
`er’s operating system and patch levels, while an
`ciated with systempatching andtesting,
`Easy to navigate, with an intuitive GUI,
`installation of ESM for Webserversfills the gap,
`providingadditional security checksspecifically
`thestatistics tab displays information on a wide
`pertaining to web servervulnerabilities.
`array of security activity, allowing administra-
`ESM for Webservers need only be in-
`tors to view serveractivity statistics and verify
`security configurationsin real time,as well as
`stalled ona single host thatis already run-
`ning an Enterprise Security Manager Agent,
`the currentstatus of the serveritself. You can
`clearly sce the most recent attempted attacks,
`and that Agent then conducts assessments
`over the network. A license will be needed
`includingdate, time, source IP and attack sig-
`nature. When maliciousactivity is detected,
`for each web server to be scanned. This
`Features
`ss
`kkkkk
`
`Agentwill still communicate with the ESM
`eServer Secure can respond ineither of two
`Easeofuse
`KKKKK
`
`ways — deny the malicious request and close
`Manager, but it is not mecessary for themto
`Perfomance
`i kek
`
`be installed on the same system. So, the
`the connection, or deny the malicious request
`Documentation
`KKKIK
`
`bottom line is that ESM for Webservers is
`and redirect it, The recent audit events view
`Suppor_
`KRKKK
`
`lists the most recent administratoruser activ-
`installed on the ESM Windows NTAgent,
`Valueformoney.
`n/a
`:
`
`ity, including changes to the security policy,
`but it can also access web servers running
`
`Overall Rating KKK
`on Windows 2000, UNIX and Linuxplat-
`userlogins, etc., while the recent system events
`forms. Utilizing both Enterprise Security
`
`
`Or eMail us at contact@e-dmzsecurity.com
`
`oe a a a
`(a
`Information
`Security
`WAAG
`
`e-DMZ
`
`@-DMZ Security offers the strongest
`combination of security and availability at
`the best cost. Based on experience gained in
`the financial services sector, our solutions
`have a proven record for stability and scale.
`Using our highly automated approach, we
`can deliver world class service at prices well
`below the industry average. This is the result
`of experience meeting ingenuity.
`
`NOW OFFERING:
`‘we Managed Firewall Service
`tj) Managed Unix Security Service
`ts) Professional Security Services
`
`To find out more,
`Call us at 302-793-4984
`Go to our WebSite: www.e-dmzsecurity.com
`
`
`
`Page 8
`
`

`

`
`
`security, the AdminStealth utility conceals the
`administrator GUI from non-adminstaff.
`Again, like VigilEnt Security Agent for
`Web Servers, eServer Secure is designed to
`counteract the damage donetoIIS servers
`by the likes of Nimda and Code Red,and in
`fact it gives instant, out-of-the-box protec-
`tion from these. Web-based remote admin-
`istration capabilities eliminate the need for
`additional workstation software to admin-
`ister the eServer Secure application. Author-
`ized and unauthorized administration
`activities, including specific changes to the
`active security policy, are logged, while the
`DynamicAlerts feature reduces the numberof
`alert emails you receive during Internet-wide
`webserver attacks automatically. This is made
`possible through thresholds configurablealerts,
`ensuring that youonly receive email alerts that
`are valid and absolutely necessary.
`Email alerting is obviously a vital component
`in a productlike this, but ifyou have networking
`problemsall is notlost. Mail queuedelivery will
`tell eNotify whether or not to temporarily store
`alerts to file if the mail server is unreachable.
`Whendisabled, eNotify will continue reading
`the eventlog, but will dropalertsif it can’t send
`them to the mail server. When enabled, eNotify
`will save alerts to disk and send them all in a
`single consolidated message whenthe mail server
`resumes operation.
`
`iChain
`
`
`
`
`
`
`
`Windows NT/2000
`
`
`Version: 2.1
`Supplier: KaVaDo,Inc.
`Price:
`from $15,000
`Contact: (800) 239-3203
`sales@kavado.com
`www.kavado.com
`
`FOR/nterDois easyto install, highly scalable,flexible,
`and can support numerousapplications simultaneously
`without any modifications to the applications
`themselves.
`AGAINST None.
`VERDICT /nterDo delivers comprehensive and
`adaptable applicatiomayer security, and its open
`architecture is designed to meet the unforeseen security
`needsofthe future.
`
`Features
`Ease of use
`Performance
`Documentation
`Support
`Value for money
`Overall Rating
`
`"
`
`suppliers. The bigger youare, the more applica-
`tions, systems, networks and platformsyou will
`have.It’s a jungle outthere, but it’s a revenue-
`generating one and you wantto keepit that way,
`so you need an all-encompassing gatekeeper to
`guard youronlineassets andtransactions. iChain
`is one productthat is suitable for a complex,
`enterprise e-commerce environment, allowing
`you to secure your web-based activities, control
`user access, and provide usersingle sign-on to
`virtually all web-basedapplications and content.
`Its proxy serverreplaces the regular web server as
`the public interface to a customer’s website, con-
`sequently adding an extra layer of security to
`yournetwork.
`As a key componentof Novell’s access man-
`agementsecurity solutions, {Chain can tamethe
`complex enterprise beast by creating a security
`infra

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket