Still, Koetzle stresses that network security is a three-legged stool supported by people, process and technology. All three legs must be in place for the stool to stand. Even when good technology is in place and security processes have been outlined, it’s generally people who topple the stool.
Consider Trojan horses. No matter how many times employees are told not to download e-mail attachments, it’s usually just a matter of time before someone succumbs to curiosity and opens a file that, unbeknownst to them, is actually a snooping application.
Corporate PC users probably know they are not supposed to download unauthorized applications but the lure of a cute holiday greeting, a revealing video of the tabloid celebrity du jour — or even just a seemingly useful application — is often too great to resist.
In such situations, new technology solutions that seek to protect networks from human error may be the best solution. Such programs won’t stop corporate PC users from making mistakes, but they will help to keep those mistakes from taking down the network.
For example, Confidence Online from WholeSecurity of Austin helps prevent password theft even when an employee makes the mistake of downloading a Trojan, keystroke logger or other remote control devices.
Unlike computer security products that continually update lists of known e-mail threats, Confidence Online analyzes software activity and network connectivity for threats. If suspicious activity is detected — say, an application taking screen captures or setting up a new user ID — Confidence Online terminates that program before personal or corporate information can be stolen.
“WholeSecurity is a good example of protecting yourself when an employee shows up with an infected laptop and tries to log on to the network,” Koetzle says.
More New Products
Another example comes from Sana Security of San Mateo, Calif. It’s Primary Response product doesn’t wait for updates from virus companies in order to stop a network virus. Instead, Primary Response monitors an application’s normal behavior and then watches for anything that breaks away from the norm. This way, even when an employee mistakenly sets a virus in motion, it can be caught and stopped.
Gartner put Sana Security and WholeSecurity both on its “Cool Vendors in Security and Privacy” list in March this year, naming the two firms among 11 vendors that “offer innovative technologies and products that address wide-ranging security issues.”
WholeSecurity’s Confidence Online “does not rely on signatures such as anti-virus products,” writes John Girard, vice president and research director at Gartner. “Instead, it uses heuristics to identify software and shuts it down before damage can be done. WholeSecurity is particularly effective as a ‘day zero’ defense against new or undocumented worms.”
Commenting on Sana’s product, Richard Stiennon, a research vice president at Gartner, writes “Primary Response rapidly learns what is normal, then, in block mode, prevents abnormal system calls from working. This is proven technology and is a new variation on approaches taken by Okena and Entercept.”
For other examples of new and upcoming products that account for human mistakes, Forrester’s Koetzle points to a group of hardware products — from firms such as Check Point Software, Perfigo, Vernier Networks and Enterasys Networks — that quarantine viruses before they can take a network down.