HoneyPoint Security Server Gets Easier & More Powerful

For more than a year and a half now we have been traveling the world, talking about HoneyPoints and the fundamental change that this technology represents to providing internal network security and threat detection. What a long road it has been…

Over the last 18 months, we have had an incredible amount of success in capturing emerging theats, helping companies spot compromises and evaluate their attackers. We have learned a lot about internal attack motivations and mechanisms and we have seen first-hand the power of HoneyPoints to really free organizations from the overhead and false-positive nightmares that signature-based Intrusion Detection has come to represent.

Today, we take another step forward. Today, we are proud to announce the availability of the newest version of HoneyPoint Security Server. Based on client feedback and expert security insight, we have evolved the basic HoneyPoint premise to a new level. Today’s release includes a complete re-write of the console and further expands our ability to integrate into existing monitoring and SIM infrastructures as well as offering organizations without SIM a robust and full lifecycle HoneyPoint event management system!

The new console features a back-end database with roles and event management plus it also includes integrated trending and reporting. The new plugin interface, included with the release, allows users and MSI to design new and exciting features for event management, automated responses and alerting without changes to the core code – or the need for upgrades. Centralized ignore host configuration, HoneyPoint inventory and enhanced event clarity are also key points of refinement in the new version.

But, among the most exciting news about this new HoneyPoint release, is the availability of new, deeper HoneyPoints for emulating additional services and applications. New HoneyPoints, console plugins and configurations are planned over the next few weeks as MSI continues to increase the power and flexibility of the product.

Stay tuned for some new information about online resources, newly available tools and other supporting materials as they emerge over time. Our plan is to continue to spread the word, evangelize this change in tactics and to keep telling the world that there is a better way to secure your internal networks – without management overhead and without the false postives that keep you from focusing on your real threats.

To find out more about version 2 of HPSS or more about why we truly believe that we ARE going to “change the world”, simply give us a call or drop us line. We would be happy to share the message with you!

Laptops: the BIG Threat to Information Security

Aren’t laptops great?! They’re small and easy to handle. You can take them anywhere, and they’re fast and powerful enough to do just about anything you want! And how about the other, even more convenient portable devices like PDAs and Internet capable cell phones? Fantastic! You can download files, email people wirelessly, get your work done while waiting to tee off at the golf course, all kinds of wonderful things. But from a business information security standpoint, they are D A N G E R O U S!!!

Now, you might say to me: “But I have a personal firewall and regularly updated anti-virus software on my laptop. I’m very careful about what I upload and download onto it – nothing but approved corporate software applications. And when I communicate business matters on my laptop, I establish my connection securely and use a tunneling transmission protocol that’s strongly encrypted from end to end. You aren’t talking to ME!” And you’re right – all that is very correct and laudable! But is that all you need to do?

A professor at THE Ohio State University just recently had his home burglarized. He lost some jewelry, a shot gun….and two laptops loaded with the personal private information of lots of chemistry students and post graduates! There was federal grant information on there too. This is a MAJOR problem. All of those folks are now subject to identity theft, so they and Ohio State will have to monitor their credit very closely for a long time. And even then, they may never be sure if their information was truly compromised or not. So maybe they get complacent after awhile, and then, years down the road, BAM! They’re nailed! And since they are undoubtedly going to be very angry about this, they are going to do their best to sue you, and if that doesn’t work out, they are at least going to bad mouth your organization to everyone that will listen. And what if the database you lose has the information of tens of thousands or even millions of people on it? You have problems that may never go away. And these kinds of laptop losses occur on an alarmingly regular basis. We’ve all heard about it on the news.

The point of this is, no matter how securely you install and transmit your information on portable devices, you always have to keep physical security in mind. But you might say to me, “Well, I never let my laptop out of my sight when I’m traveling. I have a laptop security cable I use religiously. I don’t leave my laptop in my hotel room, and if anyone gets a hold of it anyway, it takes a password to log onto my computer.” Unfortunately, these kinds of security measures, while essential, are not foolproof or even that difficult to circumvent.

So what is the answer? Encrypt your sensitive data! Encrypt it well, and encrypt it anytime you are not actively using it. A hassle? You bet! But this is the only reliable way I know of to keep thieves from viewing your data. And every year encrypting your data is becoming more of a trivial exercise. Use PGP for example, or encrypt using WinZip – they have 256 AES available. That way, even if attackers get your portable device and bypass the access security all they are left with is a bunch of babble. Then maybe you and your organization might not make the evening news like so many unfortunates organizations have before!

**Editor’s Note: This article was written with a focus on smaller organizations with limited IT resources. Organizations who feel they can support it should also consider options for whole disk encryption, or perhaps research some of the emerging drive specific encryption and access controls just becoming popular. However, in our experience, these controls and tools vary widely in their effectiveness, feature sets and ease of use. In many cases, whole disk encryption and some emerging technology solutions for this problem may be too resource intensive for many smaller organizations to manage.  — The Editor

Web Scans on the Increase

Over the last few weeks we have measured a fairly slow, but steady increase in the amount of general web site scanning. More and more often, our HoneyPoint systems are identifying PHP scans, scans for older vulnerabilities dating back to Nimda and Code red and a slew of newer scans for specific bulletin board, blog management and other web-based application code.

These scans are appearing from a number of locales and appear to be mostly automated. Their sources appear to be from mostly compromised systems on small to mid-sized company networks.

As these scans increase in frequency and capability, it is essential that organizations ensure that they have secured their web servers against common known vulnerabilities. There are a number of tools such as nikto, Sandcat and others or available services to scan sites for little or no charge. Organizations should utilize these tools or their existing managed vulnerability assessment services to ensure they are protected against these common worm-style attacks.