Risk
1/17/2009
08:02 AM
Randy George
Randy George
Commentary
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

5 Ways To Stretch Your 2009 Security Budget

The economy stinks, and as usual, IT is under more pressure than ever to do more with less. While budgets shrink, the complexity of keeping your data safe grows. With some creativity, you can do more with what you have, or in some cases, add necessary new capabilities on the cheap. Here are some of my ideas on where to start.

The economy stinks, and as usual, IT is under more pressure than ever to do more with less. While budgets shrink, the complexity of keeping your data safe grows. With some creativity, you can do more with what you have, or in some cases, add necessary new capabilities on the cheap. Here are some of my ideas on where to start.As CFO's put more pressure on you to spend on projects that directly impact revenue generation, traditional capital investments in network infrastructure and security will certainly suffer during FY 2009. But in much the same way we all need to be on the lookout for bargains on the home front in this environment, Enterprise IT can find good deals with "Good Enough" capabilities for pennies on the dollar when compared with brand names.

Here's 5 ways to do more with what you have or add new capabilities to your security mix on the cheap.

1) Network Behavioral Analysis: NBA Tools are gaining traction as a way to detect and prevent malicious activity as a result of viruses, malware, and hacks. In addition, behavioral tools are particularly useful for gathering analytics about on how various applications are performing, and as such, are more often becoming a must-have diagnostic tool for troubleshooting performance problems. Unfortunately, high-end NBA tools can be expensive, and smaller shops frankly don't need all of the features that come with large enterprise offerings.

Luckily, the small- and medium-sized business can do quite a bit of troubleshooting and information gathering with a simple NetFlow sensor. Most L2/L3 switches and routers sold today support sending detailed packet information via NetFlow, sFlow, or JFlow to a flow collector for analysis. While I'm not endorsing any particular product, here are a few value-oriented tools that can do the job for short money. PacketTrap's Perspective - $1,495 http://www.packettrap.com/product/index.aspx PTRG Network Monitor - $295 for 100 sensors http://www.paessler.com/netflow_monitoring SolarWinds Network Engineers Toolset - $1,395 http://www.solarwinds.com

2) Use your spam filter more pervasively for data loss and PCI/HIPAA compliance. Increasingly, enterprise spam appliances are incorporating better content awareness into their products. If you're worried about PCI or HIPAA compliance via e-mail, ask your vendor if it supports policy-based filtering when credit card or Social Security data is passed through your mail gateway unencrypted. You might be surprised to learn it already does.

3) Use your firewall to its fullest capabilities: There are plenty of folks out there shopping for expensive malware prevention tools, but before you open your wallet, look inward. If you own a Check Point firewall, for example, are you subscribing to SmartDefense and using it to its fullest capabilities? You may find that you can do quite a bit more with your gateway defenses than you originally thought. Instead of buying another appliance, check with your firewall vendor to see whether or not your existing investment can be extended with inexpensive software upgrades.

4) Running virus protection directly on your Exchange server. This one perplexes me. I'm amazed at how many people are still running GroupShield and GFI-like products directly on their mailbox servers. Many enterprise spam filters utilize multiple virus scanning engines for redundancy, so why pile on another bloated layer of overhead onto one of your most important servers? If you're an SME with 50 mailboxes, fine, but otherwise, save the licensing and annual maintenance fees for other projects.

5) Data Loss Protection: The DLP space is heating up, and I'm getting the lab ready to kick off a comprehensive Rolling Review on the leading products in this area now. On the surface, DLP promises to redefine the way that we protect our most critical asset, our data. Of course, few have the need, or budget, to implement DLP on a grand scale next year. For SME's, you can get a leg up by maximizing the protection that your gateway tools afford you, while using a combination of cheaper endpoint protection tools in tandem with your existing virus protection, e-mail filter, firewall, NAC/NAP/NBA or SEIM tools.

How are you getting creative with your limited budget for next year? Reply to the community here and share your ideas!

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.