Risk
1/17/2009
08:02 AM
Randy George
Randy George
Commentary
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

5 Ways To Stretch Your 2009 Security Budget

The economy stinks, and as usual, IT is under more pressure than ever to do more with less. While budgets shrink, the complexity of keeping your data safe grows. With some creativity, you can do more with what you have, or in some cases, add necessary new capabilities on the cheap. Here are some of my ideas on where to start.

The economy stinks, and as usual, IT is under more pressure than ever to do more with less. While budgets shrink, the complexity of keeping your data safe grows. With some creativity, you can do more with what you have, or in some cases, add necessary new capabilities on the cheap. Here are some of my ideas on where to start.As CFO's put more pressure on you to spend on projects that directly impact revenue generation, traditional capital investments in network infrastructure and security will certainly suffer during FY 2009. But in much the same way we all need to be on the lookout for bargains on the home front in this environment, Enterprise IT can find good deals with "Good Enough" capabilities for pennies on the dollar when compared with brand names.

Here's 5 ways to do more with what you have or add new capabilities to your security mix on the cheap.

1) Network Behavioral Analysis: NBA Tools are gaining traction as a way to detect and prevent malicious activity as a result of viruses, malware, and hacks. In addition, behavioral tools are particularly useful for gathering analytics about on how various applications are performing, and as such, are more often becoming a must-have diagnostic tool for troubleshooting performance problems. Unfortunately, high-end NBA tools can be expensive, and smaller shops frankly don't need all of the features that come with large enterprise offerings.

Luckily, the small- and medium-sized business can do quite a bit of troubleshooting and information gathering with a simple NetFlow sensor. Most L2/L3 switches and routers sold today support sending detailed packet information via NetFlow, sFlow, or JFlow to a flow collector for analysis. While I'm not endorsing any particular product, here are a few value-oriented tools that can do the job for short money. PacketTrap's Perspective - $1,495 http://www.packettrap.com/product/index.aspx PTRG Network Monitor - $295 for 100 sensors http://www.paessler.com/netflow_monitoring SolarWinds Network Engineers Toolset - $1,395 http://www.solarwinds.com

2) Use your spam filter more pervasively for data loss and PCI/HIPAA compliance. Increasingly, enterprise spam appliances are incorporating better content awareness into their products. If you're worried about PCI or HIPAA compliance via e-mail, ask your vendor if it supports policy-based filtering when credit card or Social Security data is passed through your mail gateway unencrypted. You might be surprised to learn it already does.

3) Use your firewall to its fullest capabilities: There are plenty of folks out there shopping for expensive malware prevention tools, but before you open your wallet, look inward. If you own a Check Point firewall, for example, are you subscribing to SmartDefense and using it to its fullest capabilities? You may find that you can do quite a bit more with your gateway defenses than you originally thought. Instead of buying another appliance, check with your firewall vendor to see whether or not your existing investment can be extended with inexpensive software upgrades.

4) Running virus protection directly on your Exchange server. This one perplexes me. I'm amazed at how many people are still running GroupShield and GFI-like products directly on their mailbox servers. Many enterprise spam filters utilize multiple virus scanning engines for redundancy, so why pile on another bloated layer of overhead onto one of your most important servers? If you're an SME with 50 mailboxes, fine, but otherwise, save the licensing and annual maintenance fees for other projects.

5) Data Loss Protection: The DLP space is heating up, and I'm getting the lab ready to kick off a comprehensive Rolling Review on the leading products in this area now. On the surface, DLP promises to redefine the way that we protect our most critical asset, our data. Of course, few have the need, or budget, to implement DLP on a grand scale next year. For SME's, you can get a leg up by maximizing the protection that your gateway tools afford you, while using a combination of cheaper endpoint protection tools in tandem with your existing virus protection, e-mail filter, firewall, NAC/NAP/NBA or SEIM tools.

How are you getting creative with your limited budget for next year? Reply to the community here and share your ideas!

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: good one 
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2001-1594
Published: 2015-08-04
GE Healthcare eNTEGRA P&R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P&R user account, (5) insite for the WinVNC Login, an...

CVE-2002-2445
Published: 2015-08-04
GE Healthcare Millennium MG, NC, and MyoSIGHT has a default password of (1) root.genie for the root user, (2) "service." for the service user, (3) admin.genie for the admin user, (4) reboot for the reboot user, and (5) shutdown for the shutdwon user, which has unspecified impact and attack vectors.

CVE-2002-2446
Published: 2015-08-04
GE Healthcare Millennium MG, NC, and MyoSIGHT has a password of insite.genieacq for the insite account that cannot be changed without disabling product functionality for remote InSite support, which has unspecified impact and attack vectors.

CVE-2003-1603
Published: 2015-08-04
GE Healthcare Discovery VH has a default password of (1) interfile for the ftpclient user of the Interfile server or (2) "2" for the LOCAL user of the FTP server for the Codonics printer, which has unspecified impact and attack vectors.

CVE-2004-2777
Published: 2015-08-04
GE Healthcare Centricity Image Vault 3.x has a password of (1) gemnet for the administrator account, (2) webadmin for the webadmin administrator account of the ASACA DVD library, (3) an empty value for the gemsservice account of the Ultrasound Database, and possibly (4) gemnet2002 for the gemnet2002...

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!