03:55 PM

CoreTrace Bouncer Improves Application Whitelisting

The Bouncer client enforces a whitelist of approved applications at the kernel level and provides list administration through a central management application.

To help companies, especially small-to-midsize businesses where IT time is a scarce, precious resource, improve the security of their endpoint computers, security vendor CoreTrace has added new administrative and usability features to version 6.0 of its flagship application whitelisting product Bouncer.

Unlike blacklisting, used by traditional anti-virus/spam/malware filtering attempting to build a list of "known or suspected bads" to match against, whitelisting builds a list of "known good/allowed." The Bouncer client running on each endpoint enforces a whitelist of approved applications at the kernel level; the central management application aggregates and administers these policy lists.

"If used correctly, it's an order of magnitude more secure than other solutions, like firewalls, or scanning using signatures and heuristics, in terms of blocking rogue programs," says Toney Jennings, president and CEO of CoreTrace.

Although Bouncer is primarily intended for enterprises with at least several thousand users, "We have some customers in verticals with just a few hundred to a few thousand endpoints," says Jennings. "We are seeing traction from law firms, who are more aware of this approach and have lots of mobile endpoints, and also from medium-sized technology companies. It depends on the pain they feel from blacklisting."

Bouncer isn't just for machines used by professionals and other knowledge workers, according to Jennings; it's also useful for more static environments like call centers and ATM machines which have maintenance windows where changes have to be allowed, or where security utilities like anti-virus have to be turned off during maintenance without violating their security paradigms.

Bouncer was originally introduced two years ago; 6.0 is, according to CoreTrace, a "marquee upgrade," that is, a major revisions. "We're focus sing on making whitelisting easy to use, for users to selectively allow or request programs they need to use so the request and approval process doesn't interfere with productivity. We've made it easier for IT to manage, and for users to use or request permissions when needed." For example, Bouncer can be set to allow program patchers and updates to run, to let specific users or groups of users to give themselves short-term permission to use a program while IT evaluates it, while requiring other users or groups to wait until a program is whitelisted for their use.

"Bouncer is helping make application whitelisting more usable for companies of all sizes, including SMBs, both from the user side and the IT admin side, by making the process automatic and more flexible," says Mike Rothman, President of Secuosis, an independent research firm specializing in information security. "Bouncer 6.0's whitelisting provides a middle ground between totally locking down a machine and total freedom, giving administrators a few more ways to tailor the user experience. They can now tailor polices to the user constituencies."

New features in version 6.0 of Bouncer include:

--Bouncer's management component now runs as a virtual machine under VMware, versus living on a physical appliance.

--CoreTrace Software Intelligence (CSI) "Application Intelligence," which provides IT administrators with organization-wide information about installed/requested applications, such as how many copies are installed, how many copies are being used, and tags the application list with "known good" and "known bad" (programs known to be malware).

--BlockQ and AllowQ options for user privileges, to reduce the amount of IT time involved.

For users set by IT with BlockQ, if a user tries to run an application not currently allowed by Bouncer, BlockQ users get a pop-up asking them to enter their business reason for wanting to use that application; these requests are forwarded to IT for approval/disapproval. Users assigned to AllowQ are presumably more computer-savvy or otherwise reliable; while getting a similar pop-up, are allowed to temporarily run applications that aren't already on their whitelist.

Other new features in Bouncer 6.0 include:

--Greater security, including memory protection, script controls, malware removal and self-defending endpoints.

--Using Open-Source and industry-standard architectural components, and shipping as a virtual appliance, to improve deployment and scalability.

--Adding a client API, for easier integration into third-party management systems.

CoreTrace currently has a Bouncer client for use on Windows; according to Jennings, clients for other environments -- Linux and Mac -- are scheduled for later in 2010. The Bouncer client can function autonomously; that is, even when it cannot communicate with the management component. "It will still protect the endpoint, using the last known policy, and cache logs until it reconnects."

According to CoreTrace, Bouncer 6.0 will ship in August 2010, with pricing starting at $35 per desktop. The company is also looking for channel partners who will offer "Bouncer On Demand" as a cloud service.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
DNS Threats: What Every Enterprise Should Know
Domain Name System exploits could put your data at risk. Here's some advice on how to avoid them.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.