Risk
2/15/2011
11:36 AM
Connect Directly
RSS
E-Mail
50%
50%

Symantec Intros Endpoint Protection 12

Client-side security software for SMBs will utilize cloud-based data to identify mutating malware and other rapidly changing threats, Symantec says.

12 Money Saving Tech Tips For SMBs
(click image for larger view)
Slideshow: 12 Money Saving Tech Tips For SMBs

Symantec on Tuesday announced version 12 of its Endpoint Protection and Endpoint Protection Small Business Edition (SBE) software. Both will be released this summer, with a public beta beginning in April.

The new versions will leverage Symantec's Insight technology to identify and protect against mutating malware and other threats as they change and adapt, based on information from the 2.5 billion files that Symantec "sees" across its cloud-based database of 175 million endpoints.

"Think of [Insight] as an algorithm, but it's an algorithm that's based on a pretty large sample size," said Blake McConnell, senior director of product management at Symantec, in an interview. "Insight will put files into context: What is the age of that file? What is the frequency or prevalence? What is the source or location? Where was that file created? What are the behaviors or associations of that file?"

McConnell said that the concept of context is critical because it enables Symantec to block potential threats before they're actually identified in the digital landscape. "The 'today problem' is around malware mutations that are generated from attack toolkits," McConnell said. In other words: Although traditional signature-based protection is still in place, it is no longer enough.

Executables and other files are rated for risk by Symantec -- these ratings are preconfigured for SBE, while midsize and larger customers set their own comfort levels with various potential threats. McConnell added that although the SBE comes with more preconfigured options out of the box, customers can modify those settings if they wish. SBE targets firms with 5-99 employees or endpoints, while the flagship is geared for 100 or more seats.

Insight won't scan "known good files," meaning it can skip 70% of files on typical systems, according to Symantec.

"That clearly has a dramatic impact on scan time and scan overhead," McConnell said, adding that idle-only scans also help boost system performance. "We don't even want the user to know we're there."

Planned updates for version 12 also include Mac support and Sonar 3, Symantec's behavioral engine. If Insight is the lock on the front door, Sonar is the hall monitor -- it enforces policy-based behavioral rules. McConnell notes that while the composition of a malware file might change on the fly, its goal does not.

"People who are looking to steal passwords are still looking to steal passwords. Spambots are still looking to do spam," McConnell said. Sonar goes looking for evidence of the bad seeds, such as keystroke logging or changes to the homepage of a Web site. "[Sonar] will ask behavioral questions: 'What has [the file] done?"

McConnell shares the view that small and midsize businesses (SMBs), though perhaps less likely to be the victim of headline attacks such as Stuxnet or the Nasdaq hack, are increasingly at risk for malware infections, particularly because of the rise of attack toolkits.

"What we tend to see more of [with SMBs] is the impact that these attack toolkits have had on the amount of malware that is in the market, " McConnell said, adding that the boom in quantity was a key driver of Endpoint Protection's reputation-based and behavior-oriented enhancements. "No one -- Symantec or others -- will be able to keep up with that amount of malware with a classic signature business."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3090
Published: 2014-09-23
IBM Rational ClearCase 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.

CVE-2014-3101
Published: 2014-09-23
The login form in the Web component in IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 does not insert a delay after a failed authentication attempt, which makes it easier for remote attackers to obtain access via a brute-force attack.

CVE-2014-3103
Published: 2014-09-23
The Web component in IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http...

CVE-2014-3104
Published: 2014-09-23
IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.

CVE-2014-3105
Published: 2014-09-23
The OSLC integration feature in the Web component in IBM Rational ClearQuest 7.1 before 7.1.2.15, 8.0.0 before 8.0.0.12, and 8.0.1 before 8.0.1.5 provides different error messages for failed login attempts depending on whether the username exists, which allows remote attackers to enumerate account n...

Best of the Web
Dark Reading Radio