Risk
2/15/2011
11:36 AM
50%
50%

Symantec Intros Endpoint Protection 12

Client-side security software for SMBs will utilize cloud-based data to identify mutating malware and other rapidly changing threats, Symantec says.

12 Money Saving Tech Tips For SMBs
(click image for larger view)
Slideshow: 12 Money Saving Tech Tips For SMBs

Symantec on Tuesday announced version 12 of its Endpoint Protection and Endpoint Protection Small Business Edition (SBE) software. Both will be released this summer, with a public beta beginning in April.

The new versions will leverage Symantec's Insight technology to identify and protect against mutating malware and other threats as they change and adapt, based on information from the 2.5 billion files that Symantec "sees" across its cloud-based database of 175 million endpoints.

"Think of [Insight] as an algorithm, but it's an algorithm that's based on a pretty large sample size," said Blake McConnell, senior director of product management at Symantec, in an interview. "Insight will put files into context: What is the age of that file? What is the frequency or prevalence? What is the source or location? Where was that file created? What are the behaviors or associations of that file?"

McConnell said that the concept of context is critical because it enables Symantec to block potential threats before they're actually identified in the digital landscape. "The 'today problem' is around malware mutations that are generated from attack toolkits," McConnell said. In other words: Although traditional signature-based protection is still in place, it is no longer enough.

Executables and other files are rated for risk by Symantec -- these ratings are preconfigured for SBE, while midsize and larger customers set their own comfort levels with various potential threats. McConnell added that although the SBE comes with more preconfigured options out of the box, customers can modify those settings if they wish. SBE targets firms with 5-99 employees or endpoints, while the flagship is geared for 100 or more seats.

Insight won't scan "known good files," meaning it can skip 70% of files on typical systems, according to Symantec.

"That clearly has a dramatic impact on scan time and scan overhead," McConnell said, adding that idle-only scans also help boost system performance. "We don't even want the user to know we're there."

Planned updates for version 12 also include Mac support and Sonar 3, Symantec's behavioral engine. If Insight is the lock on the front door, Sonar is the hall monitor -- it enforces policy-based behavioral rules. McConnell notes that while the composition of a malware file might change on the fly, its goal does not.

"People who are looking to steal passwords are still looking to steal passwords. Spambots are still looking to do spam," McConnell said. Sonar goes looking for evidence of the bad seeds, such as keystroke logging or changes to the homepage of a Web site. "[Sonar] will ask behavioral questions: 'What has [the file] done?"

McConnell shares the view that small and midsize businesses (SMBs), though perhaps less likely to be the victim of headline attacks such as Stuxnet or the Nasdaq hack, are increasingly at risk for malware infections, particularly because of the rise of attack toolkits.

"What we tend to see more of [with SMBs] is the impact that these attack toolkits have had on the amount of malware that is in the market, " McConnell said, adding that the boom in quantity was a key driver of Endpoint Protection's reputation-based and behavior-oriented enhancements. "No one -- Symantec or others -- will be able to keep up with that amount of malware with a classic signature business."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I decided to treat the kiddos to a TV dinner tonight.
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.