Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/22/2007
02:40 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Security Startups Make Debut

Veracode debuts on-demand software security analysis service, and Provilla, endpoint data-leakage appliance

Two security startups will debut today, offering new methods for analyzing software security and detecting potential leaks.

The two companies -- Veracode, an application security service provider, and Provilla, a data leak prevention vendor -- have both been operating quietly for several months but are officially entering the market today.

Veracode, founded by Chris Wysopal and other former executives of @stake, is now offering patented binary-code analysis of software for enterprises that want to analyze their software's security on a regular basis. The ASP will also offer security reviews of enterprise products and security analysis of third-party apps for software developers.

"We are more accurate than source-code analyzers," says Matthew Moynahan, CEO of Veracode and former vice president of consumer products and solutions division at Symantec. Veracode is also made up of software security experts from Guardent, ISS, and VeriSign.

Moynahan says Veracode isn't just performing vulnerability analysis with its SecurityReview services. "An application could be vulnerability-free but have a hole the size a truck could drive through if certain functionality isn't present in that application." Veracode not only checks for vulnerabilities and malicious code, but also the "absence or presence of security functionality," he says. The company also conducts manual penetration testing and annual code review services.

But Veracode does not provide manual analysis. "We pass the baton if you want manual analysis on top of this," Moynahan says. "You can hire a Matasano or someone else... Our output makes their manual efforts that much more directed and efficient."

So what happens when Veracode's service finds flaws? Customers get reports that include suggestions for remediation, and Moynahan says Veracode's software-as-a-service model is lowering the price point in application security solutions. The company would not disclose specific pricing details.

"If you find a problem in the binary with a tool like this, how are you going to fix it?" says Gary McGraw, CTO with Cigital, a consulting firm that focuses on software security. "I laud them for this, but I would prefer they fix them [the problems] rather than spray-painting everything orange. If you find a problem in binary, you have to fix it in source code, and you may not even have the source code."

"If you're trying build a better badness-ometer, this is cheaper than hiring a bunch of reformed hackers," McGraw says. "However, if you want real security analysis you have to go past the binary, past the source code, and actually consider the design."

Still, there's no way to build completely clean code, Moynahan notes. "You're never going to strip all vulnerabilities out of applications," he says. "But [Veracode's services] let [developers] prioritize, with the time and money they have, [and] meet their shipment cycles."

The other startup, Provilla, sells an appliance and accompanying client software that runs in the background of client machines and alerts security managers when a user tries to move, send, or cut-and-paste sensitive data. The company has already begun shipping its LeakProof-100 and LeakProof-500 appliances and client utilities for Windows.

Benjamin Powell, security architect for a financial services company, which he asked not to be named, has been testing the appliance for several months and is now in the process of going operational with it for the company's 1,000 users. "This product is one of the only ones that can stop hacks from U3 USB devices... out of the box and without any configuration."

It's more effective than a network-based data leakage approach, Powell says, because it prevents a laptop user from copying sensitive data onto a USB, a CD, or sending it over Bluetooth, or via WiFi to another access point. "The network-based [data leakage] solutions work on a regular network, but if a user circumvents the network, you don't see anything."

Powell says of the products he tested, Provilla's was unique in that it "fingerprinted" sensitive data. "You have the ability to do keyword-type matching, by credit card number, and email address, and you can define certain types of data."

Provilla is focusing on distributed, mobile data environments, says Glen Kosaka, vice president of marketing for Provilla. And the LeakProof endpoint agent can work online or offline, he says. "If a user were to take a confidential document, edit and save it as another file, move text around, or cut-and-paste it into an email body, it would still detect it."

The software develops a signature for sensitive documents or data and intercepts any data leakage activity at the client. The company also offers a free utility called LeakSense, a software-only version of LeakProof that discovers and monitors data use in an organization.

Pricing for LeakProof starts at $20,000 per year for 50 to 100 endpoints and costs anywhere from $30 to $50 per endpoint for large enterprises, 100-1,000 endpoints and 1,000+ endpoints, respectively.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • Veracode
  • Provilla Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/6/2020
    Ripple20 Threatens Increasingly Connected Medical Devices
    Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
    DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
    Dark Reading Staff 6/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15570
    PUBLISHED: 2020-07-06
    The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
    CVE-2020-15569
    PUBLISHED: 2020-07-06
    PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
    CVE-2020-7690
    PUBLISHED: 2020-07-06
    It's possible to inject JavaScript code via the html method.
    CVE-2020-7691
    PUBLISHED: 2020-07-06
    It's possible to use <<script>script> in order to go over the filtering regex.
    CVE-2020-15562
    PUBLISHED: 2020-07-06
    An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.