Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:05 AM
Connect Directly

Startup Launches Tool That Analyzes & Maps Network Architecture for Risk

Athena Security goes public and shows off its new tool for determining the risks posed by network configurations

SAN FRANCISCO -- RSA 2008 Conference -- A security startup that's been operating for several months in stealth mode came out of the shadows here last week at the RSA conference to show off its new security mapping tool that assesses overall threat risk by scrutinizing the network architecture.

Athena Security, based in Lisle, Ill., gets back to the basics in assessing and managing the risk of attack from internal or external threats. Its new AthenaVerify tool basically checks the network architecture for architectural soundness, and compares it with best practices from NIST, SANS, NSA, Neohapsis, ISACA, and ITIL, and assesses how any change in the network affects the security posture of the network.

"We look at the basic network architecture," says Adarsh Arora, CEO of Athena Security. The key is mapping how the network is configured with best practices to determine what the risk really is.

Typically, there's really no way to know for sure how any change in network configuration actually raises or lowers your risk of an attack, says David Hurst, CTO of Athena Security. "Now you can see any change in behavior," he says.

AthenaVerify takes configuration information from network and security devices and provides an audit with scoring as well as modeling options for correcting or updating any configurations. "By evaluating our best practices, we can tell how compliant you are."

The Windows-based tool runs in network operation centers, where it can identify an intrusion, for example, and identify what else is exposed. "We can model that and predict how an intrusion would propagate and how to apply corrective actions," Hurst says. You can then run models of any changes and see how they impact your risk score, for example.

Athena Security expects the tool to provide a way to close the gap between network and security managers, and eventually plans to integrate it with network management consoles. It's currently integrated with SecurePassage's FireMon firewall management system.

Aside from ensuring that network architecture or device configurations aren't leaving an organization vulnerable to attack, the tool can also be used for compliance audit preparation, according to Athena. Pricing starts at around $15,000.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-12
The express install, which is the suggested way to install Puppet Enterprise, gives the user a URL at the end of the install to set the admin password. If they do not use that URL, there is an overlooked default password for the admin user. This was resolved in Puppet Enterprise 2019.0.3 and 2018.1....
PUBLISHED: 2019-12-12
When using the cd4pe::root_configuration task to configure a Continuous Delivery for PE installation, the root user�s username and password were exposed in the job�s Job Details pane in the PE console. These issues have been resolved in version 1.2.1 of the ...
PUBLISHED: 2019-12-12
An exploitable code execution vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an integer overflow, resulting in heap corruption. An attacker can send a packet to trigger this vulnerability.
PUBLISHED: 2019-12-12
An exploitable information disclosure vulnerability exists in the DICOM packet-parsing functionality of LEADTOOLS libltdic.so, version 20.0.2019.3.15. A specially crafted packet can cause an out-of-bounds read, resulting in information disclosure. An attacker can send a packet to trigger this vulner...
PUBLISHED: 2019-12-12
An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability.