Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Vendors Tighten Up Security

NetIQ, MessageLabs, and Proofpoint roll out new products, market data at Gartner summit

WASHINGTON -- Gartner IT Security Summit 2007 -- Messaging security and security administration are two key themes this week as vendors roll out new products and data here.

MessageLabs published the results of its latest security research, while Proofpoint and NetIQ unveiled next-generation software. Microsoft demonstrated its Forefront security technology and discussed its new Stirling security management strategy, which was unveiled yesterday. (See Microsoft Unwraps Security Platform.)

In its new report, MessageLabs raised alerts on several new spam exploits detected last month. One of the most serious is the emergence of "spam spikes," in which a single domain is attacked over a short time.

"In one spam spike that lasted only 11 hours, more than 10,000 spam messages were attempted, accounting for more than 75 percent of the total messages received by the domain," MessageLabs reported.

Spammers also are becoming more sophisticated in their use of images, MessageLabs said. "Rather than embedding images in the body of an email message, spammers are now hosting images on sites that do not require registration, and include links to those sites or an HTML image in the email message," the report states.

Overall, though, the volume of spam dropped slightly in May, to 72.7 percent of all email, MessageLabs said. Phishing and email-borne viruses both increased during the month. The company is also tracking an increase in targeted attacks.

Proofpoint, meanwhile, rolled out Proofpoint 5, its appliance for protecting against inbound spam and viruses. The new appliance also integrates new outbound security capabilities, including leak prevention and policy-based encryption, the company said yesterday.

Proofpoint 5 includes multiprotocol scanning, which makes it possible for organizations to detect and restrict the use of some types of messaging and file downloads, the company said. The new appliance also includes policy-based methods for encrypting outgoing messages.

Analysts say they like Proofpoint's approach to appliances, which allows users to reduce the hardware requirement by deploying "virtual appliances" or software only. Proofpoint 5 is "an early example of a new form factor for security appliances that IDS expects to pick up steam over the next few years," says Brian Burke, research manager for IDC's Security Products service.

Proofpoint 5 is available now for $6,750 and up, plus annual user license fees.

While MessageLabs and Proofpoint were focused on email, NetIQ debuted its Security Manager 6.0, a new security information management (SIM) product that now offers user and access monitoring, real-time auditing of system changes, and threat detection for the Microsoft Windows platform.

The NetIQ SIM line, which focuses almost exclusively on Windows, may eventually face competition from Microsoft's Stirling, which is expected to go into beta testing at the end of this year.

NetIQ SM 6.0 leverages Microsoft's file system filter drivers to do server monitoring, enabling it to deliver better audit trails, real-time alerting of dangerous activities, and a much smaller performance footprint than native Windows auditing, NetIQ said.

The new software also lets security pros detect changes to data down to the file level, and it offers user access monitoring and a proprietary, file-based log server technology that scales better than relational or object-level databases, NetIQ said.

NetIQ's new software will be more flexible than previous versions, which is important in the rapidly-shifting security space, said Todd Tucker, director of product marketing at NetIQ. "Organizations can no longer predict where the next threat to their data will come from, nor can they feel confident that today’s regulations and mandates will not evolve to require additional data safeguards."

NetIQ SM 6.0 will be available next month for prices starting at $800 per managed server.

— Tim Wilson, Site Editor, Dark Reading

  • Gartner Inc.
  • MessageLabs Ltd.
  • Microsoft Corp. (Nasdaq: MSFT)
  • NetIQ Corp. (Nasdaq: NTIQ)
  • Proofpoint Inc. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Navigating Security in the Cloud
    Diya Jolly, Chief Product Officer, Okta,  12/4/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    Navigating the Deluge of Security Data
    In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-12-07
    The serialize-to-js NPM package before version 3.0.1 is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. This vulnerability is not affected on Node.js environment since Node.js's implementation of RegExp.prototype.to...
    PUBLISHED: 2019-12-06
    In various functions of RecentLocationApps.java, DevicePolicyManagerService.java, and RecognitionService.java, there is an incorrect warning indicating an app accessed the user's location. This could dissolve the trust in the platform's permission system, with no additional execution privileges need...
    PUBLISHED: 2019-12-06
    In checkOperation of AppOpsService.java, there is a possible bypass of user interaction requirements due to mishandling application suspend. This could lead to local information disclosure no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVers...
    PUBLISHED: 2019-12-06
    In hasActivityInVisibleTask of WindowProcessController.java there�s a possible bypass of user interaction requirements due to incorrect handling of top activities in INITIALIZING state. This could lead to local escalation of privilege with no additional execution privileges need...
    PUBLISHED: 2019-12-06
    n ihevcd_parse_slice_data of ihevcd_parse_slice.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android...