Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/26/2016
07:30 AM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

SentinelOne Offers $1 Million Guarantee To Stop Ransomware

Jeremiah Grossman continues his crusade to make security vendors take responsibility for their own gear.

Endpoint security firm SentinelOne is now backing its ability to block or remediate ransomware attacks with a guarantee of $1,000 per endpoint or up to $1 million per organization, the company announced today.

This move is also a sign that SentinelOne's new chief of security strategy, Jeremiah Grossman, is continuing his crusade to make security companies take on more legal responsibility for the effectiveness of their products. It's a mission he started several years ago while still with White Hat Security, which offered breach loss coverage up to $500,000 and a full-refund warranty.  

Ransomware guarantee

Although the average cost of a ransom payment may still be below $1,000 per endpoint, the overall cost of an attack may be much higher once the costs of downtime, forensic investigations, compliance fines, replacement infrastructure is included, not to mention damaged reputation, are included. Many organizations have been stuck paying up ransoms because of a combination of increasingly sophisticated cryptoransomware and inadequate backup alternatives.

By the time ransomware attackers ask for payout, they may already have the victim organization in a chokehold. In some cases, security teams can crack the crypto; in others, they cannot. However, before ransomware gets to the point of loudly announcing intself to the unfortunate end user, it's banging around the endpoint rather noisily engaging in abnormal behavior -- like scanning full file systems and beginning to encrypt them. 

So, even if a new strain of ransomware has never been seen before and has no signature, the behavior is so common to it that SentinelOne feels confident its behavioral analysis technology can detect unknown ransomware by monitoring for this sort of behavior. (The old-fashioned "locker" ransomware that didn't encrypt files has fallen out of favor, says Grossman, and ransomware operators' "path forward is really good end-to-end crypto.")

The importance of liability 

Despite the confidence in the technology and the guarantee, Grossman doesn't expect that SentinelOne's product will catch every instance of ransomware every time, though.

That hasn't stopped him from pushing for security companies to provide more liability protection -- and for software companies to take more responsibility for their security. He's received some pushback, though. "The argument [against it] is that 'you can't guarantee security,'" Grossman says. "While that's true, can we guarantee it 99% of the time?"

Grossman's counterargument is that automakers and electronics companies don't expect that every one of their products will be perfect, either, but that doesn't stop them from providing customers with product warranties that exist to cover the times when their products are not perfect. His attraction to joining SentinelOne was that they were able to provide the kind of data that insurance providers would require in order to back the kind of guarantee SentinelOne will offer.

So, despite resistance of others in the infosec community, Grossman has been unwavering in his sentiments. "I heard them loud and and clear," he says, "I just wasn't hearing them."

"Customers are now asking for this," he says, and he urges end users to keep asking security vendors for more liability, because that will push the needle forward.

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

When asked if skepticism about and resistance to guarantees was to be expected from an infosec industry, which is risk-averse, Grossman countered that they are "risk-averse only in relation to themselves" and don't mind if their customers are at-risk.

Grossman will be presenting a session at the Black Hat conference next week about cyber insurance and some how-tos about providing guarantees like this one. 

"Fifteen years ago I knew that appsec was a problem, and 'kicking and screaming, I dragged the industry along," he says. "It's time to do it again."

Related Content:

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18660
PUBLISHED: 2021-06-23
GetSimpleCMS <=3.3.15 has an open redirect in admin/changedata.php via the redirect function to the url parameter.
CVE-2020-23962
PUBLISHED: 2021-06-23
A cross site scripting (XSS) vulnerability in Catfish CMS 4.9.90 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "announcement_gonggao" parameter.
CVE-2020-18657
PUBLISHED: 2021-06-23
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.
CVE-2020-18658
PUBLISHED: 2021-06-23
Cross Site Scriptiong (XSS) vulnerability in GetSimpleCMS <=3.3.15 via the timezone parameter to settings.php.
CVE-2020-18659
PUBLISHED: 2021-06-23
Cross Site Scripting vulnerability in GetSimpleCMS <=3.3.15 via the (1) sitename, (2) username, and (3) email parameters to /admin/setup.php