How to minimize the threat
Computerworld - Intrusion-detection systems (IDS) are the subject of industry controversy after a Gartner Inc. report recommended that companies abandon these systems in favor of firewalls (see story).
If organizations want to stop the constantly evolving types of attacks, they must continue to rely on multitiered defense strategies consisting of network security components layered at the perimeter and internal network machines and devices. Such network security components not only include network- and host-based IDSs, but antivirus software, patch management, firewalls, scanners and intrusion-prevention systems (IPS).
Admittedly, this approach has challenges: Systems are not adequately integrated, do not identify and share vulnerability information, and rely on numerous rules to identify new threats that in turn produce volumes of alerts all of which are overwhelming the system and its operators.
The main culprits are IDS/IPS technologies that are generally able to spot attacks by common vulnerabilities and exposures, or CVE, identifying that they see on a network. However, these same technologies generally don't have the ability to determine if the targeted machine is actually vulnerable to the attack.
For instance, if malicious code has been written as a Windows-based attack targeting a Windows vulnerability, is the destination IP address actually running Windows or a Unix variant? And, if it's Windows, is it vulnerable to the attack, or has it already been patched? An IDS doesn't have the intelligence to answer these questions and generates incident alerts indiscriminately. In addition, even if the targeted machine is vulnerable, an IDS doesn't have the capability to remediate it.
Furthermore, best-practice and government-compliance directives now require higher standards of network security and integrity to protect consumer privacy, and they must be documented with change-tracking and audit-trail reports.
|Brett Oliphant is the chief technology officer at Lafayette, Ind.-based SecurityProfiling Inc. |
Companies are finding it increasingly difficult and expensive, especially in an environment with rising security standards and policy compliance requirements, to mitigate new threats and manage numerous systems. But relying solely on firewalls isn't the answer. Vendors must create ways to integrate systems, share information intelligently to better defend against blended threats, reduce management and cost requirements, and automate IDS/IPS configuration and tuning along with vulnerability identification and remediation functionalities.
A first and important step in this process is to improve IDS/IPS to minimize false positives that threaten productivity and result in rising costs. This can be accomplished by integrating client configuration data from client agents or a scanner, which will provide the system with data so it can determine if the targeted machines are vulnerable to the attacks, thereby reducing false positives.
The following functions are achieved through this integration:
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts