Feeds

Network ICE CTO responds to further BlackICE criticisms

The jury's still out

  • alert
  • submit to reddit

SANS - Survey on application security programs

The CTO of Network ICE, Robert Graham, has been in touch to support his BlackICE firewall product following recent criticisms by security consultant Steve Gibson that it's not up to the job.

Graham initially responded (in a personal capacity) that Mr Gibson misunderstood BlackICE as simply a firewall - and that it's functionality is far greater than this. Gibson had said BlackICE failed to find a Trojan on his PC while a free security product had found it without trouble.

After we posted Graham's comments, we were inundated by readers asking why if BlackICE is not a firewall is it sold as a "personal firewall" on Network ICE's own Web site.

This is Robert Graham individual response to that, to why people should continue buying BlackICE and why corporates find it far more useful than free security products available on the Net.

"It is a personal firewall, just a different kind. We do this intrusion detection bit where we fully analyse the content that goes in and out of the machine. This is something nobody else does. Zone[Alarm - a free security product] is 'personal firewall + outbound blocking'; we are 'personal firewall + intrusion detection'.

"We believe that our solution is superior. Other firewalls give you limited information about an application attempting to contact a certain port number at a certain IP address, but give the end user no visibility why. They don't give any indication whether it is a Trojan or a legitimate attempt to access the Net. In contrast, we identify that it is Trojan traffic and automatically block. We are the only personal firewall that is able to identify Trojans - the rest assume the user can.

"The problem is that users are forced to tell [other security products] about every Web site they go to. They get into the habit of saying 'yes' to everything. This is what happened with the Melissa virus. People get trained like monkeys to agree with dialog boxes without paying attention to them.

"It is our automation and added intelligence that has led to BlackICE being the most popular personal firewall in corporate environments. Corporation managers go through extensive analysis of these things and understand the difference in technology. They trust our ability to identify hacker activity by watching the raw traffic more than their end-users ability to identify what the port/IP addresses mean."

With regard to Steve Gibson's analysis of locating Trojans, Graham had this to say: "If you focus down on just 'Trojans', the issue [of whether free security software is just as effective] is debatable. It's a matter of whether you want the hands-on, information-free approach, or the automated, information-gathering approach.

"However, when you go outside of just Trojans, it is quite clear that our approach is the best (at least, that's what our customers tell us). Most consumers buy personal firewalls because they believe they can identify hackers and stop the identified activities. They are quite surprised to learn that their personal firewall cannot differentiate hackers from normal activity.

"Corporations have an even worse problem. What do you think happens when the IT department forces an application onto a user's desktop that gets in their way and forces them to start answer a bunch of questions they aren't prepared to deal with?"

In support of BlackICE came one reader: "I have used BlackICE for a couple of years now, and it routinely has protected from all sorts of attacks, a good percentage which are related to Trojans. I manage several servers, and use it routinely on them."

Others were less impressed: "This is just a lame response by Network ICE to cover up its poor coding. Of course folks are going to threaten if someone exposes them."

One was not impressed with Network ICE's explanation as to why it didn't find the Trojan on Mr Gibson's machine: "It is irrelevant if this program has accessed the Net before or not. Once you install ZoneAlarm all programs (and I mean all) produce the alert. Therefore the Sub7 virus and any other Trojan, spyware, virus are stopped dead in their tracks (even if there already on your PC) unless of course you explicitly give them permission to access the Net. This is the way all proper firewall's work - everything is locked down until you open it.

"The fact that BlackICE can't do this is testament to the uselessness of this product and the absolute crap they have come up with in their official response. On a side note, Gibson isn't the only one to have slated BlackICE, several magazines have noted a particular lack of BlackICE doing anything useful when compared to other Personal firewalls."

So there you have it: corporate lifesaver or over-priced sieve? You decide. ®

Related Stories

Network ICE hits back over Gibson jibes
Security expert waves DDoS white flag
Everything you wanted to know about DDoS attacks

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
Canadian taxman says hundreds pierced by Heartbleed SSL skewer
900 social insurance numbers nicked, says revenue watchman
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.