Feeds

What is the point of End Point Protection?

How we should be protecting our PCs

  • alert
  • submit to reddit

3 Big data security analytics techniques

Security threats have existed for almost as long as computers have been around.

Few interactive systems can claim to be immune – even venerable systems like the IBM mainframe, UNIVAC and VAX have had their share of malware. Then, the PC brought computing to the masses, but also brought a new environment for malware to bloom.

The ‘sneaker net’ at first kept the rate of spread at a relatively low level. However, once networking, and especially the Internet, became pervasive, threats began to spread rapaciously.

The initial generations of malware focused on publicity or damage, with the main financial costs coming from lost productivity and the subsequent clean-up and potential for damage to the brand and reputation of the company. The rise of online shopping and commerce, and social identities have created a new target for malware creators that is financially motivated – bringing in organised crime on a huge scale. When we look at how virtualisation is changing PC use, and how quickly threats evolve, how should we be looking to secure not just our PCs, but also the users that most often really are ‘the weakest link’?

Starting with those end-users, education and policy remains a continued weak point in IT, and especially PC, security. From writing down logins and passwords, sharing logins, emailing or copying sensitive information - not to mention clicking on attachments to emails promising a nice eyeful or that somebody loves them – the habits of PC users often have the biggest impact on the effectiveness of any security solution.

Unfortunately, the attitude of end-users to security is often laissez-faire, and this comes from the culture of the company and its attitude to security and the investment put into training users to be security conscious. We can see from the figures below that for many companies, raising the level of security is far from top of mind. To close the loop and improve security overall, there is almost no better place to start from than getting management to realise the implications of security breaches, and to develop a security policy that can be communicated to the workforce.

It is vital that users are educated to be aware of and understand the security implications of their actions. Few people would sticky-tape their keys to their car after all, even a company car, as the consequences would be pretty severe. Yet this is effectively what they do when providing access details for critical business systems with little or no repercussion.

It is important to realise that traditional methods of protection are not going to suddenly become irrelevant. Anti-malware software will continue to be necessary to cover much of the mature threat landscape. New techniques, such as content filtering, data protection and web protection may enhance and augment these systems, but they are extending and not replacing the functionality.

With the security threat moving from damage and notoriety to identity and money, the perpetrators are looking at ever more covert ways to operate, and are moving off the PC and onto the web. This brings a huge security space to cover and is much broader than trying to protect individual PCs. This will bring about a change in security protection where network or Internet-based security services work alongside those running on the PC. This is starting to become well established as a concept, especially for malware such as anti-spam, and is starting to gain relevance for web content and financial interactions.

We are also likely to see a change in how vendors architect security solutions, and this will affect how they are deployed on PCs. This change is being driven by virtualisation, which is throwing a spanner in the security works. With multiple Operating Systems (OSs) running, just where and at what level should security software really be functioning? Running full-blown security solutions on all virtual machines is inefficient, a resource hog, and requires management to avoid conflicts and redundant processing.

For type 2 hypervisors, where guest OSs run on top of a host OS, few products - if any - are capable of securing guest OSs from the host OS. And where the guest runs directly on a type 1 hypervisor, products have yet to emerge that can act as a sentinel to provide centralised, low-level security.

The ideal solution will be to have a thin security layer, or ‘client’ for each virtual machine that then communicates with a ‘server’ running on the host OS or in conjunction with the hypervisor. The security scanning and processing can be co-ordinated, and common elements shared for maximum efficiency. The trick will be getting up and running with these emerging solutions in parallel with the move to deploying virtualisation on PCs. Leaving it too late will very likely result in a wholly unsatisfactory user experience, and an unmanageable security soup. ®

SANS - Survey on application security programs

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Hearthstone: Heroes of Warcraft – A jolly little war for lunchtime
Free-to-play WoW turn-based game when you have 20 minutes to kill
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.