While companies have for years invested in intrusion-detection systems and firewalls to create a shell around their networks, that isn't enough. Internal networks provide fertile ground for attacks on data and systems when threats manage to crack the shell or are introduced by employees or others with access rights. That's a reality that some companies don't want to admit exists.
A number of technologies and services are just hitting the market with the goal of firming up internal network defenses. Some inject intelligence into network security appliances in an attempt to stay a step ahead of security threats, while others aim to limit access to users.
"Most of the focus has incorrectly been on perimeter security," says David Langston, CIO of Allied Home Mortgage Capital Corp. "Anybody who's been involved in security knows that the vast majority of compromise events are generated internally." At Allied Home, internal network threats usually result from poor judgment, such as employees opening spam, Langston says.
|U.S. IT pros suspect insiders were behind some security breaches and espionage in the past year|
suspect unauthorized users or employees
suspect authorized users or employees
suspect former employees
Data: <i>InformationWeek</i>/Accenture Global Information Security Survey of 1,952 U.S. business-technology and security professionals reporting security breaches
Although not all network traffic that Invision flags may be harmful, Allied Home isn't taking any chances. As a financial institution, it's governed by legislation such as the Gramm-Leach-Bliley Act that prohibits the disclosure of nonpublic personal information, including customer financial data.
The availability of Alert Logic's services follows last week's teaming of Lancope Inc., a provider of security technology that also analyzes network behavior, with networking equipment provider Foundry Networks Inc. Lancope has tuned its StealthWatch Xe network appliance so it can use sFlow packet-sampling software found in Foundry's switches to detect mistakes or malicious behavior that internal users initiate. StealthWatch reports abnormal activity to the network administrator and can block certain types of traffic.
Juniper Networks Inc. last week debuted two Infranet Controller appliances and Infranet Agent software that evaluates PC, user identity, and network information to ensure users are accessing the network properly and not introducing security threats.
And Phoenix Technologies Ltd. this week will introduce TrustConnector 2 software to help stop attackers who've been given the keys to networks. TrustConnector creates a unique identity for every PC authorized to access a given network. The intention is to stop attackers from using stolen IDs and passwords to navigate networks if they aren't working from authorized PCs. "It's like giving your computer a uniform so it can be identified," Phoenix CEO Al Sisto says.
The goal with these network-security measures is to equip administrators with tools to shore up internal defenses. It's a problem that many companies may not want to face up to having. "When companies protect themselves at the network perimeter, it's because there are bad people out there," Langston says. "When you talk about internal security, companies worry about being seen as inept."