Gartner Information Security Summit 2009 UK 21 September-22 September 2009
Total Page:16
File Type:pdf, Size:1020Kb
Summer is nearly over and we!re all getting back to our offices wondering how the holidays ended so quickly. To get you up and running with security insight, we bring you a collection of articles covering an assortment of themes, from cloud security to multi-enterprise application security. For us, just like for many of you, the next several months are going to be filled with a multitude of events spread worldwide. We!re going to cover BruCON in Belgium, RSA Conference in London and San Francisco, the Storage Expo in London, InfosecWorld in Orlando, just to name a few. If you!d like to arrange a meeting, bring us some products for review or just say hello, drop me a line. Mirko Zorz Editor in Chief Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Editor in Chief - [email protected] News: Zeljka Zorz, News Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright HNS Consulting Ltd. 2009. www.insecuremag.com VPN management for Linux networks NCP engineering released a new version of the software- based NCP Secure Enterprise Management System for Linux-based systems. Developed from the ground up to make hybrid IPSec / SSL networks powerful yet easy to manage, the system can plug-and-play with any existing network infrastructure or stand on its own as a new compo- nent. A single administrator is enabled full control over tens- of-thousands of secure connections, policy setting and en- forcement, client updates, configurations and a host of other NAC management activities from one dashboard interface. (www.ncp-e.com) The most physically and cryptographically secure USB flash drive IronKey launched its S200 device for government and enterprise customers, featuring hardened physical se- curity, the latest Cryptochip technology, active anti- malware and enhanced management capabilities. IronKey S200 is the first and only USB flash drive to meet the rigorous government security requirements of FIPS 140-2, Security Level 3. It comes with hardware- based AES 256-bit encryption in CBC mode and it fea- tures the secure management of encryption keys in an amper-resistant and tamper-evident rugged metal case. (www.ironkey.com) www.insecuremag.com !! 5 SmartWorkflow: New security management software blade Check Point announced SmartWorkflow, a new security management software blade that provides customers the option of extending their se- curity infrastructure with policy change management functionality. It enables an automated process of tracking, approving and auditing policy changes within the security management console, minimizing configuration errors and optimizing the integrity of network security. SmartWorkflow includes reporting and auditing capabilities that help customers ensure compliance with corporate policies and regulations. (www.checkpoint.com) Juniper's adaptive threat management solutions for distributed enterprises Juniper Networks Adaptive Threat Management Solutions, based on a dynamic security infrastructure, deliver security at scale that is identity aware and application aware, enabling consistent application delivery and performance across the dis- tributed enterprise - including data center, campus, branch, re- mote and partner/extranet locations. (www.juniper.com) Trend Micro's protection for virtual machines Trend Micro is expanding its virtualization secu- rity portfolio with a content security solution to protect VMware ESX/ESXi environments. Core Protection for Virtual Machines is designed to secure VMware virtual machines, both active and dormant. The product leverages the VMsafe APIs from VMware to offer layered pro- tection through the use of dedicated scanning VMs coordinated with real-time agents within the VM. (www.trendmicro.com) Security code review service for threat identification Comsec Consulting launched CODEFEND, a new ap- plication security service which combines technology and expert human analysis, for Outsourced Security Code Review and Threat Identification. CODEFEND is an on-demand service allowing developers to securely send their non-compiled code to Comsec, where it is analysed for security vulnerabilities and threats. Fusing the latest generation of code analysis tools, custom- ised rules and Comsec's proprietary methodologies, the service delivers more accurate reporting and identifies vulnerabilities not routinely picked up when using a "tool only" approach. (www.comsecglobal.com) www.insecuremag.com !! 6 Splunk 4 supercharges IT search Splunk 4 improves an organization's ability to manage, secure and audit their entire IT infrastructure. Re- architected and supercharged, Splunk 4 has infused IT search with speed and a customizable user interface. It offers users the ability to create custom dashboards for anyone in fewer than five clicks. The release also shatters the speed of previous releases with up to 10x faster search and 2x faster indexing, radically enhancing IT issue resolution times and incident investigations, giving users the power to index terabytes per day and search on massive amounts of IT data to deliver results in seconds on low-cost commodity server hardware. (bit.ly/17x8jx) RSA SecurID software token for iPhone RSA released the RSA SecurID Software Token for iPhone Devices that enables an iPhone to be used as an RSA SecurID authenticator, providing convenient and cost-effective two-factor authentication to enterprise applications and re- sources. The app is now available on the App Store at no charge. The required RSA Se- curID software token seed as well as RSA Authentication Manager - the soft- ware that powers the RSA SecurID system - are both available for purchase worldwide. (www.rsa.com) Sourcefire and Qualys deliver real-time risk analysis Sourcefire and Qualys announced that Sourcefire has become a Qualys Solution Partner and the com- panies have integrated the Sourcefire 3D System with QualysGuard. The combination of Sourcefire and Qualys enables organizations to reduce the number of actionable network threats by leveraging Sourcefire Defense Center to correlate threats detected by Sourcefire's intrusion prevention system (IPS) against host vulnerabilities identified by QualysGuard. (www.qualys.com) Open source project to secure the Domain Name System The OpenDNSSEC project announces the development of open source soft- ware that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security. Industry leaders including .SE, NLNetLabs, Nominet, Kirei, SURFnet, SIDN and John Dickinson have come together to create open source software that prom- ises to make it easier to deploy DNSSEC. The group's primary aim is to further protect the Internet by increasing the security for end-users. (www.opendnssec.org) www.insecuremag.com !! 7 GFI MAX: Remote management and monitoring solution GFI Software launched GFI MAX, a suite of remote management, monitoring and support tools for IT support organizations and MSPs worldwide. Customers can use GFI MAX's real-time systems monitoring, automated daily health checks, asset tracking, patch management, own-brand client reporting and remote support solutions to build recurring revenues, drive down their operating costs and deliver best-of-breed IT support services. (www.gfi.com) Virtual encrypted vaults for secure sharing Overtis Systems launched the VigilancePro Encrypted Vault Manager (EVM), which provides means to en- crypt, store and transmit data using virtual vaults. EVM also provides a way to share information securely on removable media, email and other means. EVM is also available as part of the full VigilancePro endpoint agent. When used as part of a full VigilancePro de- ployment all key management is handled centrally in line with ISO/IEC 11770 best practice. As a result, there is no need to enter passphrases when creating files. (www.overtis.com) Versatile hardware encryption for any computer Addonics announced a 256-bit AES hardware full disk encryption solution for personal comput- ers, servers, rack mounted systems, data stor- age equipment - basically, any computing equipment. CipherChain is a small module the size of a compact flash that can easily and quickly be installed into any system. Since it can be operated under any operating system, Ci- pherChain is a security solution for organizations with legacy systems or in a heterogeneous com- puting environment. (www.addonics.com) jCryption: Javascript HTML form encryption plugin jCryption is a javascript HTML form encryption plugin, which en- crypts the POST/GET-Data that will be sent when you submit a form. It uses the Multiple-precision and Barrett modular reduction libraries for the calculations and jQuery for the rest. Normally if you submit a form and you don't use SSL, your data will be sent in plain text. However, SSL is neither supported by every webhost nor it's easy to install/apply sometimes. With this plug-in you are able to encrypt your data fast and sim- ple. jCryption uses the public-key algorithm of RSA for the encryption. (www.jcryption.org) www.insecuremag.com !! 8 Mobile Guardian Enterprise Edition 6.5 for Mac released CREDANT Technologies released Mobile Guardian