Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

2/15/2011
11:36 AM
50%
50%

Symantec Intros Endpoint Protection 12

Client-side security software for SMBs will utilize cloud-based data to identify mutating malware and other rapidly changing threats, Symantec says.

12 Money Saving Tech Tips For SMBs
(click image for larger view)
Slideshow: 12 Money Saving Tech Tips For SMBs

Symantec on Tuesday announced version 12 of its Endpoint Protection and Endpoint Protection Small Business Edition (SBE) software. Both will be released this summer, with a public beta beginning in April.

The new versions will leverage Symantec's Insight technology to identify and protect against mutating malware and other threats as they change and adapt, based on information from the 2.5 billion files that Symantec "sees" across its cloud-based database of 175 million endpoints.

"Think of [Insight] as an algorithm, but it's an algorithm that's based on a pretty large sample size," said Blake McConnell, senior director of product management at Symantec, in an interview. "Insight will put files into context: What is the age of that file? What is the frequency or prevalence? What is the source or location? Where was that file created? What are the behaviors or associations of that file?"

McConnell said that the concept of context is critical because it enables Symantec to block potential threats before they're actually identified in the digital landscape. "The 'today problem' is around malware mutations that are generated from attack toolkits," McConnell said. In other words: Although traditional signature-based protection is still in place, it is no longer enough.

Executables and other files are rated for risk by Symantec -- these ratings are preconfigured for SBE, while midsize and larger customers set their own comfort levels with various potential threats. McConnell added that although the SBE comes with more preconfigured options out of the box, customers can modify those settings if they wish. SBE targets firms with 5-99 employees or endpoints, while the flagship is geared for 100 or more seats.

Insight won't scan "known good files," meaning it can skip 70% of files on typical systems, according to Symantec.

"That clearly has a dramatic impact on scan time and scan overhead," McConnell said, adding that idle-only scans also help boost system performance. "We don't even want the user to know we're there."

Planned updates for version 12 also include Mac support and Sonar 3, Symantec's behavioral engine. If Insight is the lock on the front door, Sonar is the hall monitor -- it enforces policy-based behavioral rules. McConnell notes that while the composition of a malware file might change on the fly, its goal does not.

"People who are looking to steal passwords are still looking to steal passwords. Spambots are still looking to do spam," McConnell said. Sonar goes looking for evidence of the bad seeds, such as keystroke logging or changes to the homepage of a Web site. "[Sonar] will ask behavioral questions: 'What has [the file] done?"

McConnell shares the view that small and midsize businesses (SMBs), though perhaps less likely to be the victim of headline attacks such as Stuxnet or the Nasdaq hack, are increasingly at risk for malware infections, particularly because of the rise of attack toolkits.

"What we tend to see more of [with SMBs] is the impact that these attack toolkits have had on the amount of malware that is in the market, " McConnell said, adding that the boom in quantity was a key driver of Endpoint Protection's reputation-based and behavior-oriented enhancements. "No one -- Symantec or others -- will be able to keep up with that amount of malware with a classic signature business."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15132
PUBLISHED: 2019-08-17
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocki...
CVE-2019-15133
PUBLISHED: 2019-08-17
In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
CVE-2019-15134
PUBLISHED: 2019-08-17
RIOT through 2019.07 contains a memory leak in the TCP implementation (gnrc_tcp), allowing an attacker to consume all memory available for network packets and thus effectively stopping all network threads from working. This is related to _receive in sys/net/gnrc/transport_layer/tcp/gnrc_tcp_eventloo...
CVE-2019-14937
PUBLISHED: 2019-08-17
REDCap before 9.3.0 allows time-based SQL injection in the edit calendar event via the cal_id parameter, such as cal_id=55 and sleep(3) to Calendar/calendar_popup_ajax.php. The attacker can obtain a user's login sessionid from the database, and then re-login into REDCap to compromise all data.
CVE-2019-13069
PUBLISHED: 2019-08-17
extenua SilverSHielD 6.x fails to secure its ProgramData folder, leading to a Local Privilege Escalation to SYSTEM. The attacker must replace SilverShield.config.sqlite with a version containing an additional user account, and then use SSH and port forwarding to reach a 127.0.0.1 service.