The Wolf's At The Door

compliance e-mail Bot

To deal with next year's threats, here is a list of 15 products and practices assembled by VARBusiness staff, including Test Center editors and interviews with solution providers, that could assist your efforts in keeping enterprises safe.

McAfee Internet Security Center The Test Center found McAfee Inc.'s Internet Security Center to have an edge on the competitors. Unlike other products tested in a desktop security suite bake-off, McAfee was able to detect and block all rogue Web sites with embedded malware that were accessed for the test, with the exception of one site. Besides doing virus scans and monitoring Internet traffic, Security Center also has a QuickClean function that will delete temporary Internet files in a comprehensive manner. McAfee's robustness in protecting the desktop is already finely-honed and is expected to keep improving into 2009.

KeyFocus KFSensor Keep your friends close and your enemies closer--KeyFocus Ltd.'s KFSensor does just that, but doesn't let them get too close. KFSensor is a Windows-based honeypot that monitors intrusion and threat attempts on a network. The product simulates a number of services that would run in a typical network environment such as IIS, SMTP and Telnet. KFSensor takes the guesswork and scariness out of setting up a trap network; it installs like any other Windows-based application. The honeypot logs detailed information about each threat attempt, including originating IP address and domain, but intruders can never fully penetrate.

Sophos WS 1000 Using behavioral genotype scanning, this device can pick up unknown and zero-day threats; code is analyzed pre-execution and by behavior. True-file type and full content scanning contribute to make the Sophos Plc. WS 1000 an effective security device. One feature that really stands out is the realtime URL scanning. The device will report back on an entered URL, and will categorize the site (for example, if it's a gambling or an adult site). URL scanning will also report on the security risk of the site.

id
unit-1659132512259
type
Sponsored post

CA IT Client Manager If 2008 taught any lessons about security, one of the foremost was the need to keep computers, servers and applications up to date with the latest patches. This is easy enough to do on a stand-alone machine or a small network. For the midsize to enterprise-level outfits, keeping track of which machine or app is or isn't currently patched can pose challenges. CA has incorporated its former product CA Patch Manager into IT Client Manager. IT Client Manager is comprised of several components: Asset Management, Asset Intelligence, Software Delivery, Remote Control, Patch Management and Desktop Migration Manager. Patch Management is particularly sophisticated. With CA's solution, patches can be tested against required system configurations before deployment.

Panda Managed Office Protection For 2009 threats, look to the cloud. Panda Security offers a managed security service, providing remote installation and centralized management. This Web-based subscription service offers remote proactive protection and allows VARs to manage clients and their branch offices from anywhere at any time. Key features include: personal firewall management, remote updates, malware auditing and profile-based protection. As a hosted service, PMOP can potentially lower operating costs as the hardware, software and employee resources to manage an in-house security platform are reduced, if not eliminated altogether.

APC Biometric Password Manager The often daunting task of trying to remember which password goes to which Web site or Web app often causes users to store passwords on their computers, a feature available through browsers. This is, of course, a security risk. But with American Power Conversion Corp.'s Biometric Password Manager, fingers become passwords. The device can register the single print of up to 20 different people or 20 different fingers. This is one of the first biometric devices for the consumer budget.

Western Digital's My Passport Elite It doesn't get any more portable or secure than Western Digital Corp.'s My Passport Elite. This portable hard drive has USB 2.0 connectivity with 500 GB of storage. Elegantly designed, it has a soft-touch finish and comes in an assortment of colors. It's not only beautifully engineered but it's a good sentry for data with 128-bit encryption. The drive is compatible with Windows and Mac (although the 128-bit option is only available for Windows). It's a great addition for customers that have employees who need to transfer and sync files between work and home or on the road.

eSoft InstaGate 404E The 3.5 pound, 9 x 6.2-inch appliance certainly won't take up a lot of real estate in a data center. The 404e has integrated firewall and VPN capabilities. This UTM combines intelligent spam scanning, malware and intruder detection and content filtering into an effective threat-management solution. Rigorous testing of the device proved it could handle content filtering very well and was able to pick up and immediately block malware from entering the network. An intuitive Web-based management interface assists in setting up the 404e and managing the security of the network. ESoft Inc. sells almost 100 percent of its products through the channel. At a starting list price of $799, the 404e brings robust security to a network without breaking the bank.

Lenovo IdeaPad Y510 Once a thing of science fiction movies, facial-recognition technology continues to be fine-tuned by a number of vendors and is becoming a unique and effective security option. Lenovo has been steadily churning out remarkable laptops and workstations throughout the year, and the expectation is that this will continue into 2009. Although testing of the facial-recognition technology is not 100 percent there yet, as Test Center reviewers found when testing Lenovo's previous IdeaPad offering, it had one of the better facial recognition capabilities than other products looked at.

Core Impact It's important to know where the Achilles' heel of a network resides. Core Security Technologies' Core Impact aids in that--it seeks out vulnerabilities and exploits on targeted systems. A Web-based console guides security administrators through designing a test macro, made easy with the help of a wizard. After testing, Core Impact combines results into easy-to-interpret reports. As a preventative measure to the product being used for good rather than evil, users of Core Impact must sign waivers and provide IP addresses for the systems to be tested. Those addresses are hard-coded into the product to prevent its use on unauthorized systems. Such lock-tight measures exemplify the security smarts of the vendor, as does its Core Impact product.

Linksys Wireless G Internet Video Camera WCV54G Surveillance systems can run into the thousands in terms of cost. For small businesses, VARs may want to opt for a solution like Linksys' Wireless G Internet Video Camera. This camera has a stand-alone, built-in Web server, so no PC is needed. The camera supports up to four simultaneous users. It can stream live video and sound thorough the Internet. MPEG-4 video compression produces up to a 640 x 480 audio/video stream. A really neat feature is Security Mode, which will send a message with a video clip attached to an e-mail address whenever the camera detects motion in its field of view. Priced under $200, this camera is a low-cost solution to security surveillance of smaller areas.

APC's NetBotz 400 The explosion of data center expansion will continue well into 2009. The challenge is to find a way to centrally manage off of the components of a data center and in particular, making sure the physical infrastructure is secure and environmentally sound. American Power Conversion Corp.'s NetBotz 400 is a security and environmental monitoring tool for networks and data centers. This product does double duty: it has a surveillance system that can monitor human activity and can provide information on a data center's temperature, humidity level, smoke, vibrations and other details. This is a product that can satisfy requirements of various compliance regulations--HIPAA, for example, has a physical safeguard requirement mandating that the data center be secured. This particular model, the 400, is designed for network closets and small data centers. It lists between $1,474 to $1,975 depending on features added.

TrueCrypt 5.0 Security doesn't always have to be expensive, nor does it always have to cost anything for that matter. TrueCrypt is free open-source encryption software. Plus, it is cross-platform, running on Windows Vista/XP, Mac OS X and Linux. TrueCrypt can encrypt entire partitions or storage devices. The software can optionally run in travel mode, allowing the software to be loaded straight from a USB device. Although not a complete security solution for a data center, TrueCrypt is an added layer of protection that a VAR can implement as part of a client's security strategy.

ShoreTel 8.0 VoIP security should never be an afterthought. It should be planned out before implementation of the voice system even begins. IP telephony networks are more vulnerable than traditional telephony systems for all the same reasons that make data networks vulnerable. VoIP vendor ShoreTel Inc. offers ShoreTel 8.0, a security component integrated with one of its latest VoIP system offerings, the ShoreGear-90. ShoreTel 8.0 features 128-bit encryption (to offset eavesdropping), support for VLANs as well as SSL. Policies can be created to restrict user-level access. The system is flexible enough to account for a customer's internal security requirements. The management interface, called the Security Director, makes the task of configuring security as simple as checking a box, in most cases.

Panasonic PT-LB80NTU Projector Think security and projectors usually don't come to mind. But consider the fact that more companies are incorporating Wi-Fi into their products; security for these devices must be addressed. The PT-LB80NTU from Panasonic Corp. features WPA-PSK and 128/64-bit WEP. Being a slightly-larger-than-usual portable projector (but portable nonetheless), there are some antitheft features on this projector as well: a security anchor, password protection, control panel lock and text superimposing, as well as a power button lock that is turned on by default. The Wireless Manager Software can be run direct off the CD or a USB drive and allows computers with Wi-Fi adapters to connect to the projector without a network. The PT-LB80NTU has an MSRP of $3,299.

This report was compiled by Technical Editor Samara Lynn, Associate Technical Editor Brian Sheinberg and Associate Editor for Security, Stefanie Hoffman.

Next: How Solution Providers Approach New Threats HOW SOLUTION PROVIDERS APPROACH NEW THREATS

Jeb Carter, President, DefenderSoft Midmarket-geared DefenderSoft Inc. is continually looking for affordable, scalable solutions that can be brought downmarket, says Jeb Carter, president of DefenderSoft. If there's one thing Carter is going to put increased emphasis on in 2009, it's "being able to use solutions that have historically been reserved for the enterprise and bringing them to the midmarket."

"There's a certain amount of fret [in the industry]. 'I wish I could see what my friends see.' It's the equivalent of 'having the latest gadget'--trying to help eliminate what they don't know could kill them or take them down. That's what we want to cure."

Ken Phelan, CTO, Gotham Technology Group Ken Phelan of Gotham Technology Group Inc. says that his security approach in 2009 will include finding new ways to work within customers' ever-shrinking IT budgets. In addition, there will be continued emphasis on the services component of his business, he said, as more customers gravitate toward managed security services in order to cut costs and get the biggest bang for their buck.

"In terms of approaching the customer, obviously we're trying to get more in the rebudgeting process and really prioritize. We're working more within the budget process and kind of expect that there's going to be a lot of issues over capital expenses."

Bill Calderwood, President, The Root Group As threats become more sophisticated, so do the solutions. Bill Calderwood, president of The Root Group Inc., said that his company is putting an increased focus on innovative solutions for the Web 2.0 threat, in particular, realtime communications and peer-to-peer applications.

"That capability is going to become more important for corporations to allow. That's kind of an area that we're looking at. How does it help your business and how do you make sure it's a safe tool for your business? We put more emphasis on the application layer. That layer of technology is becoming more and more viable and more prevalent and more in demand in the end-user communities."

David Sockol, President, Emagined Security David Sockol says that he has started to see more customers invest in data protection solutions to protect networks from increasingly sophisticated threats. Consequently, Emagined is putting more of an emphasis on data loss prevention solutions in the upcoming year.

"We're starting to see a lot of companies focus heavily on a list-based approach. Instead of trying to mitigate all of the risks, they're trying to mitigate just the most important ones. There's an uptick in the number of penetration tests being requested, and we'll be moving into that next year. We're starting to see a lot more folks talking about what projects they should or should not do based upon the funds that are allocated toward security projects."

Leo Bletnitsky, President, Desktop Valet Leo Bletnitsky said that Desktop Valet works hard just to keep his customers maintaining best security practices, such as updating antivirus software. As a result, in 2009 Desktop Valet will put increased emphasis on automation and enhancement of its managed services component so they don't have to rely on customers doing it themselves, he said.

"We're establishing policies and oftentimes people are so busy that they just don't care. Even the business owner, or executive management, they don't seem to care. We're trying to take it out of the clients' hands and keep everybody that we're working with on managed services so that we have more control. So we really don't have to rely too much on the end users or management of those end-user companies. It's going to be as much automation as possible."