It’s getting more and more difficult to find one-size-fits-all Information Technology, and perhaps the area where this is the truest is in enterprise security.
It’s not even enough to classify networks by the longtime descriptor of “SMB” or “Enterprise.” A business with 10 employees can have a million customers—which would make it a small business with a set of Fortune 500 IT requirements.
Businesses split their technology between their own, internal data centers and hosted solutions. They split between Windows and Linux; desktop endpoints, mobile endpoints and virtual endpoints.
And just when the industry starts tempting you to believe security has finally caught up, along comes information like this, which was posted just this month by the University of Hawaii:
“The University of Hawaii at Manoa today began notifying approximately 53,000 individuals listed in a system database, housed on a computer server used by the Parking Office, that a recent security breach may have exposed personal information— including approximately 40,870 Social Security numbers and 200 credit card numbers.”
Universities are institutions that not only lead the way in teaching about IT security, they lead the way in many cases in developing IT security -- including best practices. How this university wound up grappling with a breach of this size will be one for the auditors to figure out. For now, for the purposes of this month’s CRNtech, let’s just look at it like this:
Network security is never “one-size-fits-all” anymore, and learning that the hard way can be a lot more uncomfortable than a tight pair of pants.
For this month’s roundup, we looked at three separate networkfocused security solutions to examine what types of IT networks might best use them in handling the constantly changing threat landscape. We liked them all, and found that VARs could deliver them into customer enterprises with nice value.
NEXT: Trend Micro Deep Security 7.0
Trend Micro Deep Security 7.0
Trend Micro has spent a lot of time and resources working to tailor its security technology to maximize the growth of cloud-based IT. The company describes the latest version of its Deep Security franchise, Deep Security 7.0, as a collection of “Protection Modules,” including deep packet inspection, firewall, integrity monitoring and log inspection. Because Deep Security 7.0 provides security at the server layer -- whether that’s a virtual server or hosted server -- Trend Micro says this is a solution that can provide security from on-premise iron to the cloud.
We installed this software on a virtual Windows Server 2003 in the CRN Test Center Lab, a process that took about a half hour. From this VM, Deep Security 7.0 ran a quick asset inventory and located both physical and virtual computers. The management console of the software provides a VAR or administrator with one interface for management of computers, security profiles, firewall events and rules, DPI events and rules and more.
Task scheduling is fine, and allows tasks ranging from openport scans to software updates to computer discovery tasks to be scheduled on an hourly basis through a weekly basis. We ran several different baseline tests to make sure it worked, and found that it was able to correctly search for open ports, and ran a successful inventory check, for example.
The firewall provides 71 different prewritten rules by action type, which can be assigned by groups ranging from mobile devices to desktops. The rules are written for the needs of both physical devices as well as virtual devices; Deep Security 7 allows firewall rules to be written for VMware vCenter Servers, to monitor packet traffic.
Application control allows for the control of file-sharing services (like Kazaa) or IM services, from AIM to Skype to ICQ from within a network. We wanted to create a rule to ban use of Skype. But the application control feature does provide a warning that Skype use can’t be prevented because of the “flexibility of the protocol.” Instead, it allows for alerts to be provided at customized intervals when Skype is used on a network. The same is true for ICQ, for example.
Trend Micro prices Deep Security 7 on a per-server basis starting at $885 per license, with virtual server licenses available for VMware environments, with unlimited agents per host, starting at $2,100.
We’re control freaks, so we would have preferred that Deep Security 7.0 provide the option to ban instant messaging or other applications, but that’s nitpicky considering that other solutions exist to do that and Trend Micro provides so many other benefits for providing security in any manner of environments.
NEXT: Kaspersky Lab’s Kaspersky Business Space Security/Kaspersky Administration Kit
Kaspersky Lab’s Kaspersky Business Space Security/Kaspersky Administration Kit
So, we started this off by talking about how one size doesn’t fit all and now we’re going to shift into a discussion of Kaspersky Administration Kit, which is an element of its Space Security software that, in many ways, attempts to allow one size to fit all. Well, it sort of does.
The solution is designed to allow for organizing and managing security throughout an entire network, from PCs and servers running Windows and Linux to mobile devices on Windows Mobile and Symbian handhelds. That’s a tall order in a segment that is continually pressing the issue on specialization for security in every segment and at every milepost on the IT road map.
But Kaspersky Administration Kit does a couple of things so well for smaller enterprises that we believe it’s a must-consider:
•It provides simple, straightforward installation on either a server or PC, allowing for quick and simple deployment in minutes.
•Its “Managed Computers” console gives VARs or system administrators quick and easy capability to inventory, configure and manage PCs on a network -- from task-creation to simple antivirus deployment for PCs.
•Report creation and management, which is a necessary means of compliance in many scenarios, even for the smallest of businesses, is a breeze -- which we’ve found isn’t necessarily always the case. Reports are graphical, real-time and provide nice data on antivirus database usage, incompatible applications, license usage, virus reports and a full spectrum of information.
Kaspersky Business Space Security is priced at $390 for a license for 10 workstations or file servers for a year, which is competitive.
NEXT: Symantec AntiVirus for Caching
Symantec AntiVirus for Caching
We’ve looked at a number of Symantec products over the years, and the company’s technology has always been solid and taken sound approaches to business IT security.
Earlier this year, in fact, the CRN Test Center reviewed Symantec’s End Point Protection Small Business Edition, and found the company was offering a solution for smaller enterprises that did three important tasks of note for VARs: it cut out cost, it cut out complexity, and it stopped threats.
But the company has also spent hundreds of millions of dollars over the years developing technology that could be deployed for very specific tasks on a network. With that in mind, we took a closer look at Symantec’s AntiVirus for Caching.
With performance a never-ending issue for networks, a neat little optimization solution is the use of caching to speed up delivery of data to endpoints. But viruses -- which focus on leveraging enterprise soft spots, like some caching appliances -- can appear, and create havoc, on just about any node on a network.
Symantec AntiVirus for Caching, once installed, is browser-based and provides for higher-performance virus scanning and repair services over HTTP traffic that is served through a caching device. Its aim: to make sure that infected files don’t pass through that device and spread throughout a network.
The software works on Windows 2008 32-bit and 64-bit, Windows Server 2003 32-bit and 64-bit, Red Hat Enterprise Linux 5.x 32-bit and 64-bit, Solaris SPARC 9 and 10 32-bit, and several others; it also works with Mozilla Firefox 1.5 or later and Internet Explorer 6 SP1 or later.
We installed the software on Windows Server 2003 32-bit. A word of note: The software requires Java Runtime Environment 1.5 build 13 or greater, but having JRE 1.6 didn’t do the trick. We still needed to go back and install the 1.5 version.
Virus definitions were updated via Symantec’s LiveUpdate Administration utility, which ensures viruses that make their way into a cache appliance are covered the same way as viruses that enter a server or PC.
Once the software is installed on a management console, it can work on caching appliances, including Blue Coat’s Proxy SG, Network Appliance’s NetCache and Cisco’s ACNS Content Engines.
Pricing was not immediately available.
Not all networks use caching devices, but those that do will want to adhere to best practices and make sure that compliance issues are front, center and clear, and are handled in a straightforward manner. For those enterprises that use a caching device and enjoy the performance benefits they bring, considering integration of Symantec’s technology would be well worth the time.
IT security is becoming more fragmented over time, not less fragmented, in the types of offerings, approaches, pricing scales and complexity available to VARs and their customers. It’s also going to get more fragmented, not less fragmented, over time as IT itself becomes more complex.
The common thread for all of the above three solutions is that their antivirus performance has been tested and has been trustworthy over time, and each has an established channel program and experience at working with VARs.
Each also provides an approach that can be tailored for specific solutions: In the case of Trend Micro’s Deep Security 7.0, it’s terrific for enterprises that take a hybrid approach to IT that includes standard on-premise servers as well as either virtualization or cloud-based solutions. For Kaspersky, we like the way the company has delivered significant enterprise-level antivirus and management capabilities in a sensible way for small business to participate. In the case of Symantec, we see that the company is able to deliver its technology nicely beyond PCs and servers into the world of appliances -- in this case, caching appliances that may be forgotten by security audits in some networks.
While 2010 is a year of transition in many regards for IT and IT security (considering cloud and mobility technologies that are driving a lot of change), we believe VARs can show some confidence in each of these three vendors moving forward to be ready to deploy security regardless of how this transition shakes out.
COMMUNITY: Connect with the CRN Test Center at community.crn.com