Posts Tagged ‘Technologies’

Top 10 information security technologies listed

July 9th, 2014

Gartnerrecently highlighted the top ten technologies for information security and their implications for security organizations in 2014.

“Enterprises are dedicating increasing resources to security and risk. Nevertheless, attacks are increasing in frequency and sophistication. Advanced targeted attacks and security vulnerabilities in software only add to the headaches brought by the disruptiveness of the Nexus of Forces, which brings mobile, cloud, social, and big data together to deliver new business opportunities,” says Neil MacDonald, vice president and Gartner Fellow. “With the opportunities of the Nexus come risks. Security and risk leaders need to fully engage with the latest technology trends if they are to define, achieve, and maintain effective security and risk management programs that simultaneously enable business opportunities and manage risk.”

The top 10 technologies for information security are:

Cloud Access Security Brokers

Cloud access security brokers are on-premises or cloud-based security policy enforcement points placed between cloud services consumers and cloud services providers to interject enterprise security policies as the cloud-based resources are accessed. In many cases, initial adoption of cloud-based services has occurred outside the control of IT, and cloud access security brokers offer enterprises to gain visibility and control as its users access cloud resources.

Adaptive Access Control

Adaptive access control is a form of context-aware access control that acts to balance the level of trust against risk at the moment of access using some combination of trust elevation and other dynamic risk mitigation techniques. Context awareness means that access decisions reflect current condition, and dynamic risk mitigation means that access can be safely allowed where otherwise it would have been blocked. Use of an adaptive access management architecture enables an enterprise to allow access from any device, anywhere, and allows for social ID access to a range of corporate assets with mixed risk profiles.

Pervasive Sandboxing (Content Detonation) and Inversion-of-Control Confirmation

Some attacks will inevitably bypass traditional blocking and prevention security protection mechanisms, in which case it is key to detect the intrusion in as short a time as possible to minimize the hacker’s ability to inflict damage or exfiltrate sensitive information. Many security platforms now include embedded capabilities to run (“detonate”) executables and content in virtual machines (VMs) and observe the VMs for indications of compromise. This capability is rapidly becoming a feature of a more-capable platform, not a stand-alone product or market. Once a potential incident has been detected, it needs to be confirmed by correlating indicators of compromise across different entities—for example, comparing what a network-based threat detection system sees in a sandboxed environment to what is being observed on actual endpoints in terms of processes, behaviors, registry entries and so on.

Endpoint Detection and Response Solutions

The endpoint detection and response market is an emerging market created to satisfy the need for continuous protection from advanced threats at endpoints (desktops, servers, tablets and laptops)—most notably significantly improved security monitoring, threat detection and incident response capabilities. These tools record numerous endpoint and network events and store this information in a centralized database. Analytics tools are then used to continually search the database to identify tasks that can improve the security state to deflect common attacks, to provide early identification of ongoing attacks (including insider threats), and to rapidly respond to those attacks. These tools also help with rapid investigation into the scope of attacks, and provide remediation capability.

Big Data Security Analytics at the Heart of Next-generation Security Platforms

Going forward, all effective security protection platforms will include domain-specific embedded analytics as a core capability. An enterprise’s continuous monitoring of all computing entities and layers will generate a greater volume, velocity, and variety of data than traditional security information and event management systems can effectively analyze. Gartner predicts that by 2020, 40% of enterprises will have established a “security data warehouse” for the storage of this monitoring data to support retrospective analysis. By storing and analyzing the data over time, and by incorporating context and including outside threat and community intelligence, patterns of “normal” can be established and data analytics can be used to identify when meaningful deviations from normal have occurred.

Machine-readable Threat Intelligence, Including Reputation Services

The ability to integrate with external context and intelligence feeds is a critical differentiator for next-generation security platforms. Third-party sources for machine-readable threat intelligence are growing in number and include a number of reputation feed alternatives. Reputation services offer a form of dynamic, real-time “trustability” rating that can be factored into security decisions. For example, user and device reputation as well as URL and internet protocol address reputation scoring can be used in end-user access decisions.

Containment and Isolation as a Foundational Security Strategy

In a world where signatures are increasingly ineffective in stopping attacks, an alternative strategy is to treat everything that is unknown as untrusted and isolate its handling and execution so that it cannot cause permanent damage to the system it is running on and cannot be used as a vector for attacks on other enterprise systems. Virtualization, isolation, abstraction, and remote presentation techniques can be used to create this containment so that, ideally, the end result is similar to using a separate “air-gapped” system to handle untrusted content and applications. Virtualization and containment strategies will become a common element of a defense-in-depth protection strategy for enterprise systems, reaching 20% adoption by 2016 from nearly no widespread adoption in 2014.

Software-defined Security

“Software defined” is about the capabilities enabled as we decouple and abstract infrastructure elements that were previously tightly coupled in our data centers: servers, storage, networking, security, and so on. Like networking, compute, and storage, the impact on security will be transformational. Software-defined security doesn’t mean that some dedicated security hardware isn’t still needed—it is. However, like software-defined networking, the value and intelligence moves into software.

Interactive Application Security Testing

Interactive application security testing (IAST) combines static application security testing (SAST) and dynamic application security testing (DAST) techniques. This aims to provide increased accuracy of application security testing through the interaction of the SAST and DAST techniques. IAST brings the best of SAST and DAST into a single solution. This approach makes it possible to confirm or disprove the exploitability of the detected vulnerability and determine its point of origin in the application code.

Security Gateways, Brokers, and Firewalls to Deal with the Internet of Things

Enterprises, especially those in asset-intensive industries like manufacturing or utilities, have operational technology (OT) systems provided by equipment manufacturers that are moving from proprietary communications and networks to standards-based, internet protocol-based technologies. More enterprise assets are being automated by OT systems based on commercial software products. The end result is that these embedded software assets need to be managed, secured, and provisioned appropriately for enterprise-class use. OT is considered to be the industrial subset of the “Internet of Things,” which will include billions of interconnected sensors, devices, and systems, many of which will communicate without human involvement and that will need to be protected and secured.

Source:http://www.ababj.com/component/k2/item/4745-top-10-information-security-technologies-listed

Short Interest in Check Point Software Technologies Rises By 35.1% (CHKP)

June 5th, 2014

Shares of Check Point Software Technologies (NASDAQ:CHKP) saw a large growth in short interest during the month of May. As of May 15th, there was short interest totalling 2,497,771 shares, a growth of 35.1% from the April 30th total of 1,848,929 shares, American Banking & Market News reports. Based on an average daily volume of 1,095,300 shares, the short-interest ratio is currently 2.3 days. Approximately 1.8% of the shares of the company are short sold.

A number of research firms have recently commented on CHKP. Analysts at Zacks reiterated a “neutral” rating on shares of Check Point Software Technologies in a research note on Thursday, May 1st. They now have a $67.00 price target on the stock. Separately, analysts at Topeka Capital Markets reiterated a “buy” rating on shares of Check Point Software Technologies in a research note on Wednesday, April 30th. They now have a $72.50 price target on the stock. Finally, analysts at JPMorgan Chase & Co. reiterated an “overweight” rating on shares of Check Point Software Technologies in a research note on Wednesday, April 30th. They now have a $69.00 price target on the stock. Five investment analysts have rated the stock with a hold rating and thirteen have issued a buy rating to the company. The company presently has an average rating of “Buy” and an average target price of $70.08.

Shares of Check Point Software Technologies (NASDAQ:CHKP) opened at 64.44 on Thursday. Check Point Software Technologies has a 52-week low of $48.00 and a 52-week high of $69.92. The stock has a 50-day moving average of $65.05 and a 200-day moving average of $64.9. The company has a market cap of $12.374 billion and a P/E ratio of 19.33.

Check Point Software Technologies (NASDAQ:CHKP) last issued its earnings results on Tuesday, April 29th. The company reported $0.84 EPS for the quarter, beating the Thomson Reuters consensus estimate of $0.83 by $0.01. The company had revenue of $342.00 million for the quarter, compared to the consensus estimate of $341.92 million. During the same quarter in the prior year, the company posted $0.79 earnings per share. The company’s quarterly revenue was up 6.0% on a year-over-year basis. On average, analysts predict that Check Point Software Technologies will post $3.63 earnings per share for the current fiscal year.

Check Point Software Technologies Ltd. (NASDAQ:CHKP) develops technologies to communications and transactions over the Internet by enterprises and consumers.

Source:http://www.wkrb13.com/markets/317925/short-interest-in-check-point-software-technologies-rises-by-35-1-chkp/

Build: Microsoft Azure embraces outside technologies

April 4th, 2014

As it rolled out tools and features for coders at its Build developer conference Thursday, Microsoft showed that it is ready to embrace technologies and platforms not invented within its walls.

Rather than relying solely on internal tools, the Azure cloud services platform has incorporated a number of non-Microsoft technologies, including popular open source tools such as the Chef and Puppet configuration management software, the OAuth authorization standard, and the Hadoop data processing platform.

The company has also taken steps to incorporate open source into its product roadmaps, by releasing the code for its new compiler and setting up a foundation for managing open source .Net projects.

“Clearly Microsoft’s message is its support of multi-platform. It will take any part of your stack, it doesn’t have to be just Microsoft software,” said Al Hilwa, IDC research program director for software development. “This is good for Microsoft and good for the ecosystem.”

Microsoft’s Azure strategy is to “enable developers to use the best of Windows ecosystem and the best of the Linux ecosystem together … and one that enables you to build great applications and services that work on every device,” Scott Guthrie, Microsoft’s new executive vice president overseeing the cloud and enterprise group, told the audience of developers and IT professionals.

On the developer side, the company announced that it has open-sourced its next generation compiler for C# and Visual Basic, code-named Roslyn.

To date, compilers have been “black boxes,” explained C# lead architect Anders Hejlsberg.

Roslyn is unique as a compiler because has a set of APIs (application programming interfaces) that can feed information about a project as it is being compiled to Microsoft’s Visual Studio IDE (integrated development environment) and third-party development tools.

Hejlsberg demonstrated how Visual Studio can offer helpful tips through an “interactive prompt,” using feedback from the compiler. For instance, it can flag libraries that have been called but not used in the program code.

Microsoft is hoping that other vendors will incorporate the API into their software development tools. Developers can also now add their own features into C# and have the compiler recognize them. Open-sourcing the compiler may also lead to efforts to create versions of C# for other platforms.

The company released Visual Studio 2013 Update 2 Release Candidate.

One new capability allows for two-way communication between the Visual Studio IDE and browsers.

Source:http://www.itworld.com/cloud-computing/413028/build-microsoft-azure-embraces-outside-technologies

Get Adobe Flash player