Intelligent network security and data protection solutions provider, SonicWall, has expanded its suite of firewall security services with the addition of Kaspersky Anti-Virus to its Enforced Client Anti-Virus and Anti-Spyware solution.
SonicWall Firewalls are designed to ensure easy deployment, provisioning and enforcement of the client on endpoint devices through a unique policy-driven engine.
SonicWall Next-Generation and Unified Threat Management firewalls already provide gateway anti-virus through SonicWall’s proprietary reassembly-free deep packet inspection anti-malware solution, protecting the perimeter, wireless and VPNs. But, according to SonicWall, viruses can still enter the network through laptops, thumb drives or other unprotected systems. Protection at multiple layers is the best defence against sophisticated modern threats, however, maintaining, enforcing and deploying the right security software on endpoint devices can put a strain on IT resources and budgets. SonicWall firewalls are designed to provide an innovative multi-layered anti-malware strategy consisting of its anti-malware solution at the gateway and enforced anti-virus solution at the endpoints.
When a non-compliant end-point within the network tries to connect to the internet, the firewall will redirect the user to a web page to install the latest SonicWall Enforced Client Anti-Virus and Anti-Spyware software. The firewall is also designed to ensure that all the end-point clients are automatically updated with the latest anti-virus and anti-spyware signatures without end-user intervention. The updated clients can remediate infections by cleansing the endpoint systems and thus preventing further propagation of the threat throughout the network. SonicWall has integrated Kaspersky technology into its enforced client solution. The software resides on endpoint computers and delivers critical protection against viruses, spyware, Trojans, worms, rootkits and more. “Deploying, maintaining and enforcing the right security software on endpoint devices within a network can be difficult,” said Swarup Selvaraman, product line manager at SonicWall. “Our innovative SonicWall solution simplifies this process and gives IT managers’ easy-to-deploy anti-virus and anti-spyware protection across any number of devices using policy-based management and reporting. Kaspersky support bolsters our existing offering and gives customers more opportunities to choose the anti-virus solution that best meets their needs.” The solution is designed to support Microsoft Windows PCs and laptops and is ideal for deployments scaling from a few to thousands of end-points.
In a recent article posted on Network World, Qualys; a security firm specializing in vulnerability scanning and assessment says they are ready to go public. Based on my experience with the product I would have to agree that this would be a good decision. Regarding the fact that I have used, and currently using Qualys on a contract position, many hours have been spent using and abusing these appliance(s). I have witnessed first hand the ways the scanning engines have morphed into a dependable tool with low false positives. Offering more asset control to the administrator than in recent years, and the overall performance issues that have been handled through it’s generations have made this product ready for prime time. Apparently I am not the only one who thinks so – with over 5,000 appliances currently running on production environments world wide.
“Courtot says the company did about $76 million in revenue last year, showing profitability, and expects to see revenues grow to $94 million this year,” Messmer writes. “Its variety of products, and scanning and compliance services, have become widely used by about 5,000 organizations around the world.”
For the full story click here: http://www.networkworld.com/news/2012/022112-qualys-ipo-256396.html
- The 8 Best Tips You’ll Ever Get On How To Launch (And Grow) A Startup (businessinsider.com)
Assessing Your Wireless Network Security
Wireless network penetration testing—using tools and processes to scan the network environment for vulnerabilities—helps refine an enterprise’s security policy, identify vulnerabilities, and ensure that the security implementation actually provides the protection that the enterprise requires and expects. Regularly performing penetration tests helps enterprises uncover WLAN network security weaknesses that can lead to data or equipment being compromised or
destroyed by exploits (attacks on a network, usually by “exploiting” a vulnerability of the system),Trojans (viruses), denial of service attacks, and other intrusions.
Here is a great article I was reading on Cisco blogs and found it useful to post. Enjoy!
Sampa Choudhuri – Network security is a never-ending task; it requires ongoing vigilance. Securing your wireless network can be particularly tricky because unauthorized users can quietly sneak onto your network, unseen and possibly undetected. To keep your WLAN secure, it’s important to stay on top of new wireless vulnerabilities. By regularly performing a vulnerability assessment on your wireless network, you can identify and close any security holes before a hacker can slip through them.
With a WLAN vulnerability assessment, you’re figuring out what your wireless network looks like to the outside world on the Internet. Is there an easy way in to your network? Can unauthorized devices attach themselves to your network? A WLAN vulnerability assessment can answer these questions—and more.
1. Discover wireless devices on your network. You need to know everything about each wireless device that accesses your network, including wireless routers and wireless access points(WAPs) as well as laptops and other mobile devices. The scanner will look for active traffic in both the 2.4GHz and 5GHz bands of your 802.11n wireless network. Then, document all the data you collect from the scanner about the wireless devices on your network, including each device’s location and owner.
2. Hunt down rogue devices. Rogue devices are wireless devices, such as an access point, that should not be on your network. They should be considered dangerous to your network security and dealt with right away. Take your list of devices from the previous step and compare it to your known inventory of devices. Any equipment you don’t recognize should be blocked from network access immediately. Use the vulnerability scanner to also check for activity on any wireless bands or channels you don’t usually use.
Read the 5 Steps here:
- Biggest Wireless Threat….. The Admins? (netsecurityit.wordpress.com)
Trojan malware evolving swiftly as hackers customise code according to their needs
Citadel banking Trojan evolving through ‘open source’ development
Citadel, a computer Trojan that targets online banking users, is evolving and spreading rapidly because its creators have adopted an “open source” development model, according to researchers from cyberthreat management firm Seculert. The new piece of malware is based on ZeuS, one of the oldest and most popular online banking Trojans. ZeuS was abandoned by its creator in late 2010 and its source codeleaked online a few months later.
“Seculert’s Research Lab discovered the first indication of a Citadel botnet on December 17th, 2011,” the security company claimed. “The level of adoption and development of Citadel is rapidly growing.”
Seculert has identified over 20 botnets that use different versions of this Trojan. “Each version added new modules and features, some of which were submitted by the Citadel customers themselves,” the company said.
The most interesting aspect of Citadel is its development process, which is similar to the ones behind community-supported open source projects. “Similar to legitimate software companies, the Citadel authors provide their customers with a User Manual, Release Notes and a License Agreement,” Seculert said.
- Read More Here: http://www.computerworld.com/s/article/9224112/Citadel_banking_malware_is_evolving_and_spreading_rapidly_researchers_warn
- Citadel Banking Malware Is Evolving and Spreading Rapidly, Researchers Warn (pcworld.com)
- Malware devs embrace open-source (go.theregister.com)
- Collaboration Fuels Rapdid Growth of Citadel Trojan (krebsonsecurity.com)