Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades, anti-virus software changed to do far more than just signature-based virus blocking. Today, the question is whether the type of anti-malware product that evolved from virus checking can transform again to be a part of a "breach detection system," or BDS
"The premise of breach detection is things will get through all your defenses and you need to contain it as soon as possible," says Randy Abrams, research director at NSS Labs, which has begun testing what it calls BDS products that can identify evidence of stealthy cyberattacks, track down what corporate computers and networks were hit and quickly mitigate against any malware dropped in that attack which would be used to spy and exfiltrate sensitive data. BDS products, however they do it -- through sandboxing, an endpoint agent or other approach -- should be able to at least catch the breach within 48 hours, he says.
BDS products are largely immature, Abrams acknowledges, but enterprise customers are keenly interested in them and asking to have them independently tested. NSS Labs started doing that last year with products from AhnLab as well as FireEye and Fidelis Security, which was acquired by General Dynamics. These three did fairly well in that first round of basic testing, Abrams says. But the main limitations appeared to be there needs to be more protocol analysis done in to ensure attackers don't have "a hidden tunnel out of the enterprise," he adds. The next round of BDS tests anticipated for later this year will be tougher, he says.
+More on Network World: McAfee plans enterprise security package for fast threat detection and response | Is rapid detection the new prevention? | IDC tabs Specialized Threat Analysis & Protection' as new segment +
The vendors that NSS Labs consider to be part of the emerging BDS market today include Cisco, FireEye, Symantec, McAfee, Palo Alto Networks, Damballa, Fidelis and AhnLab. The security industry itself is abuzz with the utterances of "indicators of compromise," the "IOC" clues such as anomalous outbound traffic that might indicate an attacker successfully broke in. Abrams thinks any BDS will need a centralized management reporting system and probably a lot of cloud-based analysis of gathered threat data.
Where this will all go is uncertain. The term BDS isn't universally applied as a description. One research firm, IDC, last year started tracking what it calls "Specialized Threat Analysis and Protection" as a new segment that seems similar to BDS.
The question is whether the established vendors in the traditional antivirus industry, particularly Symantec and McAfee which lead in market share, can transition over to anything close to the NSS Labs' view of BDS. Abrams notes the problem with any anti-malware product, however good, is that criminals determined to break into corporations are testing the attack and espionage code they've developed for that against existing antivirus products to find something that will get through and not be noticed, at least for a while.
McAfee and Symantec do appear to be making a move for what's still the largely unmarked trail to the type of BDS described by NSS Labs.
McAfee for example has its Advanced Threat Defense products for sandboxing, plus its "Real Time" remediation push that uses its anti-malware software. Other efforts that include its so-called "Threat Intelligence Exchange" won't be out until mid-year but it's supposed to help identify evidence that endpoints have been compromised and allow for a rapid "immunization" of assets.
At the recent RSA Conference, Symantec's senior vice president of security intelligence and technology, Stephen Trilling, gave a keynote address entitled "The Future of Security." And his presentation before thousands of RSA attendees sounded a lot like a BDS. Trilling's presentation, available here in video, goes into complex detail on how targeted attacks could be countered with help of "massive cloud-based reporting" gathered from a wide array of security host and network sources, to identify a suspicious e-mail used in phishing and what company employee got it.
Is this just security information and event management (SIEM) all over again? "Not at all," said Trilling. "SIEMs are intended to mine data in one company," and they hardly ever do that in minutes or hours, he said. What Symantec envisions is a way to determine there's a targeted attack through continuous monitoring, whether it comes inside the enterprise network on premises, in the cloud or at an employee's mobile device, and control remediation.
Symantec declined to say more about what exactly it has in mind with all this talk of the future of security, but Abrams says the company is working on what he'd call BDS. "The cloud has helped them correlate the data," says Abrams, adding any BDS should be looking at the internal communications inside a company.
Ellen Messmer is senior editor at Network World, an IDG website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: firstname.lastname@example.org
Read more about wide area network in Network World's Wide Area Network section.