How Long does it take for an Unpatached system to be attack?

New reports have shown the aver. length of time a new and or unpatched system lasts before being scanned or attack has dropped drastically. In the last 15 months it dropped from 40 min. to 18 min. This is not the end of this time compression. Many are now predicting and finally talking about Polymorphic. That is the ability to change code and attack vectors over a period of time to avoid detection by Point solutions. This will also compress. Predictions are now being made that new worm variants known as Flash Worms will be able to infect within 30 secs. In comparison it took Code Red and NIMDA 20+ Hrs.

URL and or Web content filtering has a major role in Malware

Recently a new, phising scam included what appeared to be an email from AMEX. In the content it requested to check/click the box to agree to the agreement. This would launch you to a site that had been infected. This infection would have been stopped of course if the spam/email would not have gotten through but if the Web Site was check and inspected as well. URL filtering has big role and needs to be a part of an “Intelligence based solutions inspecting, analyzing, and reacting in All 7 OSI Layers Together.”

Today’s risk and attacks are different

Today’s risks and attacks are different. They are more complex, faster, and a process. See, SC Mag. Peter Stephenson June 2014 article

Fast Firewalls

In networking there is always the race to make the claim of being the fastest. Recently 1 Terabit Firewall was announced. Like all systems make sure you know the testing metrics. In reality with the correct system architecture, common process can obtain this speed. It is the interface cards and the ability to handle multiple functions under load that is the real issue. ASIC based system claim speed but when under load of AV, AS, IDS, WAF, Malware Protection, DDOS protection, there performance drops drastically.

Getting past 2 Factor Authentication

It was once believed that to be safe you just needed to require and or strengthen authentication. So, companies came up with 2 factor authentication. Today, cyber criminals have figured out how to get around it. Some of the same attributes are showing up here as well, they are 1. Sheer Volume, 2. Sophistication of the Attack, and 3. The ability to get around 2 factor authentication as part of a process. That process includes Malware, Rogue DNS, Android Malware, Phishing, spam, and etc.

Barrier1 integrates its 2 factor authentication functions with the rest of the Intelligent Learning Platform. BY using all components as a sensor Barrier1 uses key attributes to feed the on-board Dbase and thus used by the extensive suite of algorithms. This extensive and deep analytics delivers greater Effectiveness and Accuracy. All in real time.

Adding URL Filtering to a 5 yr. old platform

Adding another component such as URL Filtering to an already existing platform one would think would be common place by now. The reality is purpose built platforms were not designed with that in mind. When you adhere to standards and have a platform or system architecture that was designed as a component it makes sense in many ways.

In Barrier1 case, every aspect is treated as a component. The system architecture was designed to support additional components. In other words, it will not affect speed. As chips become continue to increase in number of cores and clock speed the overall performance just continues to go increase. Last, it brings new meaning to Return on Investment.

Barrier1 is one of the few platforms designed with those aspects in mind.

GameOver is not over- but back. So GameOn
Malware is mutating faster than ever. In addition Operation Tovar did not take down all of the Gameover Zeus Botnet as set out by the Lawsuit of several years ago. New versions are out and showing up.

New version now are really a process made up of several steps. An example is a Sandbox detector is installed. So, if you are using a Sandbox to detect forget about it. The Cyber Criminals will be able to detect the use and get around it. Barrier1 not only stops individual steps but has a series of checks and balances native to Barrier1 operation.

For further information see Barrier1 White Paper on how we stop GameOver.

Barrier1 secures Apple IPad for 1:1 Inititives

Barrier1 has introduced clientless security functions for the Apple IPad. In fact we are using these additional feature set on a 4 year old Barrier1 appliance.
A trend in k-12 education is having students receive a portable computer, Laptop or Tablet, to be used 24×7 during the school year. This is known as a 1:1 inititive. Barrier1 can now insure appropriate use by the students of Apple IPad 24×7 regardless of where they are using the device. Along with web content filter, Barrier1 will inspect all traffic for Virus, Malware, Trojans, and etc.

Another Cisco End of Life Product

It was recently announced by Cisco that there Web Application Firewall is now end of life. Web Application Firewalls are part of the PCI compliance requirements. It appears that Cisco policy of End of Life is now more about their own bottom line than the customers best interest.
It is time for a change. Barrier1 includes software enhancements as part of the yearly renewal program.

IP space is finally used up

IP space is finally used up. We are now faced with IPv6. Barrier1 has been IPv6 ready for over 5 years.