SlideShare a Scribd company logo
1 of 16
Security and Control for Critical Infrastructure

       Introduction to BOUNCER by CoreTrace™




                    January 2009

                                     ©2009 CoreTrace Corporation. All rights reserved.
Introduction to CoreTrace


CoreTrace protects critical environments with high-security, easy change
application whitelisting.


            • CoreTrace is one of “Top 10 Security Companies to Watch in 2009.”
 Industry
            • BOUNCER named one of “Best Security Solutions.”
Accolades
            • Bouncer earns an “A” grad.




Customers




                                                                     ©2009 CoreTrace Corporation. All rights reserved.
Today’s Endpoint Control Challenges




                                      ©2009 CoreTrace Corporation. All rights reserved.
Traditional Endpoint Security


 Reactive response to new malware
                                                           User Actions
                                                           Vulnerabilities
 Reactive discovery of unauthorized                      Compliance Reqs
 applications                                                Malware
                                                         Unauthorized Apps
                                                                ...
 Reactive and rushed patching of
 new vulnerabilities

 Reactive recovery from malicious or
 accidental user actions

 Reactive efforts to meet compliance
 requirements




                                       ©2009 CoreTrace Corporation. All rights reserved.
NERC Compliance


 Responsible entity shall:
     Limit ports and services to those required
     Document implementation of security patches or have compensating control
     Prevent malicious software
     Monitor events, preventing unauthorized change to systems (CIP-007-R2, R3.2, R4, R6)

 Challenges
     Feasibility
     Cost
     True benefit to security of critical infrastructure




                                                                  ©2009 CoreTrace Corporation. All rights reserved.
Example:
Tennessee Valley Authority



           WASHINGTON (CNN) — The nation's largest publicly owned utility company
           may be vulnerable to cyber attacks, according to a new report. May 21, 2008




Government watchdog agency findings:

  Firewalls have been bypassed or are inadequately configured

  Passwords are not effective

  Servers and workstations lack key patches and effective virus protection

  Intrusion-detection systems are not adequate




                                                                  ©2009 CoreTrace Corporation. All rights reserved.
Fundamental Shift in Endpoint Control Offerings




    Application Whitelisting        “Trusted Change”
        Only allow KNOWN              Transparently add
     and approved applications   new applications or upgrades
            to execute.                  to whitelists.




                                           ©2009 CoreTrace Corporation. All rights reserved.
Kernel-Level Application Whitelisting


                        Whitelisted            Rogue                           “BOUNCER
 User Space             Application          Application
                                                                            stopped 100% of
                                                                           the entered viruses
                                                                             while traditional
 Kernel Space / OS                                                           blacklist-based
                                                                            antivirus solutions
                                                                               detected an
                                                                            average of 60%.”
 System Resources
                                                                             Simon Howard
                                                                              DEFCON 16
                                                                             Race to Zero”
 Enforce a whitelist of approved applications only                             Organizer

 Enable dynamic updates to whitelist from trusted sources
 Provide memory protection
 Utilize minimal system resources


                                                           ©2009 CoreTrace Corporation. All rights reserved.
“Trusted Change”:
Easy, Immediate, and Ongoing Endpoint Control


         Establish                       Deploy                  Auto-Generate
      Trust Models in              BOUNCER Client to            Custom Whitelist
    Administrator Console          Multiple Endpoints          for Each Endpoint



    Trusted Updater:
    SMSAdmin.exe

    Trusted Application:
    Project.msl                                                 Automatically
                                                               Enforce Whitelist
    Trusted Network Share:
                                                            (Stopping Unauthorized
    servershare
                                                            Applications & Malware)
    Trusted User:
    CORPTomJ                        Update Custom
                                     Whitelist for New
    Trusted Digital Certificate:
                                   Trusted Applications
    Microsoft Windows



                                                            Report on Security or
                                                            Configuration Issues




                                                          ©2009 CoreTrace Corporation. All rights reserved.
The Benefits of Shifting the Focus


 Proactive elimination of all malware

 Proactive elimination of
 unauthorized applications

 Measured and well-tested
 patching                                                          Approved
                                                                  Applications
 Proactive elimination of malicious or
 accidental user actions

 Reduction of Help Desk requests
 and reimaging efforts

 Automatically meet compliance
 requirements


                                         ©2009 CoreTrace Corporation. All rights reserved.
Enabling CIP Compliance with BOUNCER


 Limit ports and services to those required
     BOUNCER controls network access within the operating system, limiting ports and protocols.

 Document implementation of security patches or have compensating control
     BOUNCER provides compensating control for systems where patching is not possible, practical,
     or affordable and protects systems in legacy environments.

 Prevent malicious software
     BOUNCER prevents all unauthorized change, including all malware — such as zero-day
     attacks, rootkits, buffer overflows, etc.

 Monitor events and prevent unauthorized change to systems
     BOUNCER provides monitoring and reporting of events and attack attempts.




                                                                   ©2009 CoreTrace Corporation. All rights reserved.
Case Study:
City Public Service Energy (CPS Energy)



            ✘Difficulty in running and updating antivirus
            ✘Unable to patch consistently due to legacy systems
 Problem
            ✘Need to enforce configuration control
            ✘Need to protect and control systems for NERC-CIP compliance


            ✔ Protect all Windows systems in SCADA control environments
            ✔ Provide compensating control for regulatory and audit
 Solution
              requirements
            ✔ Ensure security between patching opportunities and on legacy system


              Increase system reliability
              Compliance with applicable NERC-CIP requirements
 Benefits
              Able to use a single solution across platforms and requirements




                                                                       ©2009 CoreTrace Corporation. All rights reserved.
BOUNCER Technical Overview & Demonstration




                                  ©2009 CoreTrace Corporation. All rights reserved.
BOUNCER Is a
Turnkey Application Whitelisting Solution


 Three-tiered secure, scalable infrastructure

 Secures:
     Desktops, laptops, and servers
     Fixed, mobile, or disconnected systems

 Low-impact on endpoint performance

 Multi-platform:
     Windows NT 4, 2000, XP, Server 2003
     Solaris 7-10
     Windows Server 2008/Windows Vista (Q2CY09)

 Patented kernel-based network security
 infrastructure



                                                  ©2009 CoreTrace Corporation. All rights reserved.
Unique Capabilities of BOUNCER


 “Trusted Change” that leverages your EXISTING change processes and
 technologies

 Secure, tamper-proof architecture

 Auto-generated whitelists accelerate deployment

 Extended security platform (e.g., memory protection, network filtering)

 Multi-platform coverage




                                                        ©2009 CoreTrace Corporation. All rights reserved.
Summary


 BOUNCER directly addresses three major endpoint challenges:
    Security
    Manageability
    Compliance

 BOUNCER simplifies endpoint control by:
    Ensuring that only approved applications can execute
    Enabling transparent additions of new applications or upgrades to the whitelist

 BOUNCER provides significant benefits:
    Proactively eliminates malware & unauthorized applications
    Enables measured and well-tested patching
    Proactively eliminates malicious or accidental user actions
    Reduce Help Desk requests and reimaging efforts
    Helps automatically meet compliance requirements




                                                                     ©2009 CoreTrace Corporation. All rights reserved.

More Related Content

What's hot

Closing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsClosing Mainframe Integrity Gaps
Closing Mainframe Integrity Gaps
Ray Overby
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
Charles McNeil
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
henkpieper
 
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORINLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
Neha Rana
 
Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
Tuan Phan
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
Symantec
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
webhostingguy
 

What's hot (20)

Closing Mainframe Integrity Gaps
Closing Mainframe Integrity GapsClosing Mainframe Integrity Gaps
Closing Mainframe Integrity Gaps
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)
 
Symantec Web Security Solutions
Symantec Web Security SolutionsSymantec Web Security Solutions
Symantec Web Security Solutions
 
2011 App Failures - Year in Review CAST
2011 App Failures  - Year in Review CAST2011 App Failures  - Year in Review CAST
2011 App Failures - Year in Review CAST
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
 
Waterfall Security Solutions Overview Q1 2012
Waterfall Security Solutions   Overview Q1 2012Waterfall Security Solutions   Overview Q1 2012
Waterfall Security Solutions Overview Q1 2012
 
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORINLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization Security
 
Dmz aa aioug
Dmz aa aiougDmz aa aioug
Dmz aa aioug
 
Ispe Article
Ispe ArticleIspe Article
Ispe Article
 
Nebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi VerzeNebezpecny Internet Novejsi Verze
Nebezpecny Internet Novejsi Verze
 
Fedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slidesFedramp developing-system-security-plan-slides
Fedramp developing-system-security-plan-slides
 
technical overview - endpoint protection 10.3.3
technical overview - endpoint protection 10.3.3technical overview - endpoint protection 10.3.3
technical overview - endpoint protection 10.3.3
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
Control Compliance Suite 10
Control Compliance Suite 10Control Compliance Suite 10
Control Compliance Suite 10
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
 

Similar to 20090106c Presentation Custom

Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
Todd Deshane
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
Ixia
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
Webroot
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
Advantec Distribution
 

Similar to 20090106c Presentation Custom (20)

Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
BreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing SolutionBreakingPoint Storm CTM Cost-Effective Testing Solution
BreakingPoint Storm CTM Cost-Effective Testing Solution
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Ivanti Security Controls.pptx
Ivanti Security Controls.pptxIvanti Security Controls.pptx
Ivanti Security Controls.pptx
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Virtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the CloudVirtual Machine Introspection - Future of the Cloud
Virtual Machine Introspection - Future of the Cloud
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

20090106c Presentation Custom

  • 1. Security and Control for Critical Infrastructure Introduction to BOUNCER by CoreTrace™ January 2009 ©2009 CoreTrace Corporation. All rights reserved.
  • 2. Introduction to CoreTrace CoreTrace protects critical environments with high-security, easy change application whitelisting. • CoreTrace is one of “Top 10 Security Companies to Watch in 2009.” Industry • BOUNCER named one of “Best Security Solutions.” Accolades • Bouncer earns an “A” grad. Customers ©2009 CoreTrace Corporation. All rights reserved.
  • 3. Today’s Endpoint Control Challenges ©2009 CoreTrace Corporation. All rights reserved.
  • 4. Traditional Endpoint Security Reactive response to new malware User Actions Vulnerabilities Reactive discovery of unauthorized Compliance Reqs applications Malware Unauthorized Apps ... Reactive and rushed patching of new vulnerabilities Reactive recovery from malicious or accidental user actions Reactive efforts to meet compliance requirements ©2009 CoreTrace Corporation. All rights reserved.
  • 5. NERC Compliance Responsible entity shall: Limit ports and services to those required Document implementation of security patches or have compensating control Prevent malicious software Monitor events, preventing unauthorized change to systems (CIP-007-R2, R3.2, R4, R6) Challenges Feasibility Cost True benefit to security of critical infrastructure ©2009 CoreTrace Corporation. All rights reserved.
  • 6. Example: Tennessee Valley Authority WASHINGTON (CNN) — The nation's largest publicly owned utility company may be vulnerable to cyber attacks, according to a new report. May 21, 2008 Government watchdog agency findings: Firewalls have been bypassed or are inadequately configured Passwords are not effective Servers and workstations lack key patches and effective virus protection Intrusion-detection systems are not adequate ©2009 CoreTrace Corporation. All rights reserved.
  • 7. Fundamental Shift in Endpoint Control Offerings Application Whitelisting “Trusted Change” Only allow KNOWN Transparently add and approved applications new applications or upgrades to execute. to whitelists. ©2009 CoreTrace Corporation. All rights reserved.
  • 8. Kernel-Level Application Whitelisting Whitelisted Rogue “BOUNCER User Space Application Application stopped 100% of the entered viruses while traditional Kernel Space / OS blacklist-based antivirus solutions detected an average of 60%.” System Resources Simon Howard DEFCON 16 Race to Zero” Enforce a whitelist of approved applications only Organizer Enable dynamic updates to whitelist from trusted sources Provide memory protection Utilize minimal system resources ©2009 CoreTrace Corporation. All rights reserved.
  • 9. “Trusted Change”: Easy, Immediate, and Ongoing Endpoint Control Establish Deploy Auto-Generate Trust Models in BOUNCER Client to Custom Whitelist Administrator Console Multiple Endpoints for Each Endpoint Trusted Updater: SMSAdmin.exe Trusted Application: Project.msl Automatically Enforce Whitelist Trusted Network Share: (Stopping Unauthorized servershare Applications & Malware) Trusted User: CORPTomJ Update Custom Whitelist for New Trusted Digital Certificate: Trusted Applications Microsoft Windows Report on Security or Configuration Issues ©2009 CoreTrace Corporation. All rights reserved.
  • 10. The Benefits of Shifting the Focus Proactive elimination of all malware Proactive elimination of unauthorized applications Measured and well-tested patching Approved Applications Proactive elimination of malicious or accidental user actions Reduction of Help Desk requests and reimaging efforts Automatically meet compliance requirements ©2009 CoreTrace Corporation. All rights reserved.
  • 11. Enabling CIP Compliance with BOUNCER Limit ports and services to those required BOUNCER controls network access within the operating system, limiting ports and protocols. Document implementation of security patches or have compensating control BOUNCER provides compensating control for systems where patching is not possible, practical, or affordable and protects systems in legacy environments. Prevent malicious software BOUNCER prevents all unauthorized change, including all malware — such as zero-day attacks, rootkits, buffer overflows, etc. Monitor events and prevent unauthorized change to systems BOUNCER provides monitoring and reporting of events and attack attempts. ©2009 CoreTrace Corporation. All rights reserved.
  • 12. Case Study: City Public Service Energy (CPS Energy) ✘Difficulty in running and updating antivirus ✘Unable to patch consistently due to legacy systems Problem ✘Need to enforce configuration control ✘Need to protect and control systems for NERC-CIP compliance ✔ Protect all Windows systems in SCADA control environments ✔ Provide compensating control for regulatory and audit Solution requirements ✔ Ensure security between patching opportunities and on legacy system Increase system reliability Compliance with applicable NERC-CIP requirements Benefits Able to use a single solution across platforms and requirements ©2009 CoreTrace Corporation. All rights reserved.
  • 13. BOUNCER Technical Overview & Demonstration ©2009 CoreTrace Corporation. All rights reserved.
  • 14. BOUNCER Is a Turnkey Application Whitelisting Solution Three-tiered secure, scalable infrastructure Secures: Desktops, laptops, and servers Fixed, mobile, or disconnected systems Low-impact on endpoint performance Multi-platform: Windows NT 4, 2000, XP, Server 2003 Solaris 7-10 Windows Server 2008/Windows Vista (Q2CY09) Patented kernel-based network security infrastructure ©2009 CoreTrace Corporation. All rights reserved.
  • 15. Unique Capabilities of BOUNCER “Trusted Change” that leverages your EXISTING change processes and technologies Secure, tamper-proof architecture Auto-generated whitelists accelerate deployment Extended security platform (e.g., memory protection, network filtering) Multi-platform coverage ©2009 CoreTrace Corporation. All rights reserved.
  • 16. Summary BOUNCER directly addresses three major endpoint challenges: Security Manageability Compliance BOUNCER simplifies endpoint control by: Ensuring that only approved applications can execute Enabling transparent additions of new applications or upgrades to the whitelist BOUNCER provides significant benefits: Proactively eliminates malware & unauthorized applications Enables measured and well-tested patching Proactively eliminates malicious or accidental user actions Reduce Help Desk requests and reimaging efforts Helps automatically meet compliance requirements ©2009 CoreTrace Corporation. All rights reserved.