Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations Mail Stop 2...
Homeland Security Federal Cyber Security Official: Prepare For The Worst The nation must prepare for the worst-case scenar...
CERT Reported Attacks
Enterprise Security Strategy <ul><li>Find the balanced solution between price, function,and performance </li></ul><ul><li>...
Security - The Big Picture Network security requires an enterprise-wide perspective and “defense-in-depth” with layers of ...
OS Vulnerabilities: Universal Problem Microsoft  tries to cage security gremlins   By Robert Lemos Special to CNET News.co...
The Band-Aid Security Strategy Dial-up modems Routers IDS Centralized Monitoring TNOCs & RCERTs DNS/ Web Servers Firewalls...
What’s Missing? <ul><li>Protection for the OS </li></ul><ul><ul><li>An OS “firewall” </li></ul></ul><ul><ul><ul><li>Kernel...
STAT Neutralizer <ul><li>Result of extensive research in code containment, software testing techniques, and intrusion dete...
STAT Neutralizer <ul><li>Strict  security policy enforcement </li></ul><ul><ul><li>Automatically holds users accountable t...
STAT  Product Family <ul><li>STAT ® Scanner </li></ul><ul><ul><li>Vulnerability scanner </li></ul></ul><ul><ul><li>Keep as...
Demonstration
Upcoming SlideShare
Loading in …5
×

Harris corp

619 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
619
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Harris corp

  1. 1. Operating System Security John Doyle Director, Sales & Business Development Harris Corporation,STAT Operations Mail Stop 2-9450,P.O. Box 37 Melbourne, FL 32902-0037 321-727-4566 (phone) jdoyle99@harris.com (email)
  2. 2. Homeland Security Federal Cyber Security Official: Prepare For The Worst The nation must prepare for the worst-case scenario when it comes to securing the Internet, warned Richard Clarke, President Bush's special advisor on cyberspace security, on Wednesday. &quot; We haven't patched the holes literally or figuratively . We have a system that's vulnerable to sophisticated attackers, not just the 14-year-olds,&quot; Clarke said .                                    
  3. 3. CERT Reported Attacks
  4. 4. Enterprise Security Strategy <ul><li>Find the balanced solution between price, function,and performance </li></ul><ul><li>How much security can a user stand? </li></ul><ul><li>How much insecurity can the organization afford? </li></ul>100% secure Performance Functionality
  5. 5. Security - The Big Picture Network security requires an enterprise-wide perspective and “defense-in-depth” with layers of protection that work together.
  6. 6. OS Vulnerabilities: Universal Problem Microsoft tries to cage security gremlins By Robert Lemos Special to CNET News.com November 6, 2001, Microsoft's security response center must be feeling a little punch-drunk these days. After the one-two combination of the Code Red and Nimda worms that targeted the company's server and PC software this past summer, the titan announced an initiative in early October to promote security-savvy administration among its partners. However, almost every week since it announced its Strategic Technology Protection Program , a new security flaw has cropped up . In the past few weeks, holes have been found in Excel and PowerPoint and a new system for protecting music content. A major security patch was issued for Windows XP, and the company had to shut down part of its Passport service to fix a set of flaws in the technology that Microsoft hopes will become the foundation of its .Net initiative. Microsoft's New Security Program Has Bugs By Brian McWilliams, Newsbytes REDMOND, WASHINGTON, U.S.A., 01 Nov 2001, 5:43 PM CST A new security initiative unveiled by Microsoft [NASDAQ:MSFT] last month is off to a rocky start, according to customers and security experts. Microsoft's Strategic Technology Protection Program drew praise when it was announced Oct. 3. But already the effort, positioned by the company as &quot;an unprecedented mobilization of Microsoft's people and resources&quot; to help customers secure their systems, has hit several snags. The first occurred on Oct. 18, when Microsoft released a security patch that caused some Windows 2000 systems to stop functioning properly . Citing &quot;human error in the patch building process,&quot; the company withdrew and later re-issued the patch.
  7. 7. The Band-Aid Security Strategy Dial-up modems Routers IDS Centralized Monitoring TNOCs & RCERTs DNS/ Web Servers Firewalls BACKDOOR CONNECTIONS INTERNET TRADING PARTNERS CORPORATE NETWORK LAN Security Router Local Node ID & Authentication Servers
  8. 8. What’s Missing? <ul><li>Protection for the OS </li></ul><ul><ul><li>An OS “firewall” </li></ul></ul><ul><ul><ul><li>Kernel-level protection to provide your existing security infrastructure with a last layer of defense </li></ul></ul></ul><ul><ul><ul><ul><li>Intercepts </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Identifies </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Prevents potentially damaging ‘behavior’ within any executing code on a system (i.e., applications, device drivers, and services) </li></ul></ul></ul></ul><ul><li>Proactive 360º enterprise protection intercepts, identifies and prevents damage from known and unknown malicious code, human error, and other attacks whether internal or external </li></ul><ul><li>Intrusion Prevention = STAT ™ Neutralizer </li></ul>
  9. 9. STAT Neutralizer <ul><li>Result of extensive research in code containment, software testing techniques, and intrusion detection </li></ul><ul><ul><li>Provides ultimate intrusion prevention by stopping known and unknown security threats, providing immediate intrusion diagnosis, and ensuring strict end user policy compliance </li></ul></ul><ul><li>Pattern independent in implementation </li></ul><ul><ul><li>Protects against both the known and unknown </li></ul></ul><ul><ul><li>Simply denies undesirable behaviors </li></ul></ul><ul><li>Malicious code protection regardless of source </li></ul><ul><ul><li>Works on rules that define allowable behavior. Prevents execution of code not allowed on the network. Prevents network assets from being used as hosts for distributed denial of service (DDoS) attacks. </li></ul></ul><ul><li>Centralized Management </li></ul><ul><ul><li>Leverages Windows NT/2000 administrative features. Console allows for single point of management. Remote management via Web access from any PC. </li></ul></ul>
  10. 10. STAT Neutralizer <ul><li>Strict security policy enforcement </li></ul><ul><ul><li>Automatically holds users accountable to security policy. Prohibit applications or users access to certain files or directories. Prevent the download & install of programs </li></ul></ul><ul><li>Real-time, 360  protection </li></ul><ul><ul><li>Does not require updates, enabling it to always be on. Protects against internal and external threats </li></ul></ul><ul><li>Significantly reduced false positives </li></ul><ul><ul><li>Looks at executing code not network traffic. Logs only attacks or events that would have resulted in harm. Supplied policies protect against many false positives. Administrator can create rules to allow (and not log) behaviors that they deem as “false positives.” </li></ul></ul>
  11. 11. STAT Product Family <ul><li>STAT ® Scanner </li></ul><ul><ul><li>Vulnerability scanner </li></ul></ul><ul><ul><li>Keep assets up-to-date with current security recommendations and updates </li></ul></ul><ul><li>STAT ® Analyzer </li></ul><ul><ul><li>Security assessment automation </li></ul></ul><ul><ul><li>Audit or assess how well your security settings are relative to your policy </li></ul></ul><ul><li>STAT ® Neutralizer </li></ul><ul><ul><li>Malicious code defense </li></ul></ul><ul><ul><li>Intercept and stop destructive behavior </li></ul></ul>Our software helps take a proactive approach to addressing security vulnerabilities and threats before they can cause problems
  12. 12. Demonstration

×