Q&A: Preventing Mobile Vulnerabilities (an interview with Dr. Hongwen Zhang by ESJ.com)

No Gravatar

Best practices for keeping mobile devices safe.

By James Powell 06/21/2011 (Enterprise Strategies – ESJ.com)

When it comes to protecting mobile devices connected to enterprise resources, security managers face a dilemma: can security be enforced without negatively impacting productivity? To learn more about the state of mobile security, we turned to Dr. Hongwen Zhang, co-founder and chief executive officer at Wedge Networks and the co-inventor of his company’s WedgeOS security technology.

Enterprise Strategies: What unique challenges do mobile devices introduce into an environment?

Dr. Hongwen Zhang: I see four major challenges:
Mobile devices move in and out of the corporate perimeters, so perimeter-based defenses are not effective
These devices have zero or limited defense abilities; their primary design objectives are power consumption and portability, not security
They are easily stolen or lost, along with sensitive information and access tokens stored in them
It is very difficult to obtain a comprehensive audit trail for mobile devices because of the multiple service providers involved.

To read the whole interview, please visit esj.com HERE.

Posted in Industry News, Latest Security News, Wedge News | Tagged , | Leave a comment

“London Bridge Is Still Standing”: Advanced Persistent Defence

No Gravatar

Since the beginning of this year 2011, the IT Security industry has been inundated with unending bad news: Epsilon, Sony Playstation Networks, Play.com, and the list goes on. With so much media publicity, it seems that our industry is doomed to failure since, no matter how strong an organization’s defences are, the “London Bridge is falling down”… eventually.

That’s why the news this morning about how Lockheed Martin managed to defend its data against a recent fierce attack piqued my attention.  This article also described a security breach at Lockheed Martin in 2009 whereby hackers obtained classified information about the F-35 fighter jet program.  Kudos to the guys/girls at Lockheed Martin for making things right and for turning the tides for our industry, at least on this day.

I’m sure that the “London Bridge” is exposed to dents and dings, on a daily basis, from the persistent forces all around it.  However, it remains solidly standing despite the age old nursery rhyme that describes its “falling down”, which has been around since the 1700’s.  The reason for this: during the course of its existence, it has been persistently maintained and even rebuilt.  As a matter of fact, at the same time in which Lockheed Martin has successfully defeated this round of security attacks, the city of London is hiring a Maintenance Electrician for, guess what?  The London Bridge.

As an IT security practitioner, my take on the moral of this news is: to win against APT (Advanced Persistent Threats), we need to have an APD (Advanced Persistent Defense). You may argue that not everyone will have the deep financial pockets that Lockheed Martin has; however, as long as there is hope, tools and automation will be implemented to drive down the costs and help us win this war.

Posted in Industry News, Latest Security News | Tagged | Leave a comment

Wedge Networks Wins Info Security Products Guide 2011 Global Excellence Awards

No Gravatar

Wedge Networks, the leader in high performance network-based Web security solutions, announced today that the Wedge BeSecure AntiMalware Gateway Series was named the winner in the Annual Info Security Products Guide 2011 Global Excellence Awards, in the category of Best Network Security Product. This prestigious global award recognizes Wedge Networks for its groundbreaking wire-speed full inspection security platform.

“With the increased threat of attacks from viruses, Trojans, worms and spyware, traditional desktop-based anti-virus software does not provide enough protection, particularly in environments with high traffic, high bandwidth networks,” said Hongwen Zhang, President and CEO of Wedge Networks. “It is an honor to be recognized in this distinguished industry awards program and it further demonstrates our leadership in providing multi-layer protection to help organizations stay ahead of these threats.”

The Wedge Networks BeSecure appliance provides complete network protection, ensuring clean content is delivered to all endpoints including desktops, laptops, mobile devices and servers for large enterprises, ISPs, fixed and mobile operators worldwide. It prevents these attacks by intercepting Web traffic at the application network layer, scanning the traffic at multi gigabit speeds and blocking malicious attacks.

Utilizing the patented WedgeOS, the BeSecure appliance scans complete objects in real-time, accesses and employs full signature databases, heuristic analysis and Deep Content Inspection to provide increased security protection to a market that previously lacked security options. This nomination further recognizes Wedge’s unique ability to deploy accurate protection in complex networks dealing with massive traffic volumes.

2011-Info Security Products Guide Award

Posted in Wedge News | Leave a comment

Info Security Products Guide 2011 Award Acceptance

No Gravatar

Info Security Products Guide, the industry’s leading information security research and advisory guide, has named Wedge Networks’ BeSecure Anti-Malware Gateway Series the winner of the 2011 Global Excellence Awards in Network Security. Announced in San Francisco, more than 50 judges, from a broad spectrum of industry voices determined the 2011 Global Excellence Awards Finalists and Winners.

To see the YouTube video: Dr. Hongwen Zhang accepting the 2011 Info Security Products Guide Award

Posted in Wedge News | Leave a comment

DLP: Data In Motion vs. Data At Rest (DIM vs. DAR)

No Gravatar

The Debate column (P15) of the November, 2010 Issue of SC Magazine covers a very interesting topic– For or Against:  “DLP for data in motion is more effective than DLP that secures data at rest”. Two top executives, each from a security solution provider, are invited to comment “For” or “Against” this statement.

Joe Leonard from Global Velocity is “For” this statement. He convincingly argues that “ultimately, a solid, well planned ‘data in motion’ approach can gain 80 percent of the bang for 20 percent of the buck, while providing additional operational benefits.” In other words, he thinks Data In Motion (DIM) is a better approach than Data At Rest (DAR) for DLP.

Todd Feinman from Identity Finder is “Against” this statement. His key argument is that “Data-at-rest DLP searches files and emails with deeper analysis to determine the context of sensitive information, while eliminating false positives”.  In other words, he believes Data At Rest (DAR) is a better approach than Data In Motion (DIM) for DLP.

Both have good arguments. However, adding 1+1, it is very obvious that Mr. Feinman provides a good specification to the underspecified term “solid” in Mr. Leonard’s statement, defining a “solid” DIM approach as one that can perform deeper analysis with no false positives.

Why do experts, such as Mr. Feinman, not believe that DIM can do deeper analysis with no false positive? The answer is rooted in the conventional technologies used for the data in motion approach. These technologies scan packet streams and look for offending patterns. The problem is that most sensitive information can only be comprehended at the content level, not at the packet level. Scanning packets cannot detect information that span many packets and, very often, that are packed in an archive. It is analogous to inspecting atoms and molecules to detect if an object is a tiger or a rabbit. To implement the requirement of deeper-analysis-with-no-false-positive, the industry needs Deep Content Inspection for Data In Motion, i.e. DCI For DIM.

Posted in Industry News, Latest Security News | 7 Comments

Wedge Networks Partners With Graycon Group: Real IT Meets High Performance Web and Email Security

No Gravatar

Wedge Networks Inc. (Wedge Networks), the leader in high performance web and email security solutions, is pleased to announce its partnership with IT consulting firm Graycon Group (Graycon).

Graycon Group aligns with Wedge Networks’ vision of bringing faster, safer networks to all. With a holistic approach to networks, including design, implementation and support, along with a strong commitment to providing and maintaining security for these networks Graycon delivers unparalleled expertise to the clients they work with. Through Wedge Networks BeSecure line of products, Graycon further provides easy to manage, integrated and high performing web and email security solutions to their customers.

“At Graycon Group we believe network systems should be designed to assist and complement an organization’s entire business environment”, explains Douglas Gray, Founder and CEO of Graycon Group. “Properly leveraged Information Technology can support an organization by increasing revenue and/or lowering costs. We see Wedge Networks’ solution as being a key component for the security side in the networks that we design and implement. Wedge’s BeSecure line of products provides Web, Email and Anti-Malware protection in an easy to manage package. We need solutions that can do the job at a cost that improves a company’s bottom line. Wedge Networks is our key partner for filling this requirement.”

“We are very happy to be working with Graycon to bring faster, safer networks to their customer base”, Hongwen Zhang, President & CEO of Wedge Networks, commented. “A protected network is essential in supporting business objectives. Graycon’s understanding of this, along with their ability to work with customers to achieve necessary network protection makes them an ideal partner for Wedge Networks. We are very proud and excited to work with Graycon.”

Find out more about Wedge’s BeSecure solutions by visiting www.wedgenetworks.com.

Posted in Wedge Channel Partner Forum, Wedge News | Tagged , , , , , , | Leave a comment

Cool Connector: Calgary Tech Showcase and Open House

No Gravatar

This coming Thursday October 28, 2010 from 3:30PM- 6:00PM, Wedge Networks will be at the 11th Annual Tech Showcase and Open House put on by CTI and UTI. The coolest of the cool, there will be 30 great companies showcasing their products and ideas to over 400 visitors who are interested in seeing the technology Calgary has to offer.

Come visit us at our booth in the Alastair Ross Technology Centre at 3553-31 ST NW Calgary, to learn more about Wedge Networks, Deep Content Inspection, and current Malware Trends or Outbreaks among others.

For more information click  Tech Showcase .

See you there!

Posted in Wedge Channel Partner Forum, Wedge News | Tagged , , , , , , | Leave a comment

Gamania Secures On-Line Gamers Against Malware And Identity Theft

No Gravatar

CALGARY, AB. October 26, 2010 — Wedge Networks Inc. (Wedge), the technology leader in high performance web security solutions, announced today that its BeSecure Web Security appliance is the product of choice; providing the most accurate anti-malware security protection and the performance to handle network traffic demands for Gamania Digital Entertainment’s web-based game hosting and internal development IT infrastructure.

Gamania is one of the global leaders in web-based entertainment with millions of subscribers, and is dedicated to bringing the best experience in online gaming to its users. To ensure their online content is free from viruses, and to further ensure that gamers’ personal information is completely secure, Gamania deployed Wedge’s BeSecure appliances within its network.

“Gamania puts IT security as its top priority“, says Jackal Huang, Manager of the Corporate Information Security Department. “When the game operations are infested with malware, it causes our game servers and networks to act abnormally. Every single second of service downtime means lost revenue for us. When we are attacked, the virtual weapons / tools and user account information can be leaked. These virtual weapons / tools are the most precious assets of our game players. From the player’s point of view, they are priceless.”

As one of the world’s largest online digital entertainment companies, Gamania’s business depends on maintaining subscribers’ confidence in the company’s ability to deliver terrific products and services through the web without having to worry about viruses and malware.

“As a leader in the global online entertainment industry Gamania is very sophisticated in its approach to IT Security,” said Dr. Hongwen Zhang, Founder and CEO of Wedge Networks. “We take pride in the fact that Wedge is playing a role in ensuring that millions of Gamania’s customers can experience the best in online entertainment, and can be secure while doing so.”

According to Jackal Huang the BeSecure hits his three key components of accuracy, ease of use, and cost effectiveness:

1. The BeSecure’s ability to utilize and scan against the full embedded Kaspersky malware signature database with little to no performance loss (other solutions are only able to use portions of the database or face succumbing to performance degradation) makes it by far the most accurate anti-malware appliance available, which is key in protecting the high-bandwidth network that Gamania utilizes.

2. The BeSecure is simple and easy to manage: the configurations are very simple to use. No complex configurations were required to deploy the appliances and there was no need to change any of Gamania’s network configurations.

3. It is very cost effective: compared with similar products in the market, the BeSecure, with its powerful WedgeOS Deep Content Inspection Engine, has the best performance and accuracy in protecting networks from viruses and malware. We do not have to worry about inadequate capacity and the need to continuously upgrade.

“There are more and more malicious websites these days. They are the main source of infections,” explained Jackal Huang. “If we were to remove the Wedge BeSecure, our online operations would face substantially significant increased risk and large costs to protect against this risk.”

Posted in Wedge News | Tagged , , , , , | Leave a comment

Breaking Bread with SPIEs!

No Gravatar

Lunch two Thursdays ago was a unique experience.  We got to meet and present to Calgary‘s SPIE – a special interest group made up of the who-is-who in Calgary’s Internet Security Profession.  Calgary, Canada’s Oil Capital, and without a doubt, companies in this sector fare the toughest – from hacktivism to pure evil crime with financial and business motives.

We discussed several topics (Presentation can be found here), but the most important points were:

  1. Rules of the Malware game have changed, from a focus 0n generating publicity to a multi-billion dollar industry funded by very organized and savvy criminals (you can read more about the malware industry’s business model here).  And yes, they do have websites that sell botnets and that do provide support too!

    Website that advertises Botnets For Sale

    To this end, malware being written these days are designed to “hide” in compromised systems so that hackers can continue to use the computers’ resources for criminal activity while remaining undetected as long as possible.

  2. Newest attack vector is Application Vulnerabilities, and even more so web-applications, as shown in the diagram.  Notice that Operating System/Browser Vulnerabilties are now taking a back seat, with Application (e.g., Adobe Reader) vulnerabilities becoming the vector of choice for malware writers.

    Frequency of Application-based Attacks

  3. Deep Content Inspection is the logical choice for combating this evolving threat- it is no longer sufficient to scan some packets against a limited set of viruses and to believe that is good enough.  I will address this in next week’s blog.
  4. Layered approach to security is needed with network security being a lifecycle, and not a process.

I found this seminar to be very, very beneficial.  Thanks to security vendors, CIOs are now marketing-shielded (yes, you heard it here first!).  When the rubber hits the road, network security is accuracy and without performance compromise.  It is good to break bread with SPIEs, ISSAs, etc.

Posted in Industry News, Wedge News | 1 Comment

A Great Article Put Out by Troy Media on Alberta IT Leaders

No Gravatar

Alberta IT Leaders Taking Charge

September 24, 2010

By Wendy Peters
Senior Writer
Troy Media

CALGARY, AB, Sept. 24, 2010/ Troy Media/ – Breaking new ground, forging creative links, and educating by opening people’s minds to the beneficial wonders of cutting-edge technology is all in a day’s work for Alberta’s ICT leaders.

Web 2.0 security

…Enter Wedge Networks Inc., a leader in Web 2.0 security for enterprises and service providers worldwide.

Wedge Networks’ CEO Hongwen Zhang estimates there are about four million viruses transmitted via the Internet, and he warns that they are becoming more aggressive with the proliferation of Internet usage. “Because of our clear vision for a clean network, Wedge is taking a leadership role,” he says.

Zhang has more than 18 years of high-tech experience and notes that Wedge offers a security solution “that is revolutionary in the sense that it offers great cost savings and simplifies day-to-day management.”

Endorsements for Wedge Networks’ products come from such industry principals as Wmode, a global leader in content management for mobile networks, and media companies.

Describing the Internet today as “the nervous system of the human race,” Zhang also sees significance in promoting and sponsoring partnerships. “We try to foster an ecosystem where we can bring value to society,” he says…

Read more: Alberta IT leaders taking charge | Troy Media Corporation http://www.troymedia.com/?p=14923#ixzz10TCZYwbT

Posted in Wedge News | 1 Comment