MCI WorldCom joins managed security fray

MCI WorldCom joins managed security fray

Computers & Security, 18 (1999) 231-236 Abstracts of Recent Articles and Literature Helen Meyer Free file encryption security companies tomers by ...

217KB Sizes 1 Downloads 48 Views

Computers

& Security,

18 (1999) 231-236

Abstracts of Recent Articles and Literature Helen Meyer

Free file encryption security companies tomers by offering NovaStor

offered,

Matthew

Nelson. Two

are attempting to entice new cusfree document encryption. Both

and Azalea Software

are enabling

access to a

portion of their Web sites for sample downloading encryption software. Documents encrypted with

of the

access, print,

save, edit or copy

tect data from

8, 1999, p. 28.

files. NovaStor’s

Protection

Service

offering

is based on the

products

theft on Web sites can be attractive

customers, but cSafe plug-ins transparently,

software can be stored on a computer or transmitted across the Internet, even internationally, as encrypted Secret

data. cSafe’s

are based on the company’s Secure Access Filtration and Encapsulation architecture. The capability to pro-

from

Chernobyl

has

tion service. service, but

dicted to hit on 26 April 1999. The protection depends on customers carrying out regular virus defonline inition through the updates service LiveUpdate.The ChernobyI virus is predicted to strike

documents documents

with strong encryption and then send the internationally. ItzfoworEd, February 8, 1999,

tems will be protected

that their sys-

from the Chernobyl

virus pre-

p. 22.

on 26 April

Web

Chernobyl disaster. It has the potential to erase hard drives and corrupt a PCs BIOS. Symantec claims that

data-protection

offerings

readied,

Matthew

Nelson. if you are looking to prevent the theft of trademarked images or sensitive information, security company cSafe duplication

will introduce of information

applications that halt the from Web sites. These

products will enable users to ‘wrap’ images and documents that can then be placed on Internet sites and protected from unauthorized copying or duplication

Norton

AntiVirus

of the CIH 1999, p. 2. MCI

Laura Kujubu.

will be followed

later

this

year by IntraSafe and FileSafe. Preventing trademarked images from being widely copied offWeb sites without permission is critical for some content providers. IntraSafe will govern what can be done with data once access is given. FileSafe will regulate who can

0167-4048/99$20.00

0 1999 Elsevier Science

5.0

can not

only

detect

of the

but

also

oped to assist other anti-virus solution users who find their networks or PCs infected with the latest variant

being

PixSafe

it is the 13th anniversary

repair any files infected by the virus. In addition to the definition and fix, a kill_cih.exe tool has been devel-

of material. The first of the cSafe products will be PixSafe which protects images on Web sites from duplicated.

because

customers

Symantec

reassured

a similar to secure

AntiVirus

virus.

company’s DataSafe Web software, and loads a small version of the product onto a browser for file encrypAzalea Software is offering is promoting its capability

Norton

to

will have to prove it can load analysts said. Zr$world, February

virus.

WorldCorn

Computer

joins

Fraud

managed

MCI WorldCorn

G Security, April

security

is to introduce

fray, a suite

of security services, underscoring the growing trend of service providers’ willingness to take on the security needs of somewhat reluctant business customers. Pulling its its security assets from together CompuServe Network Services ANS and

Ltd. All rights reserved

231

Abstracts of Articles and Recent Literature

Communications Advanced

acquisitions,

Networks

MCI

plans to offer

WorldCorn

a comprehensive

security package targeted at large, multinational companies. Outsourcing security may seem risky, and even unnecessary at first, but these perceptions will change over the next few years. An analyst at the Yankee Group in the USA said that businesses are currently spending $330 million on managed security services, but this will increase to $820 million by 2002 and $1 billion by 2003. N ew services will make outsourcing more attractive. For example, Pilot Network Services offers a secure messaging service. Its Heuristic Defense Infrastructure is the foundation of its Security Utility Service, providing a network of security ‘power plans’ connected by a backbone, to deliver messages from a source network to a destination network. Infoworld, February 22, 1999, p. 8.

view event for its Pentium

III processor,

trotted

out a

host of security companies with plans to utilize the controversial Processor Serial ID Number on the chip. The list included Network Associates, RPK Security, ilumin, Aliroo, Rainbow Technologies, SSE, and Brokat, all of which announced plans to use the Processor ID for encryption, firewall and other security products. Network Associates said its Gauntlet Active Firewall software uses the identification number stamped into the Pentium III’s circuitry to recognize networked devices and trigger alerts to network managers if there is a problem. Intel recently came under fire by privacy groups, including the American Civil Liberties Union, which feared serial numbers on chips would allow tracking of individuals on the Internet.

Icfiworld,

February

22,

1999, p. 27.

Harmonized European organizations at risk from virus infection. A press release from Symantec reveals that research,

carried

out by Secure

Computing,

has shown

that thousands of European corporate organizations are at risk from virus infection. In a test of global antivirus solutions which determined their success in both detection and disinfection, it was found that Norton AntiVirus 5.0 is able to detect and repair 100% of inthe-wild viruses.The research showed that users of Dr. Solomon’s AntiVirus Toolkit version 7.93 are at risk of infection from eight in-the-wild viruses, including two strains of the CIH virus. Network Associates VirusScan 4.0.2 and update 4015 is unable to repair the Natas boot sector virus and incapable of properly disinfecting a common macro virus. Trend OfficeScan failed to repair two viruses and was unable to completely repair a further six. Commenting on the results of the research a spokesman for the company said, “There is now little differentiation between leading products in terms of their ability to detect viruses. For all users, but particularly corporate organizations, detecting a virus is of little value if the anti-virus software they are using is incapable of disinfection also. Vendors should be striving towards providing comdetection and disinfection.” plete protection Computer

Security Matthew

232

Fraud

G Security, April

1999, p. 2.

takes front seat at Pentium Nelson

and Ephraim

Schwartz.

preview,

Intel, at a pre-

copyright rules across Europe. The tight against software piracy in Europe has been further strengthened as the Business Software Alliance (BSA) joined forces with copyright associations representing the film, video, leisure software and music industries, to put pressure on Brussel’s policy-makers and MEPs. Together, the BSA, the International Federation of the Phonographic Industry (IFPI), the Motion Picture Association (MPA), the International Video Federation (IVF) and the Interactive Software Federation of Europe (ISFE), presented their response to the European Commission’s recent Green Paper on “Combating Counterfeiting and Piracy in the Single Market”. The organizations are seeking harmonized laws and coordinated enforcement efforts across Europe in order to fight copyright piracy within the Single Market, which causes losses estimated to be more than A2.5 billion every year. In the UK, the software piracy level is currently estimated to be 310/o, which means that one in three pieces of business software is being used illegally. The resulting annual losses are valued at over A200 millionThe BSA is calling for greater government commitment to fighting piracy, higher and more strongly enforced damages and penalties, improved enforcement procedures and faster judicial processes to ensure the continued healthy growth of the software industry. The BSA is also calling for the establishment of an authority at the EU level to manage and coordinate