Posts Tagged ‘intrust’

Webinar: Anatomy of an Insider Threat

February 27, 2015

Here is a link to another blockbuster we did with Randy Franklin Smith.

In this episode we track down a real world security incident that reveals unauthorized access and disclosure of sensitive data residing on a file server. Randy shows how this would be done with native Windows tools. Then I pull the curtain from IT Search, our most recent invention and feature added to Dell InTrust.

Highly recommended for security managers, IT admins, data analysts and anybody who deals with enterprise security firsthand.

 

 

Advertisements

Dell InTrust featured in eWeek

January 22, 2015

Sean Michael Kerner wrote a column Dell InTrust Aims to Accelerate Security Discovery in the recent issue of eWeek. It features InTrust and highlights some of the new capabilities added to the latest 11.0 release.

I think that Sean captured the essence of this pivotal release. Here is a good quote:

InTrust 11.0’s enhanced IT search facility enables users to search different types of IT data from a single Web interface. Among the things that the IT search can help discover are answers to user activity questions, including understanding who has access to data, how the access was obtained and how the access was used.

InTrust 11.0 with its IT Search component does go beyond unstructured textual data in its conventional sense.  So, now not only you can search for a needle in the haystack of logs faster.  You can also make sense of all this data by putting it in a context of users, permissions and changes that make the picture of user activity so much clearer.

InTrust 11.0 is unveiled

January 20, 2015

I am so excited to witness the birth of a wholly new product!

InTrust 11.0 is not just another major version update. With its IT Search feature it has a lot more to offer customers that face security challenges, struggle with IT compliance requirements or just sink in the ridiculous amounts of disparate IT data.

I want to give a big applause to everybody who made this release possible: development teams, marketing, support and everybody who supported the idea from its very inception. I am so happy to partake in building of the future.

As always, great talent and excellent execution yields innovative products.

 

Protecting #Point-of-Sale systems – anatomy of the recent #attacks on #retailers

February 4, 2014

We all heard about recent successes of cyber criminals at some of the popular retailers. What was not picked up by the news that well is why this happened and what can be done to prevent these Point of System terminals (PoS) from being compromised.

First of all, why PoS systems is a sweet spot for authors of POSRAM and ChewBacca malware?

There are a handful of reasons behind it.

  • Usually the risk of compromising PoS systems is underestimated. Companies tend to focus their time and IT budget on protecting critical servers and establishing perimeter security but not on workstations of their own employees and PoS terminals.
  • PoS system is the end device that actually swipe your card and thus either processes or stores critical payment card data which was the goal of the attack.
  • PoS systems have to be exposed to the Internet to be able to process payment transactions with the online payment systems such as VISA.
  • PoS systems are usually installed in locations without dedicated IT (store branches, restaurants, service agencies). IT in this case is usually outsourced to a 3rd party which needs remote access to managed systems creating a security risk.
  • PoS systems are usually connected to workstations which employees have a temptation to misuse for browsing internet when customer traffic is low.

Now what can be done to prevent consumer credit card data from being stolen?

What really helps is the autopsy of the affected systems performed by US-CERT in their recent warning to retailers.

Let’s take a closer look and see how this could have been detected and even prevented in the first place.

The US-CERT alert states that the malware used by criminals “parses memory dumps of specific POS software related processes looking for Track 1 and Track 2 data”.

Usually memory dumps are saved on a file system as system protected files. What if you could track access to those files after they were created? Who would normally need access to this cryptic data?

The official alert further states that “malicious actors could be taking advantage of default credentials to access the systems remotely” and that malware“exploits default and most likely weak credentials accessible over Remote Desktop”.

So, now if we could track remote logons under default credentials to PoS systems we’d be much better equipped!

And finally the news articles suggest that the technique used in the attacks is known as “advanced persistent threat” which is no more than a methodical attack targeting multiple systems and stretching  out in time.

Can the counter measure be as simple as alerting on attempts to guess the password of privileged accounts like Administrators across all of your PoS terminals and connected workstations?

Having seen mentions of “security attack” and “advanced persistent threat” one might think that this is all what expensive and cumbersome SIEM solutions are for. In fact, simple to use and yet effective log management tools like Dell InTrust that are proved to work on PoS systems will give you a much faster jump start and even integrate with SIEM solution of your choice if you opt to do so.

What sets InTrust apart is its nimble agent that can be deployed to tens of thousands of workstations and PoS terminals to do what you should be doing to battle the POSRAM like attacks. So, from tracking access to critical system files and alerting on attempts to brute force passwords of default accounts to monitoring the use of removable media and tracking details of every session of the remotely logged in user,  InTrust will get you covered.

Check out this InTrust for Workstations datasheet to know about other capabilities and how they can keep your PoS systems protected.

Originally published here 

Lessons learned from the trench: counting user clicks can protect you from class action lawsuits

February 21, 2013

In my previous post I gave you an example how logon events could become a cornerstone of a real life security investigation. It turns out tracking down employee hired outsourcers breaking into your network  is not the only way this “attribute of every hacker movie” can save organizations a lot of money. Ever thought how logon events could play a vital role in class action lawsuits? Read on.

The second story is never less interesting. A major telecom provider was featured in a case with its call center employees, which felt frustrated with unachievable performance objections and of course underpaid. According to those that filed a class action suite they had to work off the clock to take care of their email and other preparatory tasks before they logged on to the system to answer the calls. Apparently, the company has been employing some kind of time tracking system that compared the employee logon time in the beginning of the day with the time they logged off before they left for the day. Why did this turn out to not be enough?

Well, first of all this is not solely a technology issue. It might start in a way employees approach their job responsibilities, plan their day and even receive instructions from management. I am not going to dive into this aspect of the problem.

What I would find interesting is how this time tracking system accounts for things that happen in between those two official markers of the day: logon and logoff. What happens when employees finish their calls and take time to check email on their smartphones? What happens when they leave for lunch? What happens when they forget to logoff before they leave their workplace for the day? It is not only about logons and logoffs any more but rather about counting “periods of user activity” when employees are actively interfacing with the business application.

As you can see, logon events can find a great use in the situations you never expect up front. Usually, you have to have a technology in place that would remove the pain of managing these events from thousands of systems and make sure that you can get meaningful insight into this data when the time comes.

Need references? Check out Dell InTrust that recently received exciting new features including “superior user logon tracking”. It is superior because it tracks a lot more than native logon and logoff events can do. Not only does it capture the exact duration of each user logon session and factors in events like workstation lock, accidental system shutdown and screensaver activity, but It also lets you build daily and weekly reports showing the total time users were found actively logged on to their desktops.

With this patent pending InTrust technology in place every user check in and check out at her desktop is accounted for. By capturing critical user activity data and storing that in a tamper proof archive you gain critical evidences admissible in the court of law.

This post was originally published here.

When good admins go bad

April 12, 2012

Let’s face it – security breaches will happen. The main question is when. The recent data breach report from Verizon just reinforces this statement with unprecedented growth of security attacks reported across the board. Continue here.

Use case: Tracking user logons across the heterogeneous enterprise IT

March 2, 2012

Quest InTrust and Authentication Services comprise a killer combination to help you track user logons in the IT environment where both Windows and Unix servers and desktops are employed. Continue here.

Latest and greatest InTrust version 10.4 comes out of the door

January 25, 2012

The version 10.4 of InTrust advances in all three main capabilities attributed to successful event log management products. Continue here.

Custom InTrust add-in for reporting on DNS debug logs

October 27, 2011

I’m pleased to announce the availability of another custom InTrust add-in extending the product reach to new types of logs. This add-in continues a series of out of band solutions we make available to the InTrust customers outside of the official product release.

This time it’s the add-in that let’s you collect debug logs generated by Microsoft DNS servers.

Continue here.