In-Depth
Sworn to Protect
As the real-time intrusion prevention market grows, so do the number of players ready with solutions. One player hoping to make strides is NFR Security, with their flagship product, Sentivist.
According to some surveys, the rise in computer threats will spur
the market for intrusion prevention and detection products. One research
firm, Instat/MDR believes those markets combined can bring in $1.4 billion
in 2008. One such company on the IPS side is NFR Security, whose CEO,
Andre Yee, took time out last October to talk with MCPmag
.com Editor
Michael Domingo as the company was releasing its flagship IPS appliance,
Sentivist.
MCPmag.com: Give us an overview of NFR Security: when was it
founded, what's the company's mission?
Andre Yee: NFR Security was founded in late 1996. We have several
hundred customers worldwide, most of them in the U.S. We're a leader in
real-time threat protection solutions for enterprise networks. That means
we protect you against automated malware, against the theft of information,
against existing vulnerabilities inside of your applications, as well
as unauthorized changes in your network. We're used by many of the largest
companies.
Is your target enterprise or small- to medium-sized businesses?
We actually service a wide range. I'd say our sweet spot tends to be
small- to medium-sized businesses. One of the is our ability to scale,
the ability to sift through information and highlight the essential, critical
infomraton to protect your network. I should say that our flagship product
is an intrusion prevention product that sits in your network and it functions
as a really smart firewall. It can do far more than a firewall. It can
detect malicious code that's carried in the traffic and block that malicious
attack in line. This flagship product has been out for a little more than
a year and we've won several awards during that time, including Datamation
Enterprise Security Product of the Year,
You're talking about your flagship product, Sentivist? Can you give
us some insight into the development of the product and what some of your
customers are saying about it?
This product has a core detection engine, it's an intrusion prevention
product. We sell it both as software as well as an appliance. Intrusion
prevention is built on good detection. If you can't detect well, you're
certainly in no position to prevent malicious traffic. One of the things
we do really well is detect attacks [using] what we call a hybrid detection
engine that uses multiple modes of detection. Our signatures are exploit-based.
In other words, they'll detect specific exploits. And they're vulnerability-based,
[so that] even though there isn't a known exploit, if there's a known
vulnerability, it'll function as a virtual patch, if you will, which would
protect you against the exploitation of that vulnerability.
The other method we use is called protocol anomaly protection. A lot
of zero-day attacks are leveraged off of protocol anomalies and misuse
of protocols. We'll protect you against that as well.
How is your real-time protection different from solutions that come
from Symantec or companies like Fortinet?
I believe there's a lot of confusion in the marketplace. Essentially,
we protect you through what we call the dynamic shielding architecture.
What we believe we represent is the next generation in intrusion prevention
that we believe is moving from being appliance-centric to architecture-centric.
The dynamic shielding architecture, which is the core of our "secret
sauce," creates an architecture that's aware, adaptive, and actionable.
Let me explain what that means.
A lot of intrusion prevention systems today are focused on detecting
attack traffic. It's focused on ensuring that malicious traffic, mostly
from the outside, is detected and, hopefully, prevented. What it's not
able to do is detect unauthorized changes in your network. For instance,
if you're a Microsoft IIS shop, you use IIS as your Web server. If you're
a large enterprise, and some decides in a remote site to put in an old,
unpatched version of Apache, most security managers using intrusion prevention
tools today would not be able to detect that.
What our system is, as I said, aware, adaptive, and actionable. We'll
actually detect the presence of this non-compliant, unauthorized server
being deployed on your network. Then we're adaptive. We'll auto-update
signatures to ensure that you're protected for Apache. Remember, if you're
an IIS shop and you aren't covered for Apache, we'll automatically update
our signatures to ensure that you're turned on for the Apache coverage.
And finally, we're actionable through our Sentivist protection center
user interface. You can quarantine that server and ensure that no one
uses it until you get a chance to check it out and ensure that it's safe.
What is your typical sales challenge? Is your product usually pitted
against other real-time protection products, or is it replacing passive
security measures?
The great challenge for us, in terms of the sale, is not so much a displacement.
The market that we're in, if you believe some of the analysts's claim
that this market will grow at better than 70 percent over the next two
years…certainly, it's a fast growing market. It's not all about just
displacing existing [solutions]. The reality is that our big challenge
as a small company is getting to the short list. If we get to the short
list and are evaluated, we tend to do very well. We actually win a very
high percentage [of them] whenever we go through a technical evaluation.
The net of it is, if customers are interested in a technically superior
product - and we'll go through a technical eval - the product speaks for
itself and we'll generally win the business.
Being a small company, our challenge is getting that visibility so that
we get in that technical eval.
You announced a solution to protect systems from a host of vulnerabilities
that were eventually fixed in [Microsoft's] Patch Tuesday bulletin. In
particular was the Windows 2000 exploit. Have any of your customers come
to you relating any experiences of potential exposure to any of the vulnerabilities
in that bulletin?
We provide protection ahead of that. When these vulnerabilities are released,
we'll release a set of vulnerability-based signatures. Kind of think of
them as a "virtual patch" that protects you even when you don't
have your patch current. By loading our signatures in your environment,
even though there isn't a specific exploit…vulnerability means there's
a potential exploit. Even without that potential exploit, you can be sure
you're protected. So, it's proactive protection for your system.
There haven't been any reported exploits of those vulnerabilities so
far in our customer base.
There are reports that the Zotob worm will be surfacing. Should your
customers be doing some serious hand-wringing at this point? (I feel like
I already know the answer to that question.)
They shouldn't be concerned about it. First of all, users of our product
are supported by what we call the Rapid Response Team, a team of security
experts who do nothing but look for early outbreaks of these worms or
even reported vulnerabilities. We ensure that we put our signatures out,
either exploit- or vulnerability-based signatures, to ensure that you're
protected. So, as far as our customers are concerned, they shouldn't have
anything to worry about.
Listen to this interview! Check it out on MCP Radio at http://mcpmag.com/webcasts/mcpradio/radio.asp?id=168.
About the Author
Michael Domingo has held several positions at 1105 Media, and is currently the editor in chief of Visual Studio Magazine.