Well, another very successful SunTUG meeting just finished and, while there were other important topics (e.g., modernization, integration, replication), the predominant area of discussion was data security. The focus on protecting sensitive data makes a lot of sense given that the SunTUG user community is composed of many sophisticated HP NonStop customers in industries like payments, financial services, and telecommunications.
Recently, HP made big news when it announced the acquisition of Voltage Security—the industry leader in Format Preserving Encryption (FPE) and Secure Stateless Tokenization (SST). SunTUG 2015 was the first HP NonStop user group meeting since that announcement and it was a great opportunity to highlight Voltage’s unique approach to data-centric security and Voltage’s partnership with XYPRO for the HP NonStop area.
Voltage and XYPRO coordinated their sessions to provide a two-part series on data protection for the enterprise and for the HP NonStop—these were the session titles with links to the presentations:
Part 1: Voltage Security: Data-centric Security for HP NonStop and Enterprise-wide Environments
Part 2: XYPRO: Optimizing Voltage Tokenization and Encryption for HP NonStop Environments
The 2-part series went very well—here’s a summary from those sessions of what differentiates the combined Voltage and XYPRO solution:
Voltage Security provides industry-leading tokenization and encryption
• Standards-based: all cryptography is standards based (AES) and
publicly validated
• Industry-proven: used by large payment processors, financial
institutions, retailers, and telcos
• Multi-platform support: HP NonStop, z/OS, Solaris, Windows,
Linux, Stratus, AIX, etc.
• Support for wide variety of data types: payments, other PII
(e.g., SSN, DoB)
• Stateless key management: no keys to store, manage or
distribute/replicate
• Flexible: full/partial encryption, masked, and tokenized data from the same interface
• Runs natively on NonStop: tokenization and encryption happen
natively on NonStop
View the Voltage Presentation
XYPRO XDP optimizes Voltage for NonStop environments
• No application changes required on NonStop
• Support for nowaited/non-blocking encryption/tokenization
• Support for NonStop’s OS personalities and executable types
• Multiple language support: C, TAL and COBOL
• Distributed architecture provides fault-tolerance, parallelism
and scalability
• Built-in access control and auditing, as with all XYGATE products
View the XYPRO Presentation
More information about XYGATE Data Protection (XDP) is available on XYPRO’s website.
Finally, a couple short, heart-felt notes of appreciation: SunTUG 2015 was, as usual, a very well run affair with strong attendance—thank you SunTUG team and HP NonStop users! Also, thank you to the HP team for your presentations and involvement—your updates on the HP NonStop business and technology were exciting and provided a great start to an energetic conference.
Ken Scudder
Business Development and Strategic Alliances
XYPRO Technology Corporation
Tuesday, March 10, 2015
Tuesday, February 17, 2015
The Shelf is for the Elf, Not Security
Businesses are managing more data than ever—and spending more money, year after year, to protect that data. Yet spending money on security doesn’t equate to actually being secure.
A recent study by Osterman Research discussed how prevalent the “shelfware” problem is becoming. The report showed that businesses spent an average of $115 USD per user on security software, hardware and services in 2014, an increase of 44% from 2013, yet nearly 30% of that security investment was underutilized or never implemented.
Small businesses, those with less than 1,000 users, were impacted more, with an average spending of $157 per user, yet the same underutilization pandemic still exists.
“The numbers were pretty eye popping,” said Josh Shaul, Trustwave’s vice president of product management. “We expected some security software on the shelf. What we found was companies are pouring money down the drain, while the folks approving these purchases are getting a false sense of security.”
Considering the security landscape we currently live in, CEOs, CISOs and board members have taken notice. Cybersecurity is now just as important in the board room as the bottom line. The problem is now important enough to where non-technology business leaders put more emphasis on security. No one wants their company to be the next Sony or Anthem (from a data breach perspective). Budgets are being allocated and money is being spent on protections, but, as the Osterman Research study shows, a large part of that security investment is sitting around doing nothing—it’s unimplemented shelfware.
As you’re reading this, you’re probably looking over at your white board thinking “Yeah, we still have to implement that”. Trust me, you’re not alone.
So why are security solutions sitting around collecting dust?
The main reasons – IT departments are just too busy to properly implement what was purchased. Revenue generating tasks and keeping the engine running take precedence over something that may happen. This is followed closely by not having enough staff available and not understanding the purchased software well enough. According to the same report, the year 2014 finished with 49% of security positions left unfilled.
Interestingly enough, the least serious reason contributing to not getting security properly implemented was the IT staff not understanding the security problems they faced. On the contrary, IT understands the security problems and threats to the organization very well, they just lack the resources to implement the right solutions.
So how do you solve the problem?
Vendor professional service groups and security service providers can help ensure security technologies are properly installed, monitored and maintained throughout their lifecycle. The report surveyed that 79% of IT professionals believe leveraging managed services would reduce or eliminate the possibility that security goes unused in their organization.
XYPRO’s Professional Services Team is regularly brought in by Fortune 1000 companies to perform security assessments of HP NonStop server environments. Our XYPRO PS team ensures XYGATE security products such as Merged Audit and User Authentication, which have been shipped with the operating system as part of the NonStop security bundle on all new HP NonStop servers since late 2010, are properly configured and deployed to address your organizations specific needs. Whether those needs are auditing, compliance, monitoring, or help with your overall security initiative, XYPRO’s PRO Services Team can be an invaluable partner to protect your business and the investment you’ve made in security.
And that can help everyone sleep better at night. Unless you have one of those elves. They’re creepy.
Steve Tcherchian, CISSP
XYPRO Technology
A recent study by Osterman Research discussed how prevalent the “shelfware” problem is becoming. The report showed that businesses spent an average of $115 USD per user on security software, hardware and services in 2014, an increase of 44% from 2013, yet nearly 30% of that security investment was underutilized or never implemented.
Small businesses, those with less than 1,000 users, were impacted more, with an average spending of $157 per user, yet the same underutilization pandemic still exists.
“The numbers were pretty eye popping,” said Josh Shaul, Trustwave’s vice president of product management. “We expected some security software on the shelf. What we found was companies are pouring money down the drain, while the folks approving these purchases are getting a false sense of security.”
Considering the security landscape we currently live in, CEOs, CISOs and board members have taken notice. Cybersecurity is now just as important in the board room as the bottom line. The problem is now important enough to where non-technology business leaders put more emphasis on security. No one wants their company to be the next Sony or Anthem (from a data breach perspective). Budgets are being allocated and money is being spent on protections, but, as the Osterman Research study shows, a large part of that security investment is sitting around doing nothing—it’s unimplemented shelfware.
As you’re reading this, you’re probably looking over at your white board thinking “Yeah, we still have to implement that”. Trust me, you’re not alone.
So why are security solutions sitting around collecting dust?
The main reasons – IT departments are just too busy to properly implement what was purchased. Revenue generating tasks and keeping the engine running take precedence over something that may happen. This is followed closely by not having enough staff available and not understanding the purchased software well enough. According to the same report, the year 2014 finished with 49% of security positions left unfilled.
Interestingly enough, the least serious reason contributing to not getting security properly implemented was the IT staff not understanding the security problems they faced. On the contrary, IT understands the security problems and threats to the organization very well, they just lack the resources to implement the right solutions.
So how do you solve the problem?
Vendor professional service groups and security service providers can help ensure security technologies are properly installed, monitored and maintained throughout their lifecycle. The report surveyed that 79% of IT professionals believe leveraging managed services would reduce or eliminate the possibility that security goes unused in their organization.
XYPRO’s Professional Services Team is regularly brought in by Fortune 1000 companies to perform security assessments of HP NonStop server environments. Our XYPRO PS team ensures XYGATE security products such as Merged Audit and User Authentication, which have been shipped with the operating system as part of the NonStop security bundle on all new HP NonStop servers since late 2010, are properly configured and deployed to address your organizations specific needs. Whether those needs are auditing, compliance, monitoring, or help with your overall security initiative, XYPRO’s PRO Services Team can be an invaluable partner to protect your business and the investment you’ve made in security.
And that can help everyone sleep better at night. Unless you have one of those elves. They’re creepy.
Steve Tcherchian, CISSP
XYPRO Technology
Monday, February 9, 2015
HP’s Voltage acquisition great for XYGATE Data Protection
Here at XYPRO we’ve been very pleased at the news of HP acquiring Voltage Security.
XYPRO, as a long time partner of both Voltage and HP, sees the acquisition as a great fit. XYPRO already works with Voltage Security to optimize SecureData for the HP NonStop platform, and provides a range of capabilities to quickly and easily implement on HP NonStop. With XYGATE Data Protection (XDP) customers can take advantage of SecureData’s range of data protection options, including Format Preserving Encryption (FPE) and Secure Stateless Tokenization (SST) with no changes to NonStop applications or their databases. XDP adds the following critical NonStop-specific capabilities:
- Support for both Native (code 800) and non-Native (code 100)
applications
- Support for applications written in any HP NonStop-supported
language
- Nowaited/non-blocking encryption calls
- Built-in access control and auditing, as with all XYGATE products
- Intercept library for environments where the customer’s application
cannot be changed
- Simple SDK for environments where full application control is
preferred
- Integration with a full range of Voltage SecureData APIs, allowing for
all data types to be easily protected
- Support for all NonStop databases – Enscribe, SQL/MP and SQL/MX
The XDP solution fully supports Voltage’s approach to data centric security, allowing for data to be protected right across the enterprise, from the point of acquisition of the sensitive data, through the HP NonStop, and on to whatever other platforms and applications need that data.
For more information about XYGATE Data Protection click here.
XYPRO extends congratulations to both Voltage and HP. We look forward to continuing our strong partnership with these two great companies.
Andrew Price
VP Technology
XYPRO Technology Corporation
XYPRO, as a long time partner of both Voltage and HP, sees the acquisition as a great fit. XYPRO already works with Voltage Security to optimize SecureData for the HP NonStop platform, and provides a range of capabilities to quickly and easily implement on HP NonStop. With XYGATE Data Protection (XDP) customers can take advantage of SecureData’s range of data protection options, including Format Preserving Encryption (FPE) and Secure Stateless Tokenization (SST) with no changes to NonStop applications or their databases. XDP adds the following critical NonStop-specific capabilities:
- Support for both Native (code 800) and non-Native (code 100)
applications
- Support for applications written in any HP NonStop-supported
language
- Nowaited/non-blocking encryption calls
- Built-in access control and auditing, as with all XYGATE products
- Intercept library for environments where the customer’s application
cannot be changed
- Simple SDK for environments where full application control is
preferred
- Integration with a full range of Voltage SecureData APIs, allowing for
all data types to be easily protected
- Support for all NonStop databases – Enscribe, SQL/MP and SQL/MX
The XDP solution fully supports Voltage’s approach to data centric security, allowing for data to be protected right across the enterprise, from the point of acquisition of the sensitive data, through the HP NonStop, and on to whatever other platforms and applications need that data.
For more information about XYGATE Data Protection click here.
XYPRO extends congratulations to both Voltage and HP. We look forward to continuing our strong partnership with these two great companies.
Andrew Price
VP Technology
XYPRO Technology Corporation
Monday, February 2, 2015
XYPRO Welcomes an Already Exciting 2015!
Lisa Partridge, CEO
2014 was an eventful year for XYPRO. It was a year of
changes in leadership and infrastructure improvements driven by our belief that
our customers’ requirements and experience are at the center of everything we
do. The management buy-out announced at the end of April was a significant
moment in XYPRO’s evolution and generated lots of energy and excitement on our
team. As a pioneer in the HP NonStop server space since 1983, and as
specialists in mission critical security since 1990, XYPRO is strongly positioned
to continue to innovate and grow with HP, the industry and our customers.
We are particularly thrilled to be extending the security
capabilities of the flagship XYGATE suite of security and encryption solutions
to the new HP NonStop X platform. We partnered with HP to port and test the
XYGATE software that is part of the NonStop Security Bundle shipped on the new
platform, as well as the entire XYGATE suite. XYGATE is ready for generation
NonStop X!
I’m also pleased to be able to report another year of record
growth for XYPRO. Not only have we increased both XYGATE and partner product
sales but we’ve also made great strides in our human resourcing, adding great
new talent to the XYPRO team. We’ve welcomed people to XYPRO that bring new
skills, enthusiasm and experience to our engineering, finance, services and
sales organizations. Additionally, our intern program burst forth in 2014, with
nearly a dozen young people contributing to our cultural innovation and
operational improvements across all departments.
2014 was also a year where cyber-crime and data breaches
were too frequently headline news. XYPRO implemented processes and incident
management procedures that allowed us to be agile and respond rapidly to
multiple public vulnerability announcements and the concerns and questions from
our customers quickly, thoroughly and efficiently.
One of our most important core values is “Care Enough”.
Quality is the result when you care enough to make sure it’s right. This core
value, implemented company-wide is a cornerstone of the XYPRO culture. Another
one of our tenets is striving for “Operational Excellence”. As XYPRO continues
to grow and support more customers than we ever have before, we are making sure
to focus on the fundamental building blocks of process and procedure,
continually fine-tuning them to improve the quality and predictability of our
releases. The new team members have specific experience in this area and the
metrics we gather during and following a release are analyzed for areas of improvement.
The significance of these processes get communicated regularly to the entire
company, reinforcing everyone’s role in operational excellence and
acknowledgment of everyone’s contribution to the end result.
XYPRO is committed to continuing to strive for excellence in
everything we do, to always maintain open communication channels, and to keep
our customers’ experience our central focus. When you make the effort to ensure
you’ve done all you can to answer that question, fulfill that request, meet that
deadline, or discover the solution – we all win.
At XYPRO, one of our top priorities for 2015, is bringing
Data-Centric Security to the HP NonStop community. XYGATE Data Protection
(XDP), in partnership with Voltage Security, provides enterprise-wide, Format
Preserving Encryption (FPE), Secure Stateless Tokenization (SST) and Key
Management. No keys to manage, store or distribute.
https://www.xypro.com/xypro/products/xygate_data_protection
Also, as we move into high gear for 2015, I’d like to point
you to the summary of a very informative blog series published over the course
of last year: XYPRO’s Top 10 HP NonStop Security Fundamentals:
http://blog.xypro.com/?p=534 Protecting mission-critical systems has many
aspects and can seem overwhelming at times; XYPRO’s Top 10 security blog
outlines the most important security considerations for the HP NonStop to
ensure that those systems have strong security, in addition to
high-availability and fault-tolerance.
Finally, we recognize you run your most important business
applications and processes on the HP NonStop server and keeping it safe from
data loss, tampering or even inadvertent harm is mission critical. We
appreciate the trust our customers place in XYPRO solutions and services to
help them protect those systems. We’re looking forward to 2015, and another
successful year serving the HP NonStop community.
Wednesday, December 3, 2014
The new HP NonStop – I want an X box for Christmas!
There’s been a lot of buzz, starting with NonStop Technical
Boot Camp (TBC) last year, then through 2014, culminating with the HP Discover
event currently being held in Barcelona, about the new x86-based NonStop server
line. At the NonStop TBC last month we heard that
the new line of servers would be called “HP Integrity NonStop X”, and just
today we’ve seen confirmation from HP that these machines should be available
in March of 2015. Exciting times indeed!
The introduction of the NonStop X range removes the last vestiges of proprietary NonStop hardware from the architecture, while maintaining the NonStop fundamentals (availability, scalability, fault tolerance) that we’ve come to expect from the platform. NonStop X will support Infiniband, which replaces ServerNet as the platform’s interconnect fabric. This move should see the platform’s costs continue to decrease, while taking advantage of the greatly increased throughput that Infiniband provides.
At HP Discover this week, Randy Meyer, Vice President and General Manager of Integrity Servers, expanded on this thought - “With NonStop X, moving the interconnect to InfiniBand is a huge deal, because of the fact that it’s all standard,” says Meyer. “NonStop runs on completely off-the-shelf hardware; there’s no proprietary hardware in there. And it means you can connect other kinds of applications, running on Linux or Windows, more seamlessly in a NonStop environment… Now you can have your NonStop infrastructure handling payments, reservations, trading, whatever it may be, and surround it with maybe a mobile phone handling system, or a fraud management system, and have this huge flexibility.”
Here at XYPRO, we’re enthusiastically adopting this new platform. We’ve been involved in beta testing our products with HP, and we will have “X certified” versions of our software available both through HP, and to our customers directly, when the new platform becomes available in March.
If you have any questions about XYPRO products and NonStop X, please contact your sales or support representative.
Andrew Price
VP Technology
andrew_p@xypro.com
The introduction of the NonStop X range removes the last vestiges of proprietary NonStop hardware from the architecture, while maintaining the NonStop fundamentals (availability, scalability, fault tolerance) that we’ve come to expect from the platform. NonStop X will support Infiniband, which replaces ServerNet as the platform’s interconnect fabric. This move should see the platform’s costs continue to decrease, while taking advantage of the greatly increased throughput that Infiniband provides.
At HP Discover this week, Randy Meyer, Vice President and General Manager of Integrity Servers, expanded on this thought - “With NonStop X, moving the interconnect to InfiniBand is a huge deal, because of the fact that it’s all standard,” says Meyer. “NonStop runs on completely off-the-shelf hardware; there’s no proprietary hardware in there. And it means you can connect other kinds of applications, running on Linux or Windows, more seamlessly in a NonStop environment… Now you can have your NonStop infrastructure handling payments, reservations, trading, whatever it may be, and surround it with maybe a mobile phone handling system, or a fraud management system, and have this huge flexibility.”
Here at XYPRO, we’re enthusiastically adopting this new platform. We’ve been involved in beta testing our products with HP, and we will have “X certified” versions of our software available both through HP, and to our customers directly, when the new platform becomes available in March.
If you have any questions about XYPRO products and NonStop X, please contact your sales or support representative.
Andrew Price
VP Technology
andrew_p@xypro.com
Monday, November 24, 2014
NonStop Technical Boot Camp 2014 – The (New, More Secure!!) Way To San Jose
We’ve just returned from this years’ NonStop Technical Boot Camp – what a whirlwind! Held for the first time at the Dolce Hayes Mansion, in the suburbs of San Jose, there was a record number of attendees, and it was a vibrant and energetic conference. We had a busy time, with lots of great customer interaction, both on the tradeshow floor and during the evening events. The continued and increasing focus on security was clearly evident, from the number of security vendors exhibiting, to the large number of sessions (both customer and vendor) discussing security, data breaches and various challenges related to those issues. Speaking of, XYPRO had folks involved in 9 (!) different sessions during the 3 ½ days:
During the pre-conference sessions on Sunday, attendees got to experience a deep dive on a variety of different topics. Rob Lesan and Terence Spies (from Voltage) covered strategies for security in today’s payments landscapes, where breaches are becoming so commonplace. The workshop spanned magnetic stripe technology right through to Apple Pay, and covered cryptographic developments and tokenization evolution, and was a valuable session for anyone wanting to learn more about these important technologies. They also had a case study on implementing tokenization in a real-world payments application, based on our recent experiences.
Then after lunch, Lee Evans, recently from Wells Fargo, and the newest addition to the XYPRO team, took an in-depth look at XYGATE Object Security, and how the powerful combination of XOS and the two authorization SEEPs help to improve NonStop security through a range of advanced options that apply across the entire NonStop environment. Lee’s very recent customer experience with XOS gives him a unique and very relatable perspective on this topic, and it was well received.
For our final pre-conference session of the day, Rob Lesan (who had a very busy conference pulling double duty as the Connect Vice President!) covered our partner database solution from Merlon, SQLXpress. Attendees learned how our many customers deploy SQLXpress to comprehensively secure, and greatly simplify the management of, their SQL/MP and SQL/MX databases.
On to the conference proper…with HP Distinguished Technologist Wendy Bartlett, and comForte’s Thomas Burg, we presented at the security-focused opening general session on Tuesday. We covered the XYPRO security solutions that are included with the NonStop Security Bundle, letting customers know the best ways to get their systems secured using these “built-in” tools.
The first of several joint presentations with Mark Bower from Voltage covered data-centric security and its importance in NonStop ecosystems. During this session on Monday morning attendees heard a summary of data-centric security, its applicability to payments applications and other typical NonStop deployments, and how a data-centric approach can prevent gaps in data protection across the enterprise. Then on Wednesday we took a closer look at Voltage SecureData and XYGATE Data Protection (XDP), two products that work together on NonStop to implement data-centric security with no application changes required. We got great feedback on both sessions, with the data-centric security approach resonating well with audiences.
On Monday afternoon, Rob Lesan’s superior presentation skills and direct experience were exploited to explain the database management services we provide, and the database tools that we utilize to provide those services, including Discover, MARS and SQLXpress.
On Tuesday morning, we took a slightly different approach to the typical vendor track presentation. In a follow-up to a popular ten-part blog series that Ken Scudder has published over the last couple of months, “HP NonStop Security: The Top 10 Things You Need to Know” we covered the highest priority things NonStop users should do to better protect their NonStop servers. We surprised the audience by having 10 different members of our sales and professional services team present, with each of them giving their own distinct spin on their specific topic. A highlight was our AP Sales Manager, Feng Lin, greeting the audience in at least 6 different languages from his region!
On Wednesday audiences were treated to our Chief Architect, Scoff Uroff, helping to present a customer-centric view of our two products that are included in the HP NonStop security bundle on all new NonStop servers: XYGATE Merged Audit and XYGATE User Authentication. This session, based on input from TELUS in Canada, showed how they use these solutions to get a handle on their audit data and simplify their user authentication—conveniently with products bundled with the NonStop OS!
All this, along with early starts on the trade show floor, combined with evening festivities, meant that we had 18 very tired XYPRO conference attendees by the time the show closed around midday on Wednesday. I suspect we weren’t the only ones! Still, a fantastic conference, and we’re already looking forward to doing it all again next year, wherever in San Jose it happens to be.
During the pre-conference sessions on Sunday, attendees got to experience a deep dive on a variety of different topics. Rob Lesan and Terence Spies (from Voltage) covered strategies for security in today’s payments landscapes, where breaches are becoming so commonplace. The workshop spanned magnetic stripe technology right through to Apple Pay, and covered cryptographic developments and tokenization evolution, and was a valuable session for anyone wanting to learn more about these important technologies. They also had a case study on implementing tokenization in a real-world payments application, based on our recent experiences.
Then after lunch, Lee Evans, recently from Wells Fargo, and the newest addition to the XYPRO team, took an in-depth look at XYGATE Object Security, and how the powerful combination of XOS and the two authorization SEEPs help to improve NonStop security through a range of advanced options that apply across the entire NonStop environment. Lee’s very recent customer experience with XOS gives him a unique and very relatable perspective on this topic, and it was well received.
For our final pre-conference session of the day, Rob Lesan (who had a very busy conference pulling double duty as the Connect Vice President!) covered our partner database solution from Merlon, SQLXpress. Attendees learned how our many customers deploy SQLXpress to comprehensively secure, and greatly simplify the management of, their SQL/MP and SQL/MX databases.
On to the conference proper…with HP Distinguished Technologist Wendy Bartlett, and comForte’s Thomas Burg, we presented at the security-focused opening general session on Tuesday. We covered the XYPRO security solutions that are included with the NonStop Security Bundle, letting customers know the best ways to get their systems secured using these “built-in” tools.
The first of several joint presentations with Mark Bower from Voltage covered data-centric security and its importance in NonStop ecosystems. During this session on Monday morning attendees heard a summary of data-centric security, its applicability to payments applications and other typical NonStop deployments, and how a data-centric approach can prevent gaps in data protection across the enterprise. Then on Wednesday we took a closer look at Voltage SecureData and XYGATE Data Protection (XDP), two products that work together on NonStop to implement data-centric security with no application changes required. We got great feedback on both sessions, with the data-centric security approach resonating well with audiences.
On Monday afternoon, Rob Lesan’s superior presentation skills and direct experience were exploited to explain the database management services we provide, and the database tools that we utilize to provide those services, including Discover, MARS and SQLXpress.
On Tuesday morning, we took a slightly different approach to the typical vendor track presentation. In a follow-up to a popular ten-part blog series that Ken Scudder has published over the last couple of months, “HP NonStop Security: The Top 10 Things You Need to Know” we covered the highest priority things NonStop users should do to better protect their NonStop servers. We surprised the audience by having 10 different members of our sales and professional services team present, with each of them giving their own distinct spin on their specific topic. A highlight was our AP Sales Manager, Feng Lin, greeting the audience in at least 6 different languages from his region!
On Wednesday audiences were treated to our Chief Architect, Scoff Uroff, helping to present a customer-centric view of our two products that are included in the HP NonStop security bundle on all new NonStop servers: XYGATE Merged Audit and XYGATE User Authentication. This session, based on input from TELUS in Canada, showed how they use these solutions to get a handle on their audit data and simplify their user authentication—conveniently with products bundled with the NonStop OS!
All this, along with early starts on the trade show floor, combined with evening festivities, meant that we had 18 very tired XYPRO conference attendees by the time the show closed around midday on Wednesday. I suspect we weren’t the only ones! Still, a fantastic conference, and we’re already looking forward to doing it all again next year, wherever in San Jose it happens to be.
Monday, September 22, 2014
Breaching Bad and the Cost of Incident Response
Last month, we explored data breaches involving memory scraping - how payment card information can get into the hands of thieves by siphoning off unencrypted data directly from system memory of the POS system. Since then, several widely publicized breaches hit the news, and speculation is that they were all victims of this same type of memory scraping malware. Because of this, I’ve been issued a slew of new credit cards and have to go through the joy of having to check my credit reports weekly – and I know I’m not alone there. Thanks a lot!
But what if you, as the administrator, did the due diligence, changed your default credentials, implemented two factor authentication, enabled account lockout settings and you were still breached? What happened? The likely culprit is an Advanced Persistent Threat, or APT, that’s what. APTs are a set of stealth, continuous hacking processes executed by a group or organization with a lot of patience. They know what they’re targeting and they’ll take their time to do it right, and be nearly impossible to detect. As the old saying goes, we as security professionals need to be right 100% of the time, the attacker only needs to be right once.
APTs demonstrate that the security landscape is changing quickly. The approach of focusing efforts and security budgets strictly on a “defense first” strategy is no longer sustainable. Determined attackers will keep coming and keep coming until they get what they’re looking for. So what do you do?
Detection goes a long way in putting up that fortifiable barrier between you and the attack and empowering you with the security intelligence needed to take the next steps. XYPRO tools like Merged Audit and Compliance PRO help you achieve that level of security on the HP NonStop server. XYPRO’s Top 10 list on NonStop Security Monitoring takes a deeper dive into the techniques and best practices for accomplishing this.
At the BlackHat USA conference in August, nearly all the sessions were focused on offense and attacks. From hacking a hotel’s network to hacking mobile phones to USB devices- offense was the name of the game. So it was quite a pleasant change of pace to hear famed cryptographer and security expert, Bruce Schneier, taking time to discuss something we aren’t always thinking about, likely because we’re hoping to never get there – Incident Response.
Incident response is something we all know we need to be prepared to do, but why is there so little effort put into it? Take a look at the cyber security market. We’re inundated with defense and detection products. We spend billions of dollars per year to protect against attacks, but give little thought about what would happen if that expensive hardware with the flashy lights fails to do what we paid it to do.
Response products and budgets are not growing at anywhere near the same pace. Schneier indicated this is because of the way people assume response works. Defense and detection can be mostly accomplished with intelligent software and expensive hardware, whereas incident response is more people-centric and less automated.
A proper security program needs to consider both areas. Defense and response need to work together to detect the breach, limit your exposure, protect you and your customers’ assets and protect your brand. These seem like huge reasons to focus efforts on incident response, but we still see very slow and uncoordinated execution in response to a breach.
A report put out earlier this year by the Ponemon Institute outlined that half of the 674 IT and security professionals surveyed indicated that less than 10% of their security budget is dedicated to incident response and that budget has not increased in the past two years, even though the cost of data breaches keeps increasing. The same report indicated that the average cost of a data breach to a company is $3.5 million (US) and that’s up 15% from last year.
In a world where cloud computing is becoming the norm, we have less control of our data and IT infrastructure than we ever have, which makes planning for incident response all the more necessary. Attackers are becoming more sophisticated and organized, even being sponsored by nation-states. Schneier indicated “We have to bring people, process and technology together in a way that hasn't been done before to protect and respond against these types of attacks.”
Focusing on incident response is just not a bridge to “cross if you get there” anymore, but pointing out data breach costs can help executives make the case that a strong security posture that includes a proper incident response can result in a financially stronger company.
Next month, we’ll take a deeper dive into how to prepare your incident response plan, not for “if it happens”, but unfortunately for “when it happens”.
Steve Tcherchian, CISSP
XYPRO Technology
But what if you, as the administrator, did the due diligence, changed your default credentials, implemented two factor authentication, enabled account lockout settings and you were still breached? What happened? The likely culprit is an Advanced Persistent Threat, or APT, that’s what. APTs are a set of stealth, continuous hacking processes executed by a group or organization with a lot of patience. They know what they’re targeting and they’ll take their time to do it right, and be nearly impossible to detect. As the old saying goes, we as security professionals need to be right 100% of the time, the attacker only needs to be right once.
APTs demonstrate that the security landscape is changing quickly. The approach of focusing efforts and security budgets strictly on a “defense first” strategy is no longer sustainable. Determined attackers will keep coming and keep coming until they get what they’re looking for. So what do you do?
Detection goes a long way in putting up that fortifiable barrier between you and the attack and empowering you with the security intelligence needed to take the next steps. XYPRO tools like Merged Audit and Compliance PRO help you achieve that level of security on the HP NonStop server. XYPRO’s Top 10 list on NonStop Security Monitoring takes a deeper dive into the techniques and best practices for accomplishing this.
At the BlackHat USA conference in August, nearly all the sessions were focused on offense and attacks. From hacking a hotel’s network to hacking mobile phones to USB devices- offense was the name of the game. So it was quite a pleasant change of pace to hear famed cryptographer and security expert, Bruce Schneier, taking time to discuss something we aren’t always thinking about, likely because we’re hoping to never get there – Incident Response.
Incident response is something we all know we need to be prepared to do, but why is there so little effort put into it? Take a look at the cyber security market. We’re inundated with defense and detection products. We spend billions of dollars per year to protect against attacks, but give little thought about what would happen if that expensive hardware with the flashy lights fails to do what we paid it to do.
Response products and budgets are not growing at anywhere near the same pace. Schneier indicated this is because of the way people assume response works. Defense and detection can be mostly accomplished with intelligent software and expensive hardware, whereas incident response is more people-centric and less automated.
A proper security program needs to consider both areas. Defense and response need to work together to detect the breach, limit your exposure, protect you and your customers’ assets and protect your brand. These seem like huge reasons to focus efforts on incident response, but we still see very slow and uncoordinated execution in response to a breach.
A report put out earlier this year by the Ponemon Institute outlined that half of the 674 IT and security professionals surveyed indicated that less than 10% of their security budget is dedicated to incident response and that budget has not increased in the past two years, even though the cost of data breaches keeps increasing. The same report indicated that the average cost of a data breach to a company is $3.5 million (US) and that’s up 15% from last year.
In a world where cloud computing is becoming the norm, we have less control of our data and IT infrastructure than we ever have, which makes planning for incident response all the more necessary. Attackers are becoming more sophisticated and organized, even being sponsored by nation-states. Schneier indicated “We have to bring people, process and technology together in a way that hasn't been done before to protect and respond against these types of attacks.”
Focusing on incident response is just not a bridge to “cross if you get there” anymore, but pointing out data breach costs can help executives make the case that a strong security posture that includes a proper incident response can result in a financially stronger company.
Next month, we’ll take a deeper dive into how to prepare your incident response plan, not for “if it happens”, but unfortunately for “when it happens”.
Steve Tcherchian, CISSP
XYPRO Technology
Subscribe to:
Posts (Atom)