Printer Friendly

Pelican Security: Lack of Client-Side Security Makes Corporations Easy Targets for Information Theft; Sandboxing Technology Would Have Prevented Hacker Access to Microsoft.

Business Editors/Hi-Tech & Security Writers

FAIRFAX, Va.--(BUSINESS WIRE)--Oct. 31, 2000

The recent rash of Internet threats compromising the integrity of corporate information points toward a growing need for businesses to implement more advanced, proactive security measures.

The hacking of Microsoft by an Internet worm last week demonstrated just how easy it can be for vulnerable information housed on a network, hard drive or desktop to be compromised by code downloaded from the Internet.

Because downloaded Internet code runs with all the rights and privileges of the user, these programs are able to gain unauthorized access to sensitive information as a legitimate user would.

The worm, QAZ Trojan, successfully accessed Microsoft's network and may have compromised the source code for the company's newest software -- information some consider the most valuable Microsoft owns. The hackers used what appeared to be a harmless e-mail attachment to enter the network and may have had unauthorized access for some time without Microsoft detecting it.

Malicious Internet code, such as this recent worm, is one of the biggest threats facing computer users today, according to a recent survey by Information Security Magazine (9/00). Although the corporation is unclear on the specifics of the attack, the security systems in place were, everyone agrees, not sufficient.

"It takes something like this for businesses to realize the importance of proactive security. If it happened to Microsoft, it can happen to anyone," said Pete Privateer, president, Pelican Security, Inc. "Companies have spent billions on server-side and network security to protect their resources, but they have left the front door wide open by not addressing the inherent lack of security in the Windows client, e.g., at the desktop. Targeted attacks like this one demonstrate that conventional methods and after-the-fact anti-virus software are not enough to protect critical systems. Proactive, client-side security solutions like Pelican SafeTnet(TM) are needed to protect corporations from newer and more dangerous Internet code threats."

SafeTnet's Dynamic Sandboxing technology enables corporate security policies to control what resources downloaded Internet code can access. This enhances network and server security by protecting the Windows client, where the malicious actions of Internet code are initially executed.

Unlike the traditional antiviral software that most businesses have implemented, Dynamic Sandboxing does not utilize pattern matching to block Internet threats. Because it doesn't rely on having the latest virus signatures, there is no need for constant updates to remain protected.

SafeTnet's Dynamic Sandboxing approach proactively prevents Internet code, like the QAZ Trojan, from accessing and changing critical files. Since it is based on corporate security policies, IT administrators can determine precisely what resources Internet code can and cannot access.

These policies block unauthorized actions, while allowing harmless activities to occur.

Pelican Security is the leading Internet security vendor providing solutions to proactively protect e-Businesses from client-side Internet threats. Pelican SafeTnet(TM) defends against destructive Internet viruses and hackers who attempt to exploit the security weaknesses of the Windows client to gain unauthorized access to vital corporate resources.

SafeTnet was the only technology to proactively block the malicious actions of the "LoveBug" when it first hit in May of 2000.
COPYRIGHT 2000 Business Wire
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2000, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Business Wire
Geographic Code:1USA
Date:Oct 31, 2000
Words:520
Previous Article:Independence Federal Names Fleisher to Board.
Next Article:ADVISORY/UPS To Webcast Investor Conference.
Topics:


Related Articles
Guarding Your Gateway.
Where hackers hit pay dirt: Web applications provide an easy tool for hackers mining for sensitive data. (Internet).
Integrated security: a holistic approach to data storage security. (Storage Networking).
Hack job: tech savvy Brazil becomes a haven for those who dwell on the dark side of technology--hackers.
Security.
Cisco, Microsoft join forces to stop viruses.
Are you protected against hackers and attackers? Viruses breaches and threats have IT directors rethinking security.
Identity theft: new era of info storage and disposal.
ZoneAlarm Internet Security Suite 6.5.
What e-mail hackers know that you don't.

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters