*****SPAM***** Re: CRIME Checkpoint versus Sonicwall

From: Michael Rauscher (mrauscher@private)
Date: Thu Aug 29 2002 - 22:49:53 PDT

  • Next message: Seth Arnold: "Re: CRIME Checkpoint versus Sonicwall"

    SPAM: -------------------- Start SpamAssassin results ----------------------
    SPAM: This mail is probably spam.  The original message has been altered
    SPAM: so you can recognise or block similar unwanted mail in future.
    SPAM: See http://spamassassin.org/tag/ for more details.
    SPAM: 
    SPAM: Content analysis details:   (6.2 hits, 5 required)
    SPAM: Hit! (0.5 points)  Possibly-forged 'Received:' header found
    SPAM: Hit! (0.7 points)  BODY: Contains a line >=199 characters long
    SPAM: Hit! (2 points)    Received via a relay in relays.osirusoft.com
    SPAM:                    [RBL check: found 10.75.236.63.relays.osirusoft.com., type: 127.0.0.4]
    SPAM: Hit! (3 points)    DNSBL: sender is Confirmed Spam Source
    SPAM: 
    SPAM: -------------------- End of SpamAssassin results ---------------------
    
    
    
    
    --EXCITEBOUNDARY_000__f8f250586e94a4dd565e1dc3bfabf0c1
    Content-Type: text/plain; charset="us-ascii"
    Content-Transfer-Encoding: 7bit
    
     I gotta jump in here to point out that a vendor is in business to sell you something you think you need, and a good vendor (read: salesperson) will spin the status quo as not good enough, but, "I have what you really need."  If I were to walk into Anitian, or any other security vendor, and lay out my security plan as a once a month, or even once a week log review, along with NIDS/HIDS that notifies me daily of "suspicious" activity, someone's not doing their job if they tell me that that's sufficient, and there's nothing more I should be doing. My bet is you would describe my monitoring plan as inadequate, and that you have one that would allow me to sleep better at night.  My point is 2-fold: there's always someone willing to convince you they have something better that you need, and, if you don't want to have to defend your product, don't try to push it on a list where most people know better.  Andrew Plato wrote:>  >So the end-user is monitoring the IDS?> >  !
    >The point being that *someone* had better be monitoring the IDS in real>  >time, or else it is not worth having.> Nobody can monitor an IDS in real-time. Not even a 24/7/365 shop. They just> have some guy sitting in a data-center somewhere. He watches a console.> When a red light comes on, he sends you a page. He doesn't reach into> your network and fix the machine. He doesn't do anything but TELL you> there is a problem after it has happened. And most of the 24/7/365 shops> I have looked into, don't even provide analytical support. They just > read off> the information from the IDSs vendor's help file.>  > Our service isn't designed to be real-time. Its a regular maintenance and> management of the information. Its also can include a lot of services> 24/7/365 shops cannot do, like vulnerability scanning, on-site forensics,> system patching, etc. Stuff that does not require 24/7/365 coverage.>  > Our service also focuses !
    intensely on analysis. Reviewing the data and> making deci!
    sions based on what we see.>  >  > > Our service was designed to offer these places>  > > expert help and peace of mind. To make sure everything is running and>  > > working at optimal efficiency and capability.>  > >>  > Here's the problem:> >  >    * If you are providing real-time 24/7 monitoring (as many outsourced>  >       security monitoring companies do) then you are providing effective>  >       IDS value to a customer that lacks the expertise to have in-house>  >      analysts.>  >    * But if you are only doing the outsourced monitoring every week or>  >       so, then either the unskilled end-user is monitoring the IDS, or>  >       (worse) no one is monitoring the IDS. In this case, both the>  >       service and the IDS are of NO VALUE. They are a pure feel-good>  >       decoration.> The purpose of an IDS is not to give you instantaneous recovery from an &gt!
    ; intrusion.> The purpose of an IDS is to give insight and information about what is > happening on> a network. While in a perfect world, these systems would be constantly > monitored> by a trained person - that is simply beyond what many organizations can > afford.>  > Monitoring and collecting information about network activities has value > provided> it is analyzed and fed back into some kind of decision matrix.  An IDS has> no value when it is not monitored AT ALL. But regular monitoring and > analysis> is what gives it value. And most 24/7/365 shops do no analysis at all. > They just> alert. We are providing the expert analysis that can arm IT admins with the> facts they need to make intelligent decisions about their network's > security. >  >  > Exactly: all this does is generate peace of mind, without any actual>  > security value.>  > Wrong. We can catch subtle attacks and issues before they beco!
    me a problem.> We can spot strange behavior that would go !
    totally unnoticed to an untrained> IT admin and then arm them with the information to make a decision about> how to handle that.>  > They can then make an informed decision about how to better secure their > network> based on FACTS not obnoxious rantings and ravings from security gurus. >  > By my definition, that is security value.> >  > To be clear, I'm not just bashing IDS as useless. Just pointing out that>  > IDS is useless unless it is accompanied by human 24x7 monitoring, which>  > you can either do your self, or outsource.> >  > Now-and-then monitoring of IDS is not useful, because the attacker can>  > do a great deal of damage before you notice it. Including change the IDS>  > logs.> Very few firms have the resources to do 24/7/365 monitoring. Its simply too> expensive. An now-and-then analysis is better than none at all. At least > the> systems are being watched regularly.>  > Besid!
    es, we do a lot more than merely monitor. There is IDS tuning, > optimization,> signature updating, and general analysis to insure the system is running> optimally and spitting out relevant information and not just gobs of > false positives.>  > I think there is value in this, my customers find it valuable, and I > don't expect> you would find it valuable, because its not intended for you.>  > -----------------------------------> Andrew Plato, CISSP> President / Principal Consultant> Anitian Corporation> > (503) 644-5656 office> (503) 201-0821 cell> http://www.anitian.com <http://www.anitian.com/>>; ------------------------------------> >   
    
    ------------------------------------------------
    Changed your e-mail?  Keep your contacts!  Use this free e-mail change of address service from Return Path.  Register now!
    
    --EXCITEBOUNDARY_000__f8f250586e94a4dd565e1dc3bfabf0c1
    Content-Type: text/html; charset="us-ascii"
    Content-Transfer-Encoding: 7bit
    
     <table cellpadding=10 cellspacing=0 border=0 width=100% bgcolor=white><tr height=200><td width=100%><font size=2 color=black><DIV>I gotta jump in here to point out that a vendor is in business to sell you something you think you need, and a good vendor (read: salesperson) will spin the status quo as not good enough, but, "I have what you really need." </DIV><DIV> </DIV><DIV>If I were to walk into Anitian, or any other security vendor, and lay out my security plan as a once a month, or even once a week log review, along with NIDS/HIDS that notifies me daily of "suspicious" activity, someone's not doing their job if they tell me that that's sufficient, and there's nothing more I should be doing. My bet is you would describe my monitoring plan as inadequate, and that you have one that would allow me to sleep better at night. </DIV><DIV> </DIV><DIV>My point is 2-fold: there's always someone willing to convince you they have something better that you need, and, if you don't want!
     to have to defend your product, don't try to push it on a list where most people know better.</DIV><DIV> </DIV><DIV> </DIV><DIV>Andrew Plato wrote:<BR>&gt;  &gt;So the end-user is monitoring the IDS?<BR>&gt; <BR>&gt;  &gt;The point being that *someone* had better be monitoring the IDS in real<BR>&gt;  &gt;time, or else it is not worth having.<BR>&gt; Nobody can monitor an IDS in real-time. Not even a 24/7/365 shop. They just<BR>&gt; have some guy sitting in a data-center somewhere. He watches a console.<BR>&gt; When a red light comes on, he sends you a page. He doesn't reach into<BR>&gt; your network and fix the machine. He doesn't do anything but TELL you<BR>&gt; there is a problem after it has happened. And most of the 24/7/365 shops<BR>&gt; I have looked into, don't even provide analytical support. They just <BR>&gt; read off<BR>&gt; the information from the IDSs vendor's help file.<BR>&gt;  <BR>&gt; Our service isn't designed to be real-time. Its a regular maintenance a!
    nd<BR>&gt; management of the information. Its also can includ!
    e a lot of services<BR>&gt; 24/7/365 shops cannot do, like vulnerability scanning, on-site forensics,<BR>&gt; system patching, etc. Stuff that does not require 24/7/365 coverage.<BR>&gt;  <BR>&gt; Our service also focuses intensely on analysis. Reviewing the data and<BR>&gt; making decisions based on what we see.<BR>&gt;  <BR>&gt;  &gt; &gt; Our service was designed to offer these places<BR>&gt;  &gt; &gt; expert help and peace of mind. To make sure everything is running and<BR>&gt;  &gt; &gt; working at optimal efficiency and capability.<BR>&gt;  &gt; &gt;<BR>&gt;  &gt; Here's the problem:<BR>&gt; <BR>&gt;  &gt;    * If you are providing real-time 24/7 monitoring (as many outsourced<BR>&gt;  &gt;       security monitoring companies do) then you are providing effective<BR>&gt;  &gt;       IDS value to a customer that lacks the expertise to have in-house<BR>&gt;  &gt;      analysts.<BR>&gt;  &gt;    * But if you are only doing the outsourced monitoring every week or<BR>&gt;  !
    &gt;       so, then either the unskilled end-user is monitoring the IDS, or<BR>&gt;  &gt;       (worse) no one is monitoring the IDS. In this case, both the<BR>&gt;  &gt;       service and the IDS are of NO VALUE. They are a pure feel-good<BR>&gt;  &gt;       decoration.<BR>&gt; The purpose of an IDS is not to give you instantaneous recovery from an <BR>&gt; intrusion.<BR>&gt; The purpose of an IDS is to give insight and information about what is <BR>&gt; happening on<BR>&gt; a network. While in a perfect world, these systems would be constantly <BR>&gt; monitored<BR>&gt; by a trained person - that is simply beyond what many organizations can <BR>&gt; afford.<BR>&gt;  <BR>&gt; Monitoring and collecting information about network activities has value <BR>&gt; provided<BR>&gt; it is analyzed and fed back into some kind of decision matrix.  An IDS has<BR>&gt; no value when it is not monitored AT ALL. But regular monitoring and <BR>&gt; analysis<BR>&gt; is what gives it value. An!
    d most 24/7/365 shops do no analysis at all. <BR>&gt; They ju!
    st<BR>&gt; alert. We are providing the expert analysis that can arm IT admins with the<BR>&gt; facts they need to make intelligent decisions about their network's <BR>&gt; security. <BR>&gt;  <BR>&gt;  &gt; Exactly: all this does is generate peace of mind, without any actual<BR>&gt;  &gt; security value.<BR>&gt;  <BR>&gt; Wrong. We can catch subtle attacks and issues before they become a problem.<BR>&gt; We can spot strange behavior that would go totally unnoticed to an untrained<BR>&gt; IT admin and then arm them with the information to make a decision about<BR>&gt; how to handle that.<BR>&gt;  <BR>&gt; They can then make an informed decision about how to better secure their <BR>&gt; network<BR>&gt; based on FACTS not obnoxious rantings and ravings from security gurus. <BR>&gt;  <BR>&gt; By my definition, that is security value.<BR>&gt; <BR>&gt;  &gt; To be clear, I'm not just bashing IDS as useless. Just pointing out that<BR>&gt;  &gt; IDS is useless unless it is accompani!
    ed by human 24x7 monitoring, which<BR>&gt;  &gt; you can either do your self, or outsource.<BR>&gt; <BR>&gt;  &gt; Now-and-then monitoring of IDS is not useful, because the attacker can<BR>&gt;  &gt; do a great deal of damage before you notice it. Including change the IDS<BR>&gt;  &gt; logs.<BR>&gt; Very few firms have the resources to do 24/7/365 monitoring. Its simply too<BR>&gt; expensive. An now-and-then analysis is better than none at all. At least <BR>&gt; the<BR>&gt; systems are being watched regularly.<BR>&gt;  <BR>&gt; Besides, we do a lot more than merely monitor. There is IDS tuning, <BR>&gt; optimization,<BR>&gt; signature updating, and general analysis to insure the system is running<BR>&gt; optimally and spitting out relevant information and not just gobs of <BR>&gt; false positives.<BR>&gt;  <BR>&gt; I think there is value in this, my customers find it valuable, and I <BR>&gt; don't expect<BR>&gt; you would find it valuable, because its not intended for you.<B!
    R>&gt;  <BR>&gt; -----------------------------------<BR>&gt; !
    Andrew Plato, CISSP<BR>&gt; President / Principal Consultant<BR>&gt; Anitian Corporation<BR>&gt; <BR>&gt; (503) 644-5656 office<BR>&gt; (503) 201-0821 cell<BR>&gt; <A href="http://www.anitian.com">http://www.anitian.com> &lt;<A href="http://www.anitian.com/">http://www.anitian.com/>&gt;<BR>&gt; ------------------------------------<BR>&gt; <BR>&gt;  </DIV><DIV> </DIV></font></td></tr></table><p><hr>Changed your e-mail?  Keep your contacts!  Use this free e-mail change of address service from Return Path.  <a href="http://ae.excite.com/adclick/CID=00004fe770d73a7100000000/AREA=COMMUNICATIONS.EMAIL/SITE=excite/AAMSZ=1x1/POS=returnpath" target=_blank>Register now!</a>
    
    --EXCITEBOUNDARY_000__f8f250586e94a4dd565e1dc3bfabf0c1--
    



    This archive was generated by hypermail 2b30 : Thu Aug 29 2002 - 23:39:32 PDT