Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Sana Uses Medical Concept for Application Security Platform

    By
    Dennis Fisher
    -
    February 10, 2003
    Share
    Facebook
    Twitter
    Linkedin

      The IT security industry has looked to medicine for metaphors and ways of thinking about network protection. Sana Security Inc., a San Mateo, Calif., startup, is extending that relationship with the introduction of its Primary Response application security platform.

      The software, unveiled last week, observes application/operating system interactions and learns the code paths that each application uses during normal operations. The system develops a profile of each applications behavior and blocks anything that falls outside that profile.

      As a result, the system produces a remarkably low number of false positives—as few as two or three per month in some customer environments.

      The concept was taken from the human immune systems ability to recognize potential infections and begin defending against them before they reach their targets. The software is the brainchild of Steven Hofmeyr, Sanas founder and chief scientist, who developed the idea during research for his doctoral thesis.

      Although the concept is similar to several other systems on the market, there is one key difference, Hofmeyr said: Sana does not rely on a human to define acceptable behavior for each application. “[Other vendors] assume theres some human out there with sufficient knowledge to recognize the attacks and know what to do,” he said. “Weve assumed the human wont understand.”

      Primary Response relies on a server/agent architecture and is meant mainly for servers handling Web, FTP and Domain Name System traffic, but it can also protect custom applications.

      PRIMARY FUNCTIONS

      Key features of Primary Response:

      • Learns code paths used by each application
      • Develops a profile of acceptable behavior
      • Recognizes and blocks unusual activity on protected servers

      “It can be applied to any application that has predictable behavior,” Hofmeyr said. “We can take one of several different actions during an attack. We can either block all file actions or prevent certain unusual operations or just block the execution of the file.” Once an attack is detected and blocked, the system functions much like other security applications. It sends an e-mail alert to the administrator and logs the event in a central management console. The system includes a set of analytics to help identify trends and dig deeper into each event.

      Primary Response is due to ship in the middle of next month on Windows and Solaris; Linux and AIX versions are in the works. One server license costs $6,500; each agent is priced at $1,750.

      Avatar
      Dennis Fisher

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×