Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    UK Security Firm Builds Network Immune Systems to Prevent Data Loss

    Written by

    Wayne Rash
    Published July 22, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      WASHINGTON, D.C.—It was impossible to escape the feeling as I joined the folks from DarkTrace for lunch at the Blue Duck Tavern here in Washington, D.C., that I was seated next to George Smiley, author John LeCarre’s legendary spymaster.

      While Andrew France, formerly of the UK’s Government Communications Headquarters (GCHQ), doesn’t claim to be a spymaster, he was awarded the Order of the British Empire for his work with British Intelligence and the Ministry of Defence in 2005.

      We discussed some of the IT security challenges that I’ve written about many times and that he’s confronted on a daily basis for decades. Security, he pointed out, is an impossible task. The Bad Guys keep trying to break into networks by outguessing your antivirus, anti-malware and intrusion detection systems.

      However, the problem is warding off all network intrusion attempts requires you to correctly out-guess every would-be intruder. The intruder only needs to be right once.

      And that fact underscores the difficulty of enterprise security. It’s made worse because it’s not just the Bad Guys who threaten your networks. It’s also the Good Guys, whether it’s employees who write their passwords on Post-It notes stuck to monitors, or the person who downloads credit card info to his iPad, there are many times that insiders present the biggest threat to an organization.

      These factors don’t even take into account the insiders who steal data for their own nefarious purposes, whether it’s to sell it to criminals or to feather their nest at the next job.

      Also sitting next to me was another person who has many years experience working with IT security. Jasper Graham, who left the National Security Agency to join DarkTrace, spent his working life tracking how the Bad Guys penetrate networks. Now he’s using that knowledge to help create a new approach to protecting your organization’s data—an enterprise immune system.

      The idea of an immune system for the enterprise is something new. Since you can’t keep out every hacker, every piece of malware, every insider looking to make a buck or every member of the Chinese Army trying to steal trade secrets, how about if you simply kept them from getting information if they manage to penetrate your network defenses?

      That’s the idea behind DarkTrace. The company’s security appliance works by developing a mathematical model of the complete enterprise network and then monitors changes.

      As time goes on, the appliance fills in the details about the enterprise and in the process develops an enterprise immune system. But when it sees significant changes, the system sends out an alert to the security staff so they can check it out.

      UK Security Firm Builds Network Immune Systems to Prevent Data Loss

      The difference between the Enterprise Immune System and intrusion detection systems is that it doesn’t flood the security staff with thousands of false positives, which is what you find with most intrusion detection and prevention systems. Instead, it simply watches the events as they happen and only flags those that are not part of the normal operation of the network.

      One example of how this works happened with a major power generation facility in the UK. This facility is under constant attack from outside sources apparently seeking to gain intellectual property about the company’s biomass power systems. While the installation already had the full set of security solutions implemented, the value of the biomass project is such that finding out about a leak after the fact was problematic.

      The company installed the DarkTrace appliance on a trial basis, and almost immediately found a flood of DNS traffic exiting the network, aimed at a foreign server. Because the server sending out the DNS packets had no reason to be doing such a thing, the security staff knew that someone was embedding the critical data in those packets.

      The server was shut down immediately so that the data leak could be remediated. As France noted to me, the problem wasn’t to analyze the source of the attack, but rather to keep the data from being taken.

      France pointed out that the DarkTrace approach doesn’t rule out continued existing security applications, but rather is aimed at finding intrusions that somehow make it past existing security measures. Then what matters is that the leak be found and prevented. Later, the anti-intrusion products can catch up and eliminate whatever was getting into the network.

      Because the Enterprise Immune System looks for abnormal activity, regardless of the source, it picks up activity that other types of security miss. What’s better is that it is able to adapt to a changing network. As France explained, if someone transfers to a new work location or gets new roles within the organization, the immune system will flag the change and the IT staff can then confirm that the change in activity is OK.

      But it also means that when Fred in Sales decides to go to work for your competitor and sends the complete customer list to his new company, you’ll find out as soon as he starts trying to transfer the data and you’ll be able to put a stop to it.

      Ultimately, stopping data loss is the real goal. What matters to your company is not losing the critical information it needs to stay in business. You can update the security software and hardware later, after your critical information is secure.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×