Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Virtual Machine Fights a Real Security Problem

    By
    David Coursey
    -
    June 2, 2005
    Share
    Facebook
    Twitter
    Linkedin

      Its been rare in my reporting life that one minute I realize I have a problem and the next minute—literally, almost—the solution appears during an interview.

      Heres the setup: E-mail arrives with an attachment.

      Most attachments get stripped off by the anti-virus/anti-spam software on my Exchange server. Or by Exchange itself, which automatically stops certain types of attachments.

      This .zip file wasnt stopped and seemed to be from a legitimate source. I ran Norton antivirus against the file and it checked out clean.

      However, when I unzipped and tried to open the file, I was stopped by a warning that a script was trying to run.

      Being dense sometimes, but not stupid, I blocked the script and deleted the file. Crisis averted.

      I am confident its just coincidence—or a heck of a PR stunt—but a half-hour later I did an interview with a company that, unbeknownst to me, offers software that automates the process Id just gone through by opening every unknown attachment that appears in the SMTP stream.

      Avinti Inc. is a Linden, Utah-based company that has created what it calls an “iSolation Server” that sits behind anti-virus and anti-spam protection but ahead of user mailboxes.

      The Avinti server runs four layers of additional filtering, but if it still cant determine an e-mail attachment is clean, it actually opens the file and sees what happens.

      Avinti CEO Terry Dickson told me the typical malicious file will attempt perhaps 10 actions that a non-malicious file doesnt.

      The iSolation Server opens the file in a highly monitored virtual machine environment. If something bad happens, the file never gets to the user desktop.

      Each Avinti server can handle up to 250,000 messages per day, Dickson told me.

      The news this week is the addition of load balancing features that allow multiple Isolation Servers to work together in an enterprise environment.

      Avinti prices its servers on an annual license that begins at $12.50-per-mailbox protected and falls to half that as quantities increase.

      Dickson said that instead of thinking of the iSolation Server as a last line of defense, it ought to be considered the only defense a company might have against an attack directed specifically at its users.

      “I dont know why people arent talking about this,” Dickson said, adding that attacks too small to ever be detected—and defended against—by traditional security products could still compromise targeted companies.

      I assured Dickson that he wasnt as alone in his concerns as he had thought.

      Asked what security issues concern him most, Microsoft Windows boss Jim Allchin mentioned company-specific threats to me during an interview last month at WinHEC in Seattle.

      Allchin said such targeted attacks are already taking place, though most victims are completely unaware of them.

      /zimages/1/28571.gifTo read more about how virus writers are bypassing filters, click here.

      Armed with a new investment by Symantec, 3-year-old Avinti currently has about 100 customers, Dickson told me.

      Given the downside of having to publicly announce the unauthorized disclosure of personal data, Dickson said Avinti hopes to find a fertile market as customers realize the expanding threats and consequences they face.

      Contributing editor David Coursey has spent two decades writing about hardware, software and communications for business customers.

      /zimages/1/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      David Coursey
      One of technology's most recognized bylines, David Coursey is Special Correspondent for eWeek.com, where he writes a daily Blog (blog.ziffdavis.com/coursey) and twice-weekly column. He is also Editor/Publisher of the Technology Insights newsletter and President of DCC, Inc., a professional services and consulting firm.Former Executive Editor of ZDNet AnchorDesk, Coursey has also been Executive Producer of a number of industry conferences, including DEMO, Showcase, and Digital Living Room. Coursey's columns have been quoted by both Bill Gates and Steve Jobs and he has appeared on ABC News Nightline, CNN, CBS News, and other broadcasts as an expert on computing and the Internet. He has also written for InfoWorld, USA Today, PC World, Computerworld, and a number of other publications. His Web site is www.coursey.com.

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×