<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=162429800880729&amp;ev=PageView&amp;noscript=1">

The Tech Break

Technology Assessment

Let Bird Rock Systems' team of experts help you discover the possibilities for your business and IT team with an assessment.
Secure Your Data Today

Palo Alto Firewalls are HOT, thanks to WildFire

Aug 22, 2012 / by Larry Hoehn posted in Security

As you may know by now, Palo Alto Networks is a relatively new network security company. Its next-generation firewalls (NGF) provide granular visibility and control of applications and content. In addition to traditional firewall criteria, these firewalls can identify applications regardless of port, protocol, evasive tactic or SSL encryption. This is a lot of functionality packed into one box.

In November 2011, Palo Alto Networks extended network security to combat targeted malware with a WildFire cloud-based engine. WildFire submits EXE and DLL files to their cloud-based, virtualized environment for automatic analysis of malicious activity. It runs the files in a vulnerable environment and watches for malicious behaviors and techniques, such as modifying system files, disabling security features, or using a variety of methods to evade detection.

What’s so great about this, you may ask? Malware is distributed by a wide variety of web applications, in addition to the traditional HTTP web-browsing and email. The ability to detect, remediate and investigate unknown malware has become a practical part of a threat prevention strategy, like IPS and URL filtering.

Scenario #1: You’re inspecting email attachments for malware but do not have the ability to scan other applications. Applications that tunnel within HTTP or other protocols can carry malware that will be invisible to a traditional anti-malware solution.

Scenario #2: You have a firewall with integrated cloud-based malware analysis. This will expand your view to other applications, pull the traffic apart and go a level deeper, and addresses the challenge of modern malware.

How does it work? Unknown and potentially-malicious files are executed in a cloud-based sandbox. If the files are confirmed to be malicious, it automatically generates new signatures for both the file and for any traffic generated by the malicious file. These signatures are distributed with regular signature updates. Plus, you get an actionable analysis of exactly how the malware behaves – who was targeted and what application delivered the threat.

That sounds great, but how do I use it? At this time, WildFire is a free feature included with PAN-OS 4.1 or newer. If you already own a Palo Alto Networks firewall, enable it!

  1. Login to your firewall and go to Device > Setup > WildFire
  2. Go with the defaults settings, or make changes based on your requirements.
  3. Configure file blocking profiles (PE file type) to include the “forward” or “continue-and-forward” action.
  4. Incorporate file blocking profiles in security policies, just like other file blocking profiles.

That’s all you need to do on the firewall. Now login to the WildFire portal:

  1. Go to https://wildfire.paloaltonetworks.com, and login with your support credentials.
  2. Optional: Change your time zone and/or email notification settings.
  3. The initial screen is the dashboard, similar to the following:
  4. Click the ‘Reports’ button to see details of the potential and actual threats that have been processed in the cloud:

 

Do you have any interesting stories about WildFire, or thoughts about this article? Please chime in with a comment.

Read More

SD Business Journal: Down the Dark Alleys of Data

Jun 25, 2012 / by Joseph Javien posted in In The News, Jim Matteo, Security

In an interview with the San Diego Business Journal, CEO of Bird Rock Systems Jim Mateo breaks down the first steps on how to protect your company data. When looking into the access and security of confidential data, especially sensitive data, he says that security and access may call for “two-factor authentication,” requiring a person to submit two forms of proof that they have permission to look at the data. This might be a password coupled with biometric information such as the user’s fingerprint.

Matteo displays a different security device used in two-factor authentication: A plastic token about the size of a house key. The device, from EMC Corp. subsidiary RSA, contains a liquid crystal display which shows a code number. The number changes every 60 seconds according to a mathematical pattern. To gain access to sensitive information, a computer user might key in their personal password as well as the number from the SecurID device.

Mateo continues on to talk about how to employ basic security techniques by describing how businesses need appropriate electronics, such as a firewall or a universal threat management device, to make it harder for hackers to get in.

“Next generation firewalls that are application aware are a great tool for businesses of all sizes,” Matteo said. These might uncover software that a computer owner was previously unaware of its presence.

For the full story visit: http://www.sdbj.com/news/2012/jun/25/down-dark-alleys-data/?page=2

Read More

Lists by Topic

see all

Posts by Topic

see all

Recent Posts