SUBSCRIBE

Inside next-gen endpoint detection solutions

There are seemingly an uncountable number of ways cyber attackers can wedge their way onto enterprise networks, but one of the most common is through an end point .

Ransomware, Trojans, viruses, infected attachments are more often than not spread through endpoints which CISOs thought (hoped?) were protected through signature-based solutions from vendors like Symantec, McAfee and Trend Micro and others.

But not only is it hard for traditional solutions to scale to thousands of endpoints in large enterprises, itโ€™s hard for them to keep signatures up to date with the explosion of malware.

So an increasing number of infosec pros are looking at a new generation of non-signature-based endpoint solutions from companies such as Bit9, SentinelOne, Invincia, and Cylance (protection) and CrowdStrike, CounterTack, Cybereason, Tanium and others (detection and response).

Their products boast of dropping signatures in favour of sophisticated algorithms, machine learning and artificial intelligence to improve visibility, and detect and prevent infection. Some are at least as effective as traditional AV against known threats, but their attraction is that they may be better at detecting unknown malware.

Rick Holland, analyst at Forrester Research figures his firm tracks as many as 50 new entrants. โ€œItโ€™s an overwhelming market for an analyst to cover,โ€ he said in an interview. โ€œImagine being a buyer and trying to take in everything thatโ€™s happening.โ€

However, while many CISOs are evaluating or have deployed these solutions beside traditional end point solutions, few are willing to completely drop their current software for new technology.

For example, Toronto Hydro will soon test Bromium Inc.โ€™s vSentry micro-virtualization technology, which it says isolates each user-task at the endpoint in a hardware-isolated micro-VM, preventing theft or damage to enterprise resources.

โ€œItโ€™s a pretty cool technology that reduces the surface area of your potential attack to the smallest window possible, isolates the application, gives you some situational awareness,โ€ Robert Wong, the utilityโ€™s executive vice-president and chief information and risk officer, said in an interview.
โ€œIf this proof of concept is successful we could possibly be replacing a lot of our old stuff.โ€

At the same time, his team is also deploying new capabilities being added by Hydroโ€™s existing endpoint suite provider

โ€œAt the end of the day weโ€™re still going to need a full suite of solutions and tools,โ€ Wong said, and some of these newer players may be able to augment some of the traditional antivirus technologies weโ€™re familiar with.โ€

This conservatism โ€” donโ€™t necessarily throw everything out โ€“is expected, says Holland, for a number of reasons: These solutions are new, donโ€™t combine prevention, detection and response (so several are needed to get all three), and few meet the Payment Card Industry security standards, which mandates companies following the PCI rules have an approved anti-virus solution. Gartner analyst Peter Firstbrook also noted that existing AV solutions may have capabilities that the new solutions donโ€™t such as more firewall and application control, or come with features such as email and Web gateway protection, encryption or data loss prevention.

This year the market has seen notable announcements:

โ€” Over the summer SentinelOne passed the corporate endpoint protection tests of AV-Test and is an approved PCI endpoint solution. Separately, Netflix announced it is replacing its AV solution with SentinelOne;

โ€“This week Dell Inc. announced it will start selling Cylanceโ€™s threat protection solution at the end of January alongside itโ€™s own endpoint suite;

โ€“Tanium, an endpoint and systems management supplier which says it is being used at half of the Fortune 100 companies, forged an alliance with Paolo Alto Networks to provide an integrated threat detection and response solution;

โ€“Trustwave has become a globalย managed security services providerย of the Bit9 Security Platform, which includes application control;

โ€“and, Forrester notes, some have fresh investment money: CrowdStrike, which makes an endpoint visibility and control solution, raised US$100 million over the summer, Tanium raised US$52 million in March and Cylance raised US$42 million.

At the same time a number are merging to expand capabilities: Fidelis Cybersecurity, a spin-off from General Dynamics, acquired EVCโ€™s Resolution1 Security; Digital Guardian acquired application whitelist vendor Savant Protection

Donโ€™t be surprised Forrester wrote in a September report, if existing AV vendors buy some of these startups to protect their positions.

Many are already adding capabilities: RSA hasย Enterprise Compromise Assessment Tool (ECAT), ย Trend Micro has a family of tools called Custom Defense, Check Point Software has added capabilities to its blades, andย Symantecโ€™s will add an EDR solution early next year called Advanced Threat Protection.

โ€œWeโ€™re kind of in this โ€˜tweener stage,โ€ Holland says, where protection/prevention, monitoring and response donโ€™t exist yet in a single suite.

Organizations need all three he pointed out. โ€œThereโ€™s all this talk where you have to fall back on detection and response,โ€ he said, because itโ€™s a given that if an attacker wants to get in it will. โ€œI think many people have bucketed prevention as the traditional endpoint prevention. I always warn my customers to not pivot too far to detection and response. We should not be giving up prevention โ€” its foolhardy to assume prevention or protection isnโ€™t going to get better.โ€

Detection and response donโ€™t help if ransomware has seized a PC, he adds.

New endpoint vendors are confident their time has come. โ€œAntivirus has proven to be ineffective when it comes to dealing with unknown threats,โ€ says Scott Gainey, chief marketing officer, SentinelOne, whose company last week announced a new version of its Endpoint Protection Platform EPP that includes the ability to rollback an endpoint to a pre-attack state (although it wonโ€™t help files that have been deleted.)

โ€œWe rely on a heuristic model that looks at the characteristics that malware exploits perform as they are trying to compromise and endpoint system.โ€ Those characteristics donโ€™t change much, he said. โ€œAs long as you can stop of one those stages youโ€™ve thwarted the attack.โ€

Dave Cole, chief product officer at CrowdStrike Inc., is one of those who doesnโ€™t unload on traditional antivirus companies, perhaps because he and the companyโ€™s founders came from big vendors.

โ€œThe AV industry unfairly takes a few blows that theyโ€™re entirely signature-based. Theyโ€™re not โ€” they have a lot of behavioural defences, they have a lot of capabilities that are beyond signatures,โ€ he said. โ€œBut thereโ€™s a few things they are missing: One is that the entire product assumes you are dealing with malicious executables. What that means is if the bad guys arenโ€™t using malware, or if they sneak one piece of malware past the AV product, it isnโ€™t looking at what the user is doing on the systemโ€ โ€” for example if commands are being executed at the command shell.

CrowdStrikeโ€™s Falcon Host โ€” an agent-based solution that communicates with the companyโ€™s intelligence in the cloud โ€” has a sensor that detects known and unknown malware, he said, as well as looks at the full chain of events that happens on a machine, such as whether a user is trying to escalate their privileges or dump credentials.

Interestingly, the company makes no claim it can replace traditional AV. โ€œWeโ€™ve intentionally designed the product to be complimentary to an existing antivirus solution. That will not always be the case. There will be a day we will offer something more than that. โ€

Peter Firstbrook, a Thornbury, Ont.,-based Gartner endpoint protection analyst, notes that new detection and response solutions help infosec pros better investigate suspicious activity than traditional AV solutions by offering more granularity into what happens on endpoints.ย The data can be mined for anomalies or indicators of compromise (which can come fromย  third party databases).

But he also cautions these tools arenโ€™t set-and-forget: They require skilled security analysts.

Endpoint detection is still an early developing market, Firstbrook says, which makes the CISOโ€™s job of picking a solution harder. It doesnโ€™t help that there are no standardized public tests of detection capability yet. Still, he feels most organizations with the capability to handle these new solutionsย will benefit from any improvements in detection beyond their traditional endpoint protection tools.

Tech Jobs

Categories