Jul 27, 2007 (08:07 PM EDT)
PatchLink's Sanctuary Takes Endpoint Security Seriously

Read the Original Article at InformationWeek

1   2  
THE UPSHOT
CLAIM:  Sanctuary Suite 4.1.3 promises to protect users against data loss and malware by giving IT departments control over which hardware devices and applications are allowed. IT can enforce polices against removable media, such as flash drives, and prevent the use of unwanted applications that might be conduits for malware.

CONTEXT:  The best antivirus software, patch management systems, and firewalls can't protect corporate assets from end users with unrestricted control of their computers. USB drives and high-capacity iPods mean users can not only spirit away huge amounts of sensitive information, they can install unauthorized apps that could open channels for data to sneak out -- or malware to creep in.

CREDIBILITY:  PatchLink is one of a few companies offering simple, flexible means to control and monitor application execution and removable media and devices on Windows computers. However, administrators must be vigilant in staying abreast of new application updates lest Sanctuary disrupt user productivity.
Most companies have policies regulating copying of corporate data and forbidding installation of unauthorized software. But a policy without an enforcement mechanism is only marginally better than posting a memo on the lunchroom wall.

If you're serious about endpoint security, take a look at PatchLink's Sanctuary Suite. We tested the 4.1.3 version in our Syracuse University InformationWeek Labs and found its application- and device-control features essential to helping IT departments put teeth behind corporate policies.

Using Sanctuary, IT can create whitelists of approved applications; software not on the lists simply won't execute. It also enforces policies around the use of removable media and connectivity options, including wireless LANs and Bluetooth.

On the downside, Sanctuary will cause administrative headaches: Some employees will clamor for exceptions, leading to a multitude of policies to manage, and any application whitelist requires constant vigilance to include the latest versions of mission-critical apps and browser plug-ins. But given today's regulatory climate and the never-ending hit parade of malware that people bring into the business environment, we say, pop a few Advil and get over it.

PatchLink is competing in this space with Bit9's Parity, which uses both blacklists and whitelists to define applications that can run on managed PCs. Its device-control feature can enable or disable the use of removable media and log data being copied to portable storage systems. Data-leak prevention vendors also are releasing client software that includes device control. Code Green Networks, for example, offers a client that can prevent sensitive files from being reproduced, and Vontu's Vontu 7 alerts administrators if restricted data is copied to removable media.

On the application security front, there are options that provide more flexibility than simply allowing or disallowing applications to run. We recently reviewed BeyondTrust Privilege Manager, which lets administrators elevate user rights as needed; it doesn't, however, eliminate the malware risk.

IRON-FISTED CONTROL
Sanctuary deals with the threat of malware from untrusted sources, such as rogue Internet applications, by referring to trusted lists of application groups. It uses the SHA-1 hashing algorithm to create "signatures" of allowed applications. Only those apps that are members of an allowed group can run.

While similar functionality is available to Windows administrators using Active Directory Group Policy, it's much easier to manage with a tool like Sanctuary. The Group Policy editor isn't the best place to manage application file names and hashes, while Sanctuary was designed specifically for this purpose. It also computes hashes for you, eliminating an extra step.

The whitelist database is built from scans of Sanctuary client computers, specified by IT. The logical approach is to dedicate systems with up-to-date operating system and application versions to serve as reference machines. Scans are initiated remotely from the administrative console, and results are compared against a reference database of known file definitions and predefined file groups. Allowing or denying permission for a subset of users to run a program then becomes a function of associating the file group with an object in your enterprise directory. We tested this feature by denying the use of Mozilla Firefox for an Active Directory user group.

The reference machines must be kept up to date and rescanned regularly, of course, but Sanctuary allows administrators to automate this process. The current version of the Sanctuary suite also lets IT block execution of VBScript, Microsoft Office VBA, and JavaScript files en masse. If you need to allow a specific script, you'll need to change the setting to prompt for all running scripts, which is far from desirable.

PatchLink says functionality will be added to an upcoming release that will make scripts part of the file-scanning process, which should provide greater granularity over script execution. PatchLink also needs to work on Sanctuary's group policy settings: As the product currently stands, it can get very confusing to tailor policies for multiple groups.