Modernizing Authentication — What It Takes to Transform Secure Access
Shinobi Cyber, the U.S.-based operations of Japanese security software specialist Humming Heads, today announced that its Shinobi Defense System is now available in the States.
The solution employs application programming interface (API) and kernel-level monitoring to provide data loss prevention and block attacks using the company's Full Spectrum Whitelisting technology. Compared to whitelist solutions that can miss application layer threats like malicious scripts and dynamic link library files (.DLLs), Shinobi Defense System delves deeper to protect data, explained Tom Lindeman, CEO of Shinobi Cyber.
Whitelisting is a simple enough concept to grasp. In the case of a firewall, whitelisting enables administrators to list which IP addresses are allowed to access the network rather than come up with a laundry list of all the IP addresses they wish to block. Shinobi Defense System works similarly, but with a twist.
"We approach cyberattacks the same way and this means that admins using Shinobi don't have to worry about all the new threats and malware variants that are out there. If an action takes place on the endpoint that is not authorized it will be blocked," Lindeman told eSecurity Planet.https://o1.qnsr.com/log/p.gif?;n=203;c=204634421;s=15939;x=7936;f=201702151714490;u=j;z=TIMESTAMP;a=20304455;e=i
"Our magic is that our whitelists go down to the processes at the API/kernel level, versus just the application level, which is the deepest whitelist technology available today," continued Lindeman. "We look at data protection the same way, and we authorize how data can be transferred out of an organization via USB, email, upload to Office 365, etc., and only allow exactly what the admin specifies."
In Japan, Shinobi Cyber's security platform is already being used to protect over a million PCs and 1,000 corporate customers. In that country, like practically all others, businesses are besieged with phishing attacks, Lindeman said. User error also plays a big role in the unintentional leakage of sensitive data.
When a phishing attack or other potentially dangerous activity takes place on a PC, "we immediately intercept and block it, so customers using Shinobi are protected against phishing attacks," the effectiveness of which can be verified with a scan of the solution's forensic log files, said Lindeman.
For users that are prone to leaking data, the system uses encryption to help organizations to keep a tight lid on sensitive information.
Using the Shinobi Defense System, "IT security admins don't need to worry about end users accidentally or intentionally leaking or stealing data, because any file that leaves the Trusted Zone is invisibly and automatically encrypted with a unique AES-256 key," Lindeman said. "This is invisible to end users and they can collaborate as usual, but if the file is copied to a USB drive or attached to email without being released in the clear, it will never be able to be read."