PortAuthority: Attacking the Inside-Job

Do you know where your campus security breaches are? Most IT professionals who deal with security spend their time and budgets preventing intrusion from the outside: viruses, worms, hackers, and thieves. By some estimates, more than 85 percent of security spending is devoted to resisting outside attacks. In fact, it is more than likely that some of the security violations are coming from inside, through the deliberate or inadvertent release of vital information to unauthorized sources.

Campuses have much to protect: student records, intellectual property, personnel information, and more. It is easy to imagine scenarios where data could be revealed—accidentally or on purpose—to the wrong parties. How can an academic institution keep this vital data inside its walls?

One approach would be to install a product called PortAuthority from Beverly Hills-based Vidius. PortAuthority is a software solution that relies on “electronic fingerprinting” technology to detect and quarantine any internal or outbound security breach. The software analyzes outbound communication, examining how the actual information is constructed within a given document or message, and then assesses the information for a violation, using over two dozen sophisticated algorithms. According to Kevin Moylan, vice president of product marketing for Vidius, PortAuthority is the only product of its kind. “Without a doubt,” says Moylan, “we can positively identify particular portions of confidential information either in whole or in part. We provide the ability to identify it, to quarantine it, and to notify the appropriate parties about the breach. All of this occurs in real time.”

Vidius describes PortAuthority as far more reliable than key word filtering (which can generate a lot of false positives) and encryption (depending on user discretion and works only at the file level, not the information level).

No client-side encryption or viewing software is necessary with PortAuthority. The software protects entire data sets or documents as well as portions or bits of data, including any that have been modified, cut, copied, and pasted into other files or messages. PortAuthority blocks the outgoing message, preventing it from being distributed either internally or externally, and the system administrator receives instant notification.

Vidius’s Web site statistics (from Richard Hunter of Gartner), that “more than 70 percent of unauthorized access to information systems are committed by employees, as are more than 95 percent of intrusions that result in significant financial losses.” This statistic, of course, d'es not necessarily include academic scenarios. No data is available on the amount of unauthorized outgoing e-mail on campus. However, colleges and universities are in a unique, and uniquely vulnerable position, in that hundreds or thousands of new users come onto the system each year. Plus, academia’s commitment to free speech and the free dissemination of ideas make it even more difficult to exert control over data.

PortAuthority is configurable to meet the needs of particular campuses. Administrators can designate which directory to monitor. Only designated information is inspected. A block override function assigns specific personnel as “power users,” granting them the ability to release blocked messages. A comprehensive reporting feature tracks repeat offenders and policy violations. It also analyzes threats to determine whether they are probably accidental or intentional. And its broad file support feature supports over 250 native file formats, including Word, Excel, and other common formats. The software is scalable and permits clustered server environments.

For more information about PortAuthority, contact Vidius, Beverly Hills, CA; (310) 888-2330; www.vidius.com.

Featured