Cyber File Surgery
Ed Amoroso @hashtag_cyber summarizes a recent discussion with Sasa Software about the use of CDR for #cybersecurity.

Cyber File Surgery

Roughly two decades ago, I participated in a cool project with the White House to construct a Y2K Coordination Center. The center, which was situated on I Street in Washington, had the mission to solicit and ingest data, information, and gossip from around the world via fax, email, phone, and web. The goal was to determine exactly what was happening as the clock struck midnight on 01/01/00 (and yes, I do see the supreme irony in how I just abbreviated that year).

In retrospect, it seems surprising that we were not much concerned at the time with the structural integrity of files being ingested via email or other transmittal means during the brief operation of this fusion center. If such a collection center were operating today, then presumably some sort of content examination would be used to ensure that no malware or other destructive executable content was being accepted from a malicious or infected source.

I was reflecting fondly on that Y2K experience yesterday as I chatted with the principals from Sasa Software, a cyber security start-up with roots in Israel, and focused on provision of CDR solutions for enterprise. In case you’re not familiar with this CDR designation, it stands for Content Disarm and Reconstruction, which involves inspecting a file, cracking it open for deeper inspection, extracting anything suspicious, and then reassembling the file to a usable form.

“Our technology is designed to transform incoming files and emails into workable copies that are safe from dangerous executables and other unwanted content,” explained Oren Dvoskin, Global Marketing Director for Sasa Software. “We understand that today’s file-based attacks are highly evasive, so what we do is treat every file as suspicious, and we disarm these files to stop any file-based threats from causing serious problems for the receiving entity.”

During the discussion, I learned that Sasa GateScanner for email, app servers, and desktops, works via a multi-pass process using five different malware scanners and a next-generation detection engine to render an initial judgment about the presence of suspicious content. Once this is completed, a so-called TrueType procedure ensues, to prevent file spoofing and content tampering.  Finally, and at the core of CDR, is a disarm process which involves digging deeply into the content – a process that sounded a lot like file surgery to me.

“Removing macros is the most obvious case with CDR neutralization of a target file,” Dvoskin said, “but seeking other potentially harmful elements is essential, since the goal is to restructure the file to remove active content and to prevent deeply hidden attacks, APTs, ransomware, exploits, and zero days through examination and disassembly.” This sounded doable, but my question – and something anyone considering any CDR solution would ask was this: Once you dissemble a file, how do you put things back together again?

“The reconstructed file in CDR will look essentially the same as the original file, but without the undesirable content,” explained Bavelle Technologies’ Oren David, who participated in our discussion as an authorized agent in the US to support Sasa. And such basic reconstruction made sense to me, especially for use-cases where file structure is less important than information. We’d have used CDR, for example, in the Y2K Center if the technology had existed.

The operational concept is that the Sasa solution would be connected via MX records to the inbound email path through a DMZ. This ensures proper CDR coverage for incoming email file attachments. Other scenarios include applying CDR to files from portable media such as USB drives, perhaps from third parties. An additional process that I learned about involved presenting files to a Sasa Software cloud service for CDR surgery. I joked that this sounded like “taking your files to the cleaners,” and I think that analogy is interesting.

The business challenge for Sasa Software involves addressing the range of technologies offering competing concepts. It’s challenging to differentiate between scanning, detection, dynamic analysis, and the pure prevention approach offered by CDR. Competing CDR solutions are also available on the market from vendors such as Fortinet and Votiro, but the good news is that alternate CDR options for buyers will ensure that source selection can proceed rationally, and this area of protection is thus likely to see excellent growth across our industry.

If you haven’t considered CDR to address your file protection requirements, then I suggest that you give Oren Dvoskin and his Sasa Software team a call (and I suspect Oren David from Bavelle technologies would be happy to help American buyers as well). I found the technical discussion quite useful and I wish the company well as it helps enterprise teams protect the ecosystem through CDR surgery on files.

Sharon Perlmutter

Global HR Business Partner, Human Capital M&A, Workforce Management | Cornell Alum

6 年

We would be happy to share more about CDR in detail with Oren David?at?Bavelle Technologies!

回复
Ron Goren

Protecting The SMB market from Enterprise-Grade Cyber Attacks

6 年

This is the most effective way to deal with files based malware, companies and? government agencies in Israel have been leveraging this technology and approach for years...I see North America and Europe to follow?

回复

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    13 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了