Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Top 10 Reasons Security Products Don't Work


7. Users fail to install/deploy the product correctly

If you've ever had trouble installing a home appliance, and yes, most of us have, why should a security appliance be any different? Many IT departments pinch pennies by skipping the vendor's training sessions or eschewing its implementation consulting services, just like those of us who don't like to follow the instructions when they install a new garbage disposal. And the results can be egg (or other messy foods) on your face.

"The most common mistake I've seen with security products is that the customer installs them using the default configuration, without adding any new policies to address their specific environment," says Chris Roeckl, vice president of corporate marketing at Fortinet and another grizzled veteran of multiple security companies. "This is particularly true at small companies, where people sometimes feel that they don't have any special needs, or that they don't have the skills to do the configuration. But most security products are made to fit the customer's specific policies -- to some degree, you have to tell it what to do."

Brian Foster, senior director of product management for Symantec's end point security group, concurs. "A high percentage of threats are successful because the end points are not properly configured," he says. "If it's not set up in the right way, it's not going to work."

Foster gives the example of the Blaster worm, which infected many systems through open ports. "One of the basic best practices that companies should always follow when they install a device is to turn off ports that aren't being used," he says. "That's not even a function of the security product itself -- it's just good IT policy. But in that case, a lot of companies hadn't followed it, and they paid."

Be sure you set up your security products to record their activities as they occur, advises Sword and Shield's Griffin. "When we go in to troubleshoot a problem, one of the most frustrating things is when the client has a security product, but has failed to turn on the audit functions, such as data logging," he says. "When that happens, we can't tell how the product was used or how it behaved during an incident."

Bottom line: Be sure you've configured your new products correctly for your specific environment. If you don't know how, ask the vendor or an expert consultant to help with the implementation. Installation mistakes are often a reason why products fail to operate correctly when a threat occurs.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.