Your Enterprise is Only as Secure as Your Macs Trend Micro, Incorporated Trend Micro/Intego Alliance Paves the Way to Whole- Network Protection A Trend Micro White Paper I November 2007
TABLE OF CONTENTS THE CLIMATE: HIGHER STAKES FOR BETTER HACKERS...3 THE MAC: HISTORIC IMMUNITY, NEW VULNERABILITY...3 SECURING THE MAC, SECURING THE NETWORK...4 Intego VirusBarrier X4........................................................................... 4 how the product works: fast and easy...4 Virus Scanning.................................................................................. 4 Automatic or Manual............................................................................. 4 Alerts............................................................................................ 5 Turbo Mode...................................................................................... 5 Secure and Insecure Zones.................................................................... 5 Scheduling....................................................................................... 5 how the product looks: virus protection with a mac-like face...6 Remote management: securing macs on the go...7 the trend micro/intego alliance...7 2 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS
THE CLIMATE: HIGHER STAKES FOR BETTER HACKERS Today s Internet is a land of opportunity, zoned for commerce and open to all comers, shoppers and criminals alike 1.The perpetrators are not yesterday s hackers, wreaking havoc purely for mischief. Today, the enterprise is under attack by the enterprising. Financial institutions are, of course, a prime criminal target, but everyone who downloads a video, buys shoes online or responds to an email from a co-worker is vulnerable, even if they re using a Macintosh TM. > Read a whitepaper about Web 2.0 security threats. THE MAC: HISTORIC IMMUNITY, NEW VULNERABILITY Search Apple.com for known viruses, and the gist of the few responses that come up is that Macs don t have viruses, PCs do. This belief is well enough grounded in truth that it s lulled Mac TM users into a state of false security. Apple s Unix-based operating system, with such features as a built-in firewall and secure keychain, protect a Mac from marauders out of the box, but most Mac users don t even turn the firewall on. Mac s traditionally smaller market share used to make it a less attractive target for hackers than the Windowsbased enterprise. But Apple s market share has grown over 8% in the most recent quarter 2. Apple has more than 17% of the laptop market 3. A Bigger, Better Target For Apple, the price of success is increased exposure. Today, Mac users are CEOs as well as students and artists, an economically significant target. The Mac laptop s ease of use, and the richness of the applications it runs, have expanded the customer base and changed the customer profile. Mac s media-forward users are constantly online, uploading, downloading, transacting and interacting across the whole spectrum of social and commercial applications. In short, they frequent all the places where malware lies in wait. Known By Your Enemies It is a measure of the Mac s growing popularity that it now has a mature camp of enemies, from the AS.MW2004.Trojan 4, a ruthless file deleter, to a full complement of macro viruses that infect and propagate through Microsoft TM Office Word and Excel TM applications. The Safari Web browser, Apple s QuickTime TM media software, and its Bluetooth TM framework have all been recently been targeted by exploits, with impacts that range from file damage to a takeover of infected machines. Even a well-protected machine can harbor destructive malware inside the firewall. A macro that doesn t harm Microsoft Office for Macintosh can hide in a seemingly innocent Word document until it finds a Windows TM host and begins causing damage to Windows files. Given the rate at which co-workers trade files, through email, shared drives, or removable media, it doesn t take long to infect the enterprise. A healthy business can be crippled by a virulent malware assault at any time. The reward to the assailant is potentially huge. That makes the network-trusted mobile Mac a worthy target for the best cyber-criminal minds. 1 Hacker Economics, CIO magazine online, September to November 2007 2 Gartner Group, October 2007 3 NPD, June 2007 4 Intego Security Alert - http://www.intego.com/news/pr42.asp 3 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS
SECURING THE MAC, SECURING THE NETWORK Even if an enterprise has strong anti-virus protection installed on its file servers and email servers, even if it has an impenetrable firewall, it can still be brought low by an employee who comes to work with an infected machine, or a partner who accesses the network from one. That s why it s important to protect the individual Mac as well as the corporate infrastructure. There are two equally good reasons to choose a virus protection product that s as elegantly simple as a Mac. The first is that Mac users expect an intuitive, non-intrusive interface that does the job without a lot of steps or a lot of fanfare. The second reason is that enterprise network administrators are often new to the Mac. Anything that makes it easier for them to do the right thing is the right thing. Intego VirusBarrier TM X4 Intego VirusBarrier X4, cited on apple.com as the acclaimed anti-virus program for the Mac, is a powerful security solution designed for use with OS X. While its under-the-hood sophistication equals that of popular Windows security products, the Intego VirusBarrier X4 interface is easy to use. Three Apple-friendly keywords governed its design: simple, fast, and non-intrusive. According to reviews in the Macintosh press, it succeeds in being all three 5. Installation requires only a few clicks and a reboot. Once Intego VirusBarrier X4 is installed and run for the first time, it becomes virtually invisible to the user until it has something urgent to report. Macworld product reviewer Rob Griffiths wrote, In my testing, this background monitoring had no noticeable impact on my daily use of a PowerBook G4...It is also the fastest scanner I tested by far. 6 HOW THE PRODUCT WORKS: FAST AND EASY Virus Scanning Intego VirusBarrier X4 was designed for the Mac, by an engineering team that has focused on the Mac for as long as Intego has been in business. It monitors all user activity, constantly scanning for all known Macintosh viruses, Word and Excel macros, and viruses that target the Windows operating system. Automatic or Manual In automatic mode, VirusBarrier X4 runs as a background application. If it finds infected files, it notifies the user and repairs the files quickly and quietly, eliminating the virus that did the damage. If it can t repair the files, the application alerts the user of the file damage. Manual mode enables users to initiate scanning when they want to be sure a disk, a volume, or a particular file is safe. Manual scan can be initiated through the application, when it s running, or by dragging and dropping the target to be scanned over the program s Dock icon. Intego recommends a manual scan when the program is first installed, and each time virus definitions are updated. 5 Intego VirusBarrier X4: It s fast, thorough, and easy to use, Rob Griffiths, Macworld, May 2006 6 Ibid 4 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS
Alerts VirusBarrier X4 lets users choose one of three ways to be alerted if it detects viruses during its background scanning. The program can display an alert screen. It can play an alert sound. Finally, and especially useful when computers are connected to a network, VirusBarrier X4 can send an email alert to a specified email address to warn a network administrator about the presence of a virus. Turbo Mode The first time VirusBarrier X4 scans a computer, it scans and logs every file. Subsequently, it scans only those files that have been updated since the last scan. This enables VirusBarrier X4 to complete its work 5 to 40 times more quickly, making it the fastest product available for the Macintosh. 7 Secured and Unsecure Zones VirusBarrier X4 gives users the option of specifying Secure Zones, whose content will be automatically checked for viruses every time a change occurs. The zone can be as large as a volume or as small as a folder. Designating Secure Zones is a good way to protect shared folders, download folders, or drop boxes. A user can also specify an Unsecured Zone, one that will not be automatically scanned by VirusBarrier X4. This option should be used on files that have already been scanned and found to be safe, and are not shared. Users of video content who don t want to slow down the editing process can put their files in the Unsecured Zone. Scheduling VirusBarrier X4 lets users automatically check for program updates and new virus definitions with Intego s NetUpdate X4. Using a simple interface, the user can schedule updates as frequently as desired, and choose to have them appear in his or her ical. By user preference, Net Update X4 can also run in the background. For more about VirusBarrier X4 features, click here. 7 Ibid 5 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS
HOW THE PRODUCT LOOKS: VIRUS PROTECTION WITH A MAC-LIKE FACE Intego VirusBarrier X4 was created for the OS X operating system, and supports Macs with either PowerPC or Intel processors. Equally important, the application supports the Mac mind, offering users the simple, intuitive interface that makes them Mac users in the first place. The easier a solution is, the more likely it is to be used. The VirusBarrier X4 icon appears in the Dock; the user can simply drag and drop a file over the icon to initiate scanning. VirusBarrier X4 features a simple interface, giving the user easy access to all the features of the application. A Dashboard widget displays scheduled VirusBarrier X4 scans. NetUpdate TM X4 s simple interface lets users schedule updates from Intego s website. A Dashboard widget alerts users when updates become available. When a virus is detected, VirusBarrier X4 displays a visual alert. The log provides data about every scan performed, every virus found, and every action taken. 6 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS
REMOTE MANAGEMENT: SECURING MACS ON THE GO As Mac OS X takes its place in the enterprise, the enterprise needs a scalable way to shake hands with Macs. Intego Remote Management Console is a software administration tool for multiple Macintosh computers, scalable enough to manage security policy for an ever-expanding number of clients, yet simple enough for one administrator to do the work. With Remote Management Console, that work includes installing, configuring, and managing Intego security software on multiple user machines over a Local Area Network (LAN), a Virtual Private Network (VPN), or the Internet. Like the Intego security software it manages, Intego Remote Management Console relies on a simple, intuitive interface, making it easy for just one person to master, deploy, and use. It consists of two programs, one for clients and one for administrative use. The Remote Management program cannot access a client machine unless the client first authorizes remote management. THE TREND MICRO/ INTEGO ALLIANCE: PROTECTING THE ENTERPRISE AGAINST ALL COMERS Because Trend Micro knows that Macs are everywhere, popular enough to be an integral part of many major companies IT footprint and mobile enough to threaten their security, it now partners with Intego to offer its customers one source for whole-network protection. A pioneer in secure content and threat management, Trend Micro provides companies of all sizes with security software, hardware, and services. Running and managing Trend Micro and Intego security software side by side lets companies close a back door that s stood open too long, giving the malicious and the greedy access to the assets of the enterprise. To learn more about the Intego solutions offered by Trend Micro, click here. TREND MICRO Trend Micro Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hardware and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information and evaluation copies of Trend Micro products and services, wisit our Web site at www.trendmicro.com. 7 WHITE PAPER I YOUR ENTERPRISE IS ONLY AS SECURE AS YOUR MACS TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 US toll free: 1 +800.228.5651 phone: 1 +408.257.1500 fax: 1 +408.257.2003 www.trendmicro.com 2007 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [WP01_Intego_071128US]