Security on the Small (Enterprise) Side

When business IT infrastructure is always under attack, IT security is a competitive advantage. It’s an advantage that larger enterprises have typically held over smaller organizations but a young provider from Europe says that they can bring large enterprise-class security to even very small companies. Serena VM is using the cloud and a virtual SOC to try to level the security playing field.

Serena VM is the relatively new, U.S.-based name of Trovolone, a French company founded by Teodor Chabin, an engineer who based the company’s foundation intellectual property on work he had done for the French military. Jeff Schilling, chief business development officer, is one of the first company executives to work in the U.S. market. I had a chance to talk with him earlier this week and heard about just how Serena VM plans to give small customers the sort of security capabilities that the large enterprise enjoys.

Jeff Schilling of Serena VM

“The secret sauce is that there are over 33 components under the covers with a simple UI,” Schilling said, explaining that security means more than simply a firewall at the perimeter. Customers demand a combination of security tools managed by experts who know what they’re doing. That combination of services on the ground and strong central management is key. “We called Serena ’20 geeks in a box,” said Schilling.

Serena VM is a 2-part solution: Serena VM replaces the in-line firewall, UTM, or other “bumps on a wire” that are most often used for network and application delivery infrastructure security. In most cases, Serena VM will be installed in a cloud deployment, though in specific circumstances it can be installed on customer hardware on-premise. The other part is the Security Operations Center(“Serena Center”) where traffic is monitored and alerts are issued. In many ways, the SOC is the key, because it brings a level of expertise to the Serena VM customer that most smaller enterprises simply can’t afford.

I asked Schilling whether Serena VM has customers for whom they generate daily reports or for whom they allow regular monitor display access to track activity. He said that Serena VM’s relationship with their customers is based on a much different understanding. “We contact the customer when something is noticed in the SOC. At this point we don’t have anyone who has access to look at [regular] activity,” He said. Serena VM’s customers have neither the need nor the interest to keep up with everything that’s happening — they simply want to know that they’re secure while they get on with their regular business.

“The reporting hasn’t been a high request item from customers,” Schilling explained. “Companies just want to work on their stuff and help their clients.” And that statement may be why security has remained much better for large organizations than for small — there’s generally only so much time, energy, and interest to go around.
For better or for worse, though, the business environment is forcing even smaller organizations to pay attention to “extras” like security. Schilling talked about one potential type of customer when he told me, “Ad agencies are losing business because their clients don’t think their IP is secure.” And it’s that question of client IP/customer PII/financial data that’s forcing the issue. Add in the increasing pressure from regulators and insurers and you get the situation where the demand for security can vastly outstrip an organization’s ability to afford and deploy the security solution.

Serena VM is targeting organizations with 5 – 50 employees. Even at the lower end of that scale, though, there are strictly a business solution with no aspirations for the consumer market. The subscription for charge $10/employee/month. Schilling says that at the time of our discussion pilot projects are out in law firms with 6 – 20 lawyers and architectural offices. “They need security and file encryption but they don’t have the budget or the staff to deal with a robust, multi-layered defense.” In a “ripped from the headlines” story, Schilling told me that the company’s first U.S. customer was the State of Virginia; the IT staff liked being able to temporarily deploy a secure infrastructure to support polling places without having to send a large crew.

Privacy Worries Cost Companies Real Money

It’s easy to get a business executives’ attention: Just take away the money. It’s one of the great equalizers because it doesn’t matter what race, nationality, gender, or religion describes the executive. If you start taking money off the table, you have their attention.

According to a new study released by Cisco, concerns about privacy are now doing just that around the world. In fact, nearly two-thirds of the businesses surveyed — 65 percent — said that privacy concerns are lengthening sales cycles and adding significant delays to sales. And when it comes to the sales cycle, time is, indeed, money. How much money are we talking about, here? A lot. The companies surveyed reported that, on average, privacy concerns are adding 7.8 weeks to their sales cycle. Those weeks matter in the hyper-competitive markets in which most companies now operate.


As with most things, the exact delay differs depending on the industry involved; government and healthcare report the longest delays. And there’s another factor playing with the delay being thrown into so many sales processes: GDPR is coming and few organizations know precisely how it will ultimately affect their sales.

But with all those differences and uncertainties the one constant is that privacy concerns are expensive. The great variable, it seems, is how mature an organization’s privacy regimen is. Companies with mature, well-developed privacy policies and practices suffer delays that are about 1/4 those of companies with ad hoc or immature privacy practices.

Given the potential effects of these delays on sales and revenues, Cisco advises organizations to take the following steps:

  • Measure current delays: Assess the scope of sales delays due to data privacy issues and understand how much sales revenue might be affected by the delays.
  • Assess root causes: Portions of a delay may be caused by sales teams being unable to address customer concerns, incomplete or inaccessible corporate policies, or engineering/design issues. Executives need to know root causes to determine resolutions.
  • Establish ongoing metrics and targeted initiatives: Regularly measure and track the sales delay metric, and set priorities for appropriate investments to reduce the delays.
  • Explore effects on cyber losses: Assess the cause of any data breaches and losses that might have been avoided through more mature data privacy processes.
  • Develop a data privacy and protection plan: If such a plan does not currently exist, plan to create policies and protocols that contribute to good security hygiene.

All of this starts, though, with simply paying attention. It’s far too tempting to assume that privacy is someone else’s problem, or that the most cost-effective strategy is to wait until there’s a problem and just pay the piper. What this study shows is that the piper is always there holding out a hand for more cash — and it’s easy enough to cut down the bill for this particular set of tunes.

Spear Phishing Gets Worse

We’re all pretty much used to phishing email messages — the steady stream of mail telling us that we’ve won something from Amazon or Microsoft, or that our bank (or credit card company, or…) needs us to verify all our personal information to keep them from freezing our account. If you pay attention at all, run-of-the-mill phishing attacks are pretty straight-forward to avoid.

Spear-phishing is another matter. A carefully crafted spear-phishing attack using personal information, spoofed to appear to come from a trusted business associate or internal email address, can fool even the most diligent individual. For most of us, spear-phishing is a remote danger because it’s a labor-intensive tactic that tends to be used against high-value individuals who control high-value assets.

For those in war zones or politically troubled regions, though, spear-phishing can be constant threat. Researchers at RiskIQ have identified individuals in Turkey who were the targets of a sophisticated spear-phishing campaign. The mechanism was fairly simple and common — a message that appeared to be from a known address (in this case, the tax collection office) containing an Excel spreadsheet. And it’s that spreadsheet that started the real attack.

The spreadsheet was the host of a RAT — a remote-access trojan — that embedded itself on the victim’s computer. Once that happens, the victim’s computer might as well be sitting on the attacker’s desktop. The RAT used in the Turkish attacks is the same one used in earlier attacks against Asian targets. It’s assumed to have been developed by hackers in China and has been used in a growing number of attacks against political targets.


This series of attacks marks an escalation of spear-phishing as a tool of cyber spies and political operatives. And it has some significant implications for officials, politicians, and political staffers in the U.S. 2018 is a mid-term election year and by now it’s well known that international agencies were involved in the 2016 U.S. elections. It’s a safe bet that there will be more attacks this year and that they will be more sophisticated than those in 2016.

So what are we supposed to do with information like this? Prepare. Pay attention to research reports on new attack methods, new payloads, and the victims who weren’t as prepared as you. Educate your employees on what to look for and (here’s the important thing) turn up the wick on the paranoia level. Assume that every message coming in is from an attacker and act accordingly.

On the one hand, all this paranoia will be a pain and will probably hasten the decline of email as a valuable messaging medium for business. On the other hand, it’s a pain that pales in comparison to seeing embarrassing information leaked to political opponents, knowing that critical business secrets have been stolen, or helping employees and customers recover from stolen PII.

Encryption’s Double-Edged Sword

In my last piece for Security Now I wrote about the need to encrypt everything.The reasons for being in favor of encryption are pretty straightforward and have been written about countless times — let’s just say that the bad guys are skilled, plentiful, and probably already in your network. If you want to have any hope of keeping your organization’s data safe, you need to have an encryption protocol in place.

With that said, encryption isn’t without its drawbacks. One of the more important is that encryption can mask malicious payloads as easily as it protects sensitive private data. Typical solutions to the problem include terminating VPN tunnels and un-encrypting data to let it pass through IPS, filter, or firewall appliances, then re-encrypting it before sending it down the wire. That can be a functional approach, but it carries serious performance costs and it adds enormous complication if you’ve decided to embrace micro-segmentation with encryption (and, in theory, security stages) between every component of the application.

That’s why today’s announcement from Cisco is important. The company’s Encrypted Traffic Analytics (ETA) — technology that allows encrypted traffic to be scanned for malicious content without being unencrypted — has been around since mid-2017 in the company’s big campus-level switches. Today, though, Cisco announced that ETA is available on the bulk of its enterprise routing platforms, including branch office routers (the ISR and ASR) and virtual cloud services routers (CSR).

Cisco isn’t alone in noting the importance of scanning and protecting encrypted network traffic. SonicWall has encrypted traffic inspection in its enterprise firewalls. Other vendors, like F5, note the importance of looking into encrypted streams but do so by terminating and inspecting tunnels at high speed.

The announcement today is important for Cisco customers but in the long-term it’s meaningful because it increases the pressure on other infrastructure vendors to develop and include similar capabilities in their switches and routers. There’s no question that encryption is going to become SOP for most organizations. If it’s easier to inspect those encrypted data streams for malicious content (as well as impermissible content heading out of the organization), then the shift to encrypted data will be faster and the benefits will be greater for everyone — except the bad guys.

Welcome Back, My Friends…

This is a great time to be a journalist covering computers, networks, and technology in general. It’s not so much that there are huge leaps in capability each month — we’re in a time of incremental technology improvements in most regards — but technology has reached the point that there are huge leaps in the ways that it’s being integrated into our lives and businesses.


For most of my career I’ve practiced what some call “advocacy journalism.” While I work to be accurate, factual, and fair, there’s a point behind the stories I write. I care about whether the people and organizations who use technology are successful and safe in what they do. Many people don’t have either the time or the expertise to keep up everything going on the industry. They depend on people like me to be their eyes, ears, and (sometimes) test lab to help them keep up.

Most of the time I write for other publications. Now, for a variety of reasons, I’m going to be putting stories here — including links to the stories I write for other publications. Thanks for being here. I’ll try to make the stories worth your time.