Secure Computing Corporation
   HOME

TheInfoList



OR:

Secure Computing Corporation (SCC) was a
public company A public company is a company whose ownership is organized via shares of stock which are intended to be freely traded on a stock exchange or in over-the-counter markets. A public (publicly traded) company can be listed on a stock exchange ( ...
that developed and sold
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
appliances and hosted services to protect users and data.
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
acquired the company in 2008. The company also developed filtering systems used by governments such as
Iran Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkmeni ...
and
Saudi Arabia Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in Western Asia. It covers the bulk of the Arabian Peninsula, and has a land area of about , making it the fifth-largest country in Asia, the second-largest in the A ...
that blocks their citizens from accessing information on the Internet.Snuffing out Net's benefit to democracy
Jim Landers, '' Dallas Morning News'', December 20, 2005; accessed September 20, 2008.
Iran targets dissent on the net
Clark Boyd, '' BBC.com'', June 24, 2005; accessed September 20, 2008.


Company history

In 1984, a research group called the Secure Computing Technology Center (SCTC) was formed at
Honeywell Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building technologies, performance ma ...
in Minneapolis, Minnesota. The centerpiece of SCTC was its work on security-evaluated operating systems for the NSA. This work included the
Secure Ada Target Secure may refer to: * Security, being protected against danger or loss(es) **Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources **Information security, defending information ...
(SAT) and the Logical Coprocessing Kernel (LOCK), both designed to meet the stringent A1 level of the Trusted Computer Systems Evaluation Criteria (TCSEC). Over the next several years, Secure Computing morphed from a small
defense contractor The arms industry, also known as the arms trade, is a global industry which manufactures and sells weapons and military technology. It consists of a commercial industry involved in the research and development, engineering, production, and se ...
into a commercial product vendor, largely because the investment community was much less interested in purchasing security goods from defense contractors than from commercial product vendors, especially vendors in the growing
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
space. Secure Computing became a publicly traded company in 1995. Following the pattern of other Internet-related startups, the stock price tripled its first day: it opened at $16 a share and closed at $48. The price peaked around $64 in the next several weeks and then collapsed over the following year or so. It ranged between roughly $3 and $20 afterward until the company was purchased by McAfee. The company headquarters were moved to
San Jose, California San Jose, officially San José (; ; ), is a major city in the U.S. state of California that is the cultural, financial, and political center of Silicon Valley and largest city in Northern California by both population and area. With a 2020 popu ...
, in 1998, though the bulk of the workforce remained in the
Twin Cities Twin cities are a special case of two neighboring cities or urban centres that grow into a single conurbation – or narrowly separated urban areas – over time. There are no formal criteria, but twin cities are generally comparable in sta ...
. The Roseville employees completed a move to St. Paul, Minnesota, in February 2006. Several other sites now exist, largely the result of mergers.


Mergers and acquisitions

Secure Computing consisted of several merged units, one of the oldest being Enigma Logic, Inc., which was started around 1982. Bob Bosen, the founder, claims to have created the first
security token A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to access something. Examples of security tokens inc ...
to provide
challenge–response authentication In computer security, challenge–response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated. The simplest example of a ch ...
. Bosen published a computer game for the
TRS-80 The TRS-80 Micro Computer System (TRS-80, later renamed the Model I to distinguish it from successors) is a desktop microcomputer launched in 1977 and sold by Tandy Corporation through their Radio Shack stores. The name is an abbreviation of '' ...
home computer in 1979, called ''80 Space Raiders'', that used a simple challenge–response mechanism for copy protection. People who used the mechanism encouraged him to repackage it for remote authentication. Bosen started Enigma Logic to do so, and filed for patents in 1982–83; a patent was issued in the United Kingdom in 1986. Ultimately, the "challenge" portion of the challenge–response was eliminated to produce a
one-time password A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid seve ...
token similar to the SecurID product. Enigma Logic merged with Secure Computing Corporation in 1996. Secure Computing acquired the SmartFilter product line by purchasing Webster Network Strategies, the producer of the WebTrack product, in 1996. The acquisition included the domain name webster.com, which was eventually sold to the publishers of ''
Webster's Dictionary ''Webster's Dictionary'' is any of the English language dictionaries edited in the early 19th century by American lexicographer Noah Webster (1758–1843), as well as numerous related or unrelated dictionaries that have adopted the Webster's ...
''. Shortly after acquiring the Webster/SmartFilter product, Secure Computing merged with Border Network Technologies, a Canadian company selling the Borderware firewall. Border Network Technologies boasted an excellent product and a highly developed set of sales channels; some said that the sales channels were a major inducement for the merger. Although the plan was to completely merge the Borderware product with Sidewinder, and to offer a single product to existing users of both products, this never quite succeeded. In 1998, the Borderware business unit was sold to a new company, Borderware Technologies Inc., formed by one of the original Borderware founders. By this time, the mergers had yielded a highly distributed company with offices in
Minnesota Minnesota () is a state in the upper midwestern region of the United States. It is the 12th largest U.S. state in area and the 22nd most populous, with over 5.75 million residents. Minnesota is home to western prairies, now given over to ...
,
Florida Florida is a state located in the Southeastern region of the United States. Florida is bordered to the west by the Gulf of Mexico, to the northwest by Alabama, to the north by Georgia, to the east by the Bahamas and Atlantic Ocean, and to ...
,
California California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the m ...
, and two or three in
Ontario Ontario ( ; ) is one of the thirteen provinces and territories of Canada.Ontario is located in the geographic eastern half of Canada, but it has historically and politically been considered to be part of Central Canada. Located in Central C ...
. This proved unwieldy, and the company scaled back to offices in Minnesota and California. In 2002, the company took over the Gauntlet Firewall product from
Network Associates McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
. In 2003, Secure Computing acquired N2H2, the makers of the Bess web filtering package. There has been some consolidation of Bess and SmartFilter, and Bess is now referred to as "Smartfilter, Bess edition" in company literature. An acquisition of CyberGuard was announced in August 2005 and approved in January 2006. (A year earlier, CyberGuard had attempted to acquire Secure Computing, but the proposal had been rejected). This was the largest merger by Secure Computing at the time and resulted in the addition of several product lines, including three classes of firewalls, content and protocol filtering systems, and an enterprise-wide management system for controlling all of those products. Several offices were also added, including CyberGuard's main facility in
Deerfield Beach, Florida Deerfield Beach is a city in Broward County, Florida, United States, just south of the Palm Beach County line. The city is named for the numerous deer that once roamed the area. As of the 2020 census, the population was 86,859. It is a principal ...
, as well as the Webwasher development office in Paderborn, Germany, and a SnapGear development office in
Brisbane, Australia Brisbane ( ) is the capital and most populous city of the Australian state of Queensland, and the third-most populous city in Australia and Oceania, with a population of approximately 2.6 million. Brisbane lies at the centre of the South ...
. In 2006, the company merged with Atlanta-based CipherTrust, a developer of email security solutions. The merger was announced in July 2006 and completed in August 2006. On July 30, 2008, Secure Computing announced its intention to sell the SafeWord authentication product line to
Aladdin Knowledge Systems Aladdin Knowledge Systems (formerly and ) was a company that produced software for digital rights management and Internet security. The company was acquired by Safenet Inc, in 2009. Its corporate headquarters are located in Belcamp, MD. Histor ...
, leaving the company with a business focused on web/mail security and firewalls. The sale was concluded later that year. On September 22, 2008, McAfee announced its intention to acquire Secure Computing. The acquisition was completed not long afterwards, and the combined company formed the world's largest dedicated security company at the time.


Products


TrustedSource reputation system

TrustedSource TrustedSource is an Internet reputation system originally developed by CipherTrust and now owned by Intel Security. It provides reputation scores for Internet identities, such as IP addresses, URLs, domains, and email/web content. Reputatio ...
, a
reputation system Reputation systems are programs or algorithms that allow users to rate each other in online communities in order to build trust through reputation. Some common uses of these systems can be found on E-commerce websites such as eBay, Amazon.com, ...
that Secure Computing obtained as part of the CipherTrust acquisition, was a key technology for the company, enabling all product lines with global intelligence capability based on behavioral analysis of traffic patterns from all of company's email, web and firewall devices and hosted services, as well as those of numerous OEM partners. TrustedSource derived real-time reputation scores of IPs, URLs, domains, and mail/web content based on a variety of data mining/analysis techniques, such as Support Vector Machine, Random forest, and Term-Frequency Inverse-Document Frequency ( TFIDF) classifiers.


Web security

The company's flagship web security product line was the
Secure Web Secure may refer to: * Security, being protected against danger or loss(es) **Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources **Information security, defending information ...
appliance (formerly known as Webwasher). It provided Anti-Malware protection, TrustedSource reputation-enabled URL filtering controls, content caching, and SSL scanning capabilities. In June 2008, Secure Computing launched Secure Web Protection Service, an in-the-cloud hosted web security service that provided a similar set of features to the
Secure Web Secure may refer to: * Security, being protected against danger or loss(es) **Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources **Information security, defending information ...
appliance, without requiring any on-premises equipment or software.


Mail security

The company's flagship email security product line was the Secure Mail appliance (formerly known as IronMail). It provided TrustedSource reputation-enabled anti-spam, data-leakage protection (DLP), encryption and anti-malware capabilities.


Secure firewalls

The company's flagship firewall product, formerly known as Sidewinder, was renamed McAfee Firewall Enterprise; McAfee sold Sidewinder to Forcepoint in January 2016. Over the years, Secure Computing (and its antecedent organizations) has offered the following major lines of firewall products: * Firewall Enterprise (Sidewinder) – historically based on SecureOS, the company's derivative of BSDi (previously
BSD/OS BSD/OS (originally called BSD/386 and sometimes known as BSDi) is a discontinued proprietary version of the BSD operating system developed by Berkeley Software Design, Inc. (BSDi). BSD/OS had a reputation for reliability in server roles; the ren ...
), but later based on FreeBSD. * Secure Firewall Reporter * Secure Firewall CommandCenter * CyberGuard ** Secure SnapGear – embedded system based on
μClinux μClinux is a variation of the Linux kernel, previously maintained as a fork, that targets microcontrollers without a memory management unit (MMU). It was integrated into the mainline kernel as of 2.5.46; the project continues to develop patc ...
** Classic – built on UnixWare ** TSP (Total Stream Protection) – built on
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, w ...
* Borderware – sold off, as noted previously * SecureZone – discontinued * Firewall for NT – discontinued * Gauntlet – built on Solaris, nearly phased out The Sidewinder firewall incorporated technical features of the high-assurance LOCK system, including
Type enforcement The concept of type enforcement (TE), in the field of information technology, is an access control mechanism for regulating access in computer systems. Implementing TE gives priority to mandatory access control (MAC) over discretionary access cont ...
, a technology later applied in
SELinux Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications and user-space ...
. However, interaction between Secure Computing and the open source community was spotty due to the company's ownership of
patent A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an enabling disclosure of the invention."A ...
s related to Type enforcement. The Sidewinder never really tried to achieve an A1
TCSEC Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCS ...
rating, but it did earn an EAL-4+ Common Criteria rating. Along with Sidewinder, Gauntlet had been one of the earliest application layer firewalls; both had developed a large customer base in the
United States Department of Defense The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national sec ...
. Gauntlet was originally developed by
Trusted Information Systems Trusted Information Systems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such as NSA, DARPA, ARL, AFRL, SPAWAR ...
(TIS) as a commercial version of the ''TIS Firewall Toolkit'', an early open source firewall package developed under a
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Ad ...
contract.


Use of company products for governmental censorship

The
OpenNet Initiative The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. The project employed a number of technical means, as well as an international network of investigato ...
studied filtering software used by governments to block access by their citizens and found Secure Computing's SmartFilter program heavily used by both the Iranian and Saudi governments. According to Secure Computing, any use of its software in Iran is without its consent— U.S. sanctions prohibit American companies from any dealings with Iran—and in 2005 the company said it is actively working to stop its illegal use.Iranian net censorship powered by US technology
Will Knight, ''
New Scientist ''New Scientist'' is a magazine covering all aspects of science and technology. Based in London, it publishes weekly English-language editions in the United Kingdom, the United States and Australia. An editorially separate organisation publish ...
'', June 27, 2005; accessed September 20, 2008.
Secure Computing Tries to Block Illegal Downloads in Iran
K.C. Jones, ''
InformationWeek ''InformationWeek'' is a digital magazine which conducts corresponding face-to-face events, virtual events, and research. It is headquartered in San Francisco, California and was first published in 1985 by CMP Media, later called Informa. The p ...
'', October 14, 2005; accessed September 20, 2008.
In response to the company,
Jonathan Zittrain Jonathan L. Zittrain (born December 24, 1969) is an American professor of Internet law and the George Bemis Professor of International Law at Harvard Law School. He is also a professor at the Harvard Kennedy School, a professor of computer sc ...
, co-director of Harvard Law School's
Berkman Center for Internet and Society The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace. Founded at Harvard Law School, the center traditionally focused on internet-related legal issues. On May 15, 2008, ...
, stated, " e fact remains that the software has been in use for an extended period of time there. And we've seen Secure Computing software turn up in more than just Iran. We've seen it in Saudi Arabia as well." In 2001 ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid d ...
'' reported that Secure Computing was one of ten companies competing for the Saudi government's contract for software to block its citizens' access to websites it deemed offensive.Companies Compete to Provide Internet Veil for the Saudis
Jennifer 8. Lee, November 19, 2001; accessed September 20, 2008.
The company already had a deal with the Saudis that was due to expire in 2003. In its defense, Secure Computing has always stated that it cannot control how customers use a product once it has been sold. According to the OpenNet Initiative's 2007 report, the Saudi government's censorship "most extensively covers religious and social content, though sites relating to opposition groups and regional political and human rights issues are also targeted."Saudi Arabia country profile
OpenNet Initiative, May 10, 2007; accessed September 20, 2008.
The governments of the United Arab Emirates, Oman, Sudan, and Tunisia also actively use SmartFilter. The Tunisian government goes so far as to redirect blocked pages to a fake Error 404 page, to hide the fact that blocking software is being used.Deibert, Ronald. "Access Denied: The Practice and Policy of Global Internet Filtering." The President and Fellows of Harvard College, 2008, p. 15. The Tunisian Government is generally recognized as having a poor record when it comes to the right of free expression.


See also

*
Forcepoint Forcepoint, an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions. Forcepoint ...


References

{{reflist


External links


Secure Computing Corporation web site
*
Cost Profile of a Highly Assured, Secure Operating System
', an overview of the LOCK system. Computer security software companies Companies based in San Jose, California Defunct companies of the United States