HOME

TheInfoList



OR:

Secure Computing Corporation (SCC) was a public company that developed and sold computer security appliances and hosted services to protect users and data. McAfee acquired the company in 2008. The company also developed filtering systems used by governments such as Iran and Saudi Arabia that blocks their citizens from accessing information on the Internet.Snuffing out Net's benefit to democracy
Jim Landers, ''
Dallas Morning News ''The Dallas Morning News'' is a daily newspaper serving the Dallas–Fort Worth area of Texas, with an average print circulation of 65,369. It was founded on October 1, 1885 by Alfred Horatio Belo as a satellite publication of the ''Galvesto ...
'', December 20, 2005; accessed September 20, 2008.
Iran targets dissent on the net
Clark Boyd, ''
BBC.com BBC Online, formerly known as BBCi, is the BBC's online service. It is a large network of websites including such high-profile sites as BBC News and Sport, the on-demand video and radio services branded BBC iPlayer and BBC Sounds, the childr ...
'', June 24, 2005; accessed September 20, 2008.


Company history

In 1984, a research group called the Secure Computing Technology Center (SCTC) was formed at Honeywell in
Minneapolis, Minnesota Minneapolis () is the largest city in Minnesota, United States, and the county seat of Hennepin County. The city is abundant in water, with thirteen lakes, wetlands, the Mississippi River, creeks and waterfalls. Minneapolis has its origins ...
. The centerpiece of SCTC was its work on
security-evaluated operating system In computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are Common Criteria (CC) and FIPS 140-2. Oracle Solaris Trusted Solaris 8 was a securi ...
s for the NSA. This work included the Secure Ada Target (SAT) and the
Logical Coprocessing Kernel Logic is the study of correct reasoning. It includes both formal and informal logic. Formal logic is the science of deductively valid inferences or of logical truths. It is a formal science investigating how conclusions follow from premise ...
(LOCK), both designed to meet the stringent A1 level of the Trusted Computer Systems Evaluation Criteria (TCSEC). Over the next several years, Secure Computing morphed from a small defense contractor into a commercial product vendor, largely because the investment community was much less interested in purchasing security goods from defense contractors than from commercial product vendors, especially vendors in the growing Internet space. Secure Computing became a publicly traded company in 1995. Following the pattern of other Internet-related startups, the stock price tripled its first day: it opened at $16 a share and closed at $48. The price peaked around $64 in the next several weeks and then collapsed over the following year or so. It ranged between roughly $3 and $20 afterward until the company was purchased by McAfee. The company headquarters were moved to San Jose, California, in 1998, though the bulk of the workforce remained in the Twin Cities. The Roseville employees completed a move to
St. Paul, Minnesota Saint Paul (abbreviated St. Paul) is the capital of the U.S. state of Minnesota and the county seat of Ramsey County. Situated on high bluffs overlooking a bend in the Mississippi River, Saint Paul is a regional business hub and the center o ...
, in February 2006. Several other sites now exist, largely the result of mergers.


Mergers and acquisitions

Secure Computing consisted of several merged units, one of the oldest being Enigma Logic, Inc., which was started around 1982. Bob Bosen, the founder, claims to have created the first security token to provide challenge–response authentication. Bosen published a
computer game Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, game controller, controller, computer keyboard, keyboard, or motion sensing device to gener ...
for the TRS-80 home computer in 1979, called ''80 Space Raiders'', that used a simple challenge–response mechanism for copy protection. People who used the mechanism encouraged him to repackage it for remote authentication. Bosen started Enigma Logic to do so, and filed for patents in 1982–83; a patent was issued in the United Kingdom in 1986. Ultimately, the "challenge" portion of the challenge–response was eliminated to produce a one-time password token similar to the
SecurID RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA for performing two-factor authentication for a user to a network resource. Description The RSA SecurID authentication mechanism consists of a " token"—either ...
product. Enigma Logic merged with Secure Computing Corporation in 1996. Secure Computing acquired the SmartFilter product line by purchasing Webster Network Strategies, the producer of the WebTrack product, in 1996. The acquisition included the domain name webster.com, which was eventually sold to the publishers of '' Webster's Dictionary''. Shortly after acquiring the Webster/SmartFilter product, Secure Computing merged with Border Network Technologies, a Canadian company selling the
Borderware Secure Computing Corporation (SCC) was a public company that developed and sold computer security appliances and hosted services to protect users and data. McAfee acquired the company in 2008. The company also developed filtering systems used ...
firewall. Border Network Technologies boasted an excellent product and a highly developed set of sales channels; some said that the sales channels were a major inducement for the merger. Although the plan was to completely merge the Borderware product with Sidewinder, and to offer a single product to existing users of both products, this never quite succeeded. In 1998, the Borderware business unit was sold to a new company, Borderware Technologies Inc., formed by one of the original Borderware founders. By this time, the mergers had yielded a highly distributed company with offices in Minnesota, Florida, California, and two or three in Ontario. This proved unwieldy, and the company scaled back to offices in Minnesota and California. In 2002, the company took over the Gauntlet Firewall product from Network Associates. In 2003, Secure Computing acquired N2H2, the makers of the Bess web filtering package. There has been some consolidation of Bess and SmartFilter, and Bess is now referred to as "Smartfilter, Bess edition" in company literature. An acquisition of CyberGuard was announced in August 2005 and approved in January 2006. (A year earlier, CyberGuard had attempted to acquire Secure Computing, but the proposal had been rejected). This was the largest merger by Secure Computing at the time and resulted in the addition of several product lines, including three classes of firewalls, content and protocol filtering systems, and an enterprise-wide management system for controlling all of those products. Several offices were also added, including CyberGuard's main facility in Deerfield Beach, Florida, as well as the Webwasher development office in
Paderborn, Germany Paderborn (; Westphalian: ''Patterbuorn'', also ''Paterboärn'') is a city in eastern North Rhine-Westphalia, Germany, capital of the Paderborn district. The name of the city derives from the river Pader and ''Born'', an old German term for t ...
, and a SnapGear development office in Brisbane, Australia. In 2006, the company merged with Atlanta-based
CipherTrust CipherTrust was an anti-spam email software company based in Alpharetta, GA (a suburb of Atlanta), although they had offices around the world. The company was co-founded by Jay Chaudhry and Lawrence Hughes (both formerly with SecureIT). Chaudhry w ...
, a developer of email security solutions. The merger was announced in July 2006 and completed in August 2006. On July 30, 2008, Secure Computing announced its intention to sell the SafeWord authentication product line to Aladdin Knowledge Systems, leaving the company with a business focused on web/mail security and firewalls. The sale was concluded later that year. On September 22, 2008, McAfee announced its intention to acquire Secure Computing. The acquisition was completed not long afterwards, and the combined company formed the world's largest dedicated security company at the time.


Products


TrustedSource reputation system

TrustedSource, a reputation system that Secure Computing obtained as part of the
CipherTrust CipherTrust was an anti-spam email software company based in Alpharetta, GA (a suburb of Atlanta), although they had offices around the world. The company was co-founded by Jay Chaudhry and Lawrence Hughes (both formerly with SecureIT). Chaudhry w ...
acquisition, was a key technology for the company, enabling all product lines with global intelligence capability based on behavioral analysis of traffic patterns from all of company's email, web and firewall devices and hosted services, as well as those of numerous OEM partners. TrustedSource derived real-time reputation scores of IPs, URLs, domains, and mail/web content based on a variety of data mining/analysis techniques, such as
Support Vector Machine In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data for classification and regression analysis. Developed at AT&T Bell Laboratorie ...
,
Random forest Random forests or random decision forests is an ensemble learning method for classification, regression and other tasks that operates by constructing a multitude of decision trees at training time. For classification tasks, the output of th ...
, and Term-Frequency Inverse-Document Frequency ( TFIDF) classifiers.


Web security

The company's flagship web security product line was the
Secure Web Secure may refer to: * Security, being protected against danger or loss(es) ** Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources ** Information security, defending informatio ...
appliance (formerly known as Webwasher). It provided Anti-Malware protection, TrustedSource reputation-enabled URL filtering controls, content caching, and SSL scanning capabilities. In June 2008, Secure Computing launched
Secure Web Protection Service Secure may refer to: * Security, being protected against danger or loss(es) ** Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources ** Information security, defending informatio ...
, an in-the-cloud hosted web security service that provided a similar set of features to the
Secure Web Secure may refer to: * Security, being protected against danger or loss(es) ** Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources ** Information security, defending informatio ...
appliance, without requiring any on-premises equipment or software.


Mail security

The company's flagship email security product line was the
Secure Mail Secure may refer to: * Security, being protected against danger or loss(es) **Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources **Information security, defending information ...
appliance (formerly known as IronMail). It provided TrustedSource reputation-enabled anti-spam, data-leakage protection (DLP), encryption and anti-malware capabilities.


Secure firewalls

The company's flagship firewall product, formerly known as Sidewinder, was renamed McAfee Firewall Enterprise; McAfee sold Sidewinder to Forcepoint in January 2016. Over the years, Secure Computing (and its antecedent organizations) has offered the following major lines of firewall products: * Firewall Enterprise (Sidewinder) – historically based on SecureOS, the company's derivative of
BSDi Berkeley Software Design, Inc. (BSDI or, later, BSDi), was a corporation which developed, sold licenses for, and supported BSD/OS (originally known as BSD/386), a commercial and partially proprietary variant of the BSD Unix operating system for ...
(previously BSD/OS), but later based on
FreeBSD FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD), which was based on Research Unix. The first version of FreeBSD was released in 1993. In 2005, FreeBSD was the most popular ...
. * Secure Firewall Reporter * Secure Firewall CommandCenter * CyberGuard ** Secure SnapGear – embedded system based on μClinux ** Classic – built on UnixWare ** TSP (Total Stream Protection) – built on Linux * Borderware – sold off, as noted previously * SecureZone – discontinued * Firewall for NT – discontinued * Gauntlet – built on
Solaris Solaris may refer to: Arts and entertainment Literature, television and film * ''Solaris'' (novel), a 1961 science fiction novel by Stanisław Lem ** ''Solaris'' (1968 film), directed by Boris Nirenburg ** ''Solaris'' (1972 film), directed by ...
, nearly phased out The Sidewinder firewall incorporated technical features of the high-assurance LOCK system, including Type enforcement, a technology later applied in SELinux. However, interaction between Secure Computing and the
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
community was spotty due to the company's ownership of patents related to Type enforcement. The Sidewinder never really tried to achieve an A1 TCSEC rating, but it did earn an EAL-4+
Common Criteria The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification. It is currently in version 3.1 revision 5. Common Criteria ...
rating. Along with Sidewinder, Gauntlet had been one of the earliest
application layer An application layer is an abstraction layer that specifies the shared communications protocols and Interface (computing), interface methods used by Host (network), hosts in a communications network. An ''application layer'' abstraction is speci ...
firewalls; both had developed a large customer base in the United States Department of Defense. Gauntlet was originally developed by Trusted Information Systems (TIS) as a commercial version of the ''TIS Firewall Toolkit'', an early open source firewall package developed under a DARPA contract.


Use of company products for governmental censorship

The OpenNet Initiative studied filtering software used by governments to block access by their citizens and found Secure Computing's SmartFilter program heavily used by both the Iranian and Saudi governments. According to Secure Computing, any use of its software in Iran is without its consent— U.S. sanctions prohibit American companies from any dealings with Iran—and in 2005 the company said it is actively working to stop its illegal use.Iranian net censorship powered by US technology
Will Knight, '' New Scientist'', June 27, 2005; accessed September 20, 2008.
Secure Computing Tries to Block Illegal Downloads in Iran
K.C. Jones, '' InformationWeek'', October 14, 2005; accessed September 20, 2008.
In response to the company, Jonathan Zittrain, co-director of
Harvard Law School Harvard Law School (Harvard Law or HLS) is the law school of Harvard University, a private research university in Cambridge, Massachusetts. Founded in 1817, it is the oldest continuously operating law school in the United States. Each class ...
's Berkman Center for Internet and Society, stated, " e fact remains that the software has been in use for an extended period of time there. And we've seen Secure Computing software turn up in more than just Iran. We've seen it in Saudi Arabia as well." In 2001 '' The New York Times'' reported that Secure Computing was one of ten companies competing for the Saudi government's contract for software to block its citizens' access to websites it deemed offensive.Companies Compete to Provide Internet Veil for the Saudis
Jennifer 8. Lee Jennifer 8. Lee (Chinese name: ; pinyin: '; POJ: ') (born March 15, 1976) is an American journalist who previously worked for ''The New York Times''. She is also the co-founder and president of the literary studio Plympton, as well as a produce ...
, November 19, 2001; accessed September 20, 2008.
The company already had a deal with the Saudis that was due to expire in 2003. In its defense, Secure Computing has always stated that it cannot control how customers use a product once it has been sold. According to the OpenNet Initiative's 2007 report, the Saudi government's censorship "most extensively covers religious and social content, though sites relating to opposition groups and regional political and human rights issues are also targeted."Saudi Arabia country profile
OpenNet Initiative, May 10, 2007; accessed September 20, 2008.
The governments of the United Arab Emirates, Oman, Sudan, and Tunisia also actively use SmartFilter. The Tunisian government goes so far as to redirect blocked pages to a fake
Error 404 In computer network communications, the HTTP 404, 404 not found, 404, 404 error, page not found or file not found error message is a hypertext transfer protocol (HTTP) standard response code, to indicate that the browser was able to commun ...
page, to hide the fact that blocking software is being used.Deibert, Ronald. "Access Denied: The Practice and Policy of Global Internet Filtering." The President and Fellows of Harvard College, 2008, p. 15. The Tunisian Government is generally recognized as having a poor record when it comes to the right of free expression.


See also

* Forcepoint


References

{{reflist


External links


Secure Computing Corporation web site
*
Cost Profile of a Highly Assured, Secure Operating System
', an overview of the LOCK system. Computer security software companies Companies based in San Jose, California Defunct companies of the United States