HOME

TheInfoList



OR:

Secure Computing Corporation (SCC) was a
public company A public company is a company whose ownership is organized via shares of share capital, stock which are intended to be freely traded on a stock exchange or in over-the-counter (finance), over-the-counter markets. A public (publicly traded) co ...
that developed and sold
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
appliances and hosted services to protect users and data.
McAfee McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
acquired the company in 2008. The company also developed filtering systems used by governments such as
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
and
Saudi Arabia Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in West Asia. Located in the centre of the Middle East, it covers the bulk of the Arabian Peninsula and has a land area of about , making it the List of Asian countries ...
that blocks their citizens from accessing information on the Internet.Snuffing out Net's benefit to democracy
Jim Landers, ''
Dallas Morning News ''The Dallas Morning News'' is a daily newspaper serving the Dallas–Fort Worth area of Texas, with an average print circulation in 2022 of 65,369. It was founded on October 1, 1885, by Alfred Horatio Belo as a satellite publication of the ' ...
'', December 20, 2005; accessed September 20, 2008.
Iran targets dissent on the net
Clark Boyd, '' BBC.com'', June 24, 2005; accessed September 20, 2008.


Company history

In 1984, a research group called the Secure Computing Technology Center (SCTC) was formed at
Honeywell Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building automation, industrial automa ...
in
Minneapolis, Minnesota Minneapolis is a city in Hennepin County, Minnesota, United States, and its county seat. With a population of 429,954 as of the 2020 United States census, 2020 census, it is the state's List of cities in Minnesota, most populous city. Locat ...
. The centerpiece of SCTC was its work on security-evaluated operating systems for the NSA. This work included the Secure Ada Target (SAT) and the Logical Coprocessing Kernel (LOCK), both designed to meet the stringent A1 level of the Trusted Computer Systems Evaluation Criteria (TCSEC). Over the next several years, Secure Computing morphed from a small
defense contractor A defense contractor is a business organization or individual that provides products or services to a military or intelligence department of a government. Products typically include military or civilian aircraft, ships, vehicles, weaponry, and ...
into a commercial product vendor, largely because the investment community was much less interested in purchasing security goods from defense contractors than from commercial product vendors, especially vendors in the growing
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
space. Secure Computing became a publicly traded company in 1995. Following the pattern of other Internet-related startups, the stock price tripled its first day: it opened at $16 a share and closed at $48. The price peaked around $64 in the next several weeks and then collapsed over the following year or so. It ranged between roughly $3 and $20 afterward until the company was purchased by McAfee. The company headquarters were moved to
San Jose, California San Jose, officially the City of San José ( ; ), is a cultural, commercial, and political center within Silicon Valley and the San Francisco Bay Area. With a city population of 997,368 and a metropolitan area population of 1.95 million, it is ...
, in 1998, though the bulk of the workforce remained in the Twin Cities. The Roseville employees completed a move to
St. Paul, Minnesota Saint Paul (often abbreviated St. Paul) is the capital city of the U.S. state of Minnesota and the county seat of Ramsey County. As of the 2020 census, the city had a population of 311,527, making it Minnesota's second-most populous city a ...
, in February 2006. Several other sites now exist, largely the result of mergers.


Mergers and acquisitions

Secure Computing consisted of several merged units, one of the oldest being Enigma Logic, Inc., which was started around 1982. Bob Bosen, the founder, claims to have created the first
security token A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked door ...
to provide
challenge–response authentication In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authentication, authenticated. The simplest exa ...
. Bosen published a computer game for the
TRS-80 The TRS-80 Micro Computer System (TRS-80, later renamed the Model I to distinguish it from successors) is a desktop microcomputer developed by American company Tandy Corporation and sold through their Radio Shack stores. Launched in 1977, it is ...
home computer Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a s ...
in 1979, called ''80 Space Raiders'', that used a simple challenge–response mechanism for copy protection. People who used the mechanism encouraged him to repackage it for remote authentication. Bosen started Enigma Logic to do so, and filed for patents in 1982–83; a patent was issued in the United Kingdom in 1986. Ultimately, the "challenge" portion of the challenge–response was eliminated to produce a one-time password token similar to the SecurID product. Enigma Logic merged with Secure Computing Corporation in 1996. Secure Computing acquired the SmartFilter product line by purchasing Webster Network Strategies, the producer of the WebTrack product, in 1996. The acquisition included the domain name webster.com, which was eventually sold to the publishers of ''
Webster's Dictionary ''Webster's Dictionary'' is any of the US English language dictionaries edited in the early 19th century by Noah Webster (1758–1843), a US lexicographer, as well as numerous related or unrelated dictionaries that have adopted the Webster's n ...
''. Shortly after acquiring the Webster/SmartFilter product, Secure Computing merged with Border Network Technologies, a Canadian company selling the Borderware firewall. Border Network Technologies boasted an excellent product and a highly developed set of sales channels; some said that the sales channels were a major inducement for the merger. Although the plan was to completely merge the Borderware product with Sidewinder, and to offer a single product to existing users of both products, this never quite succeeded. In 1998, the Borderware business unit was sold to a new company, Borderware Technologies Inc., formed by one of the original Borderware founders. By this time, the mergers had yielded a highly distributed company with offices in
Minnesota Minnesota ( ) is a U.S. state, state in the Upper Midwestern region of the United States. It is bordered by the Canadian provinces of Manitoba and Ontario to the north and east and by the U.S. states of Wisconsin to the east, Iowa to the so ...
,
Florida Florida ( ; ) is a U.S. state, state in the Southeastern United States, Southeastern region of the United States. It borders the Gulf of Mexico to the west, Alabama to the northwest, Georgia (U.S. state), Georgia to the north, the Atlantic ...
,
California California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
, and two or three in
Ontario Ontario is the southernmost Provinces and territories of Canada, province of Canada. Located in Central Canada, Ontario is the Population of Canada by province and territory, country's most populous province. As of the 2021 Canadian census, it ...
. This proved unwieldy, and the company scaled back to offices in Minnesota and California. In 2002, the company took over the Gauntlet Firewall product from Network Associates. In 2003, Secure Computing acquired N2H2, the makers of the Bess web filtering package. There has been some consolidation of Bess and SmartFilter, and Bess is now referred to as "Smartfilter, Bess edition" in company literature. An acquisition of CyberGuard was announced in August 2005 and approved in January 2006. (A year earlier, CyberGuard had attempted to acquire Secure Computing, but the proposal had been rejected). This was the largest merger by Secure Computing at the time and resulted in the addition of several product lines, including three classes of firewalls, content and protocol filtering systems, and an enterprise-wide management system for controlling all of those products. Several offices were also added, including CyberGuard's main facility in Deerfield Beach, Florida, as well as the Webwasher development office in Paderborn, Germany, and a SnapGear development office in Brisbane, Australia. In 2006, the company merged with Atlanta-based CipherTrust, a developer of email security solutions. The merger was announced in July 2006 and completed in August 2006. On July 30, 2008, Secure Computing announced its intention to sell the SafeWord authentication product line to Aladdin Knowledge Systems, leaving the company with a business focused on web/mail security and firewalls. The sale was concluded later that year. On September 22, 2008, McAfee announced its intention to acquire Secure Computing. The acquisition was completed not long afterwards, and the combined company formed the world's largest dedicated security company at the time.


Products


TrustedSource reputation system

TrustedSource, a reputation system that Secure Computing obtained as part of the CipherTrust acquisition, was a key technology for the company, enabling all product lines with global intelligence capability based on behavioral analysis of traffic patterns from all of company's email, web and firewall devices and hosted services, as well as those of numerous OEM partners. TrustedSource derived real-time reputation scores of IPs, URLs, domains, and mail/web content based on a variety of data mining/analysis techniques, such as
Support Vector Machine In machine learning, support vector machines (SVMs, also support vector networks) are supervised max-margin models with associated learning algorithms that analyze data for classification and regression analysis. Developed at AT&T Bell Laborato ...
,
Random forest Random forests or random decision forests is an ensemble learning method for statistical classification, classification, regression analysis, regression and other tasks that works by creating a multitude of decision tree learning, decision trees ...
, and Term-Frequency Inverse-Document Frequency ( TFIDF) classifiers.


Web security

The company's flagship web security product line was the Secure Web appliance (formerly known as Webwasher). It provided Anti-Malware protection, TrustedSource reputation-enabled URL filtering controls, content caching, and SSL scanning capabilities. In June 2008, Secure Computing launched Secure Web Protection Service, an in-the-cloud hosted web security service that provided a similar set of features to the Secure Web appliance, without requiring any on-premises equipment or software.


Mail security

The company's flagship email security product line was the Secure Mail appliance (formerly known as IronMail). It provided TrustedSource reputation-enabled anti-spam, data-leakage protection (DLP), encryption and anti-malware capabilities.


Secure firewalls

The company's flagship firewall product, formerly known as Sidewinder, was renamed McAfee Firewall Enterprise; McAfee sold Sidewinder to Forcepoint in January 2016. Over the years, Secure Computing (and its antecedent organizations) has offered the following major lines of firewall products: * Firewall Enterprise (Sidewinder) – historically based on SecureOS, the company's derivative of BSDi (previously BSD/OS), but later based on
FreeBSD FreeBSD is a free-software Unix-like operating system descended from the Berkeley Software Distribution (BSD). The first version was released in 1993 developed from 386BSD, one of the first fully functional and free Unix clones on affordable ...
. * Secure Firewall Reporter * Secure Firewall CommandCenter * CyberGuard ** Secure SnapGear – embedded system based on μClinux ** Classic – built on UnixWare ** TSP (Total Stream Protection) – built on
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
* Borderware – sold off, as noted previously * SecureZone – discontinued * Firewall for NT – discontinued * Gauntlet – built on Solaris, nearly phased out The Sidewinder firewall incorporated technical features of the high-assurance LOCK system, including Type enforcement, a technology later applied in SELinux. However, interaction between Secure Computing and the
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
community was spotty due to the company's ownership of
patent A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an sufficiency of disclosure, enabling discl ...
s related to Type enforcement. The Sidewinder never really tried to achieve an A1 TCSEC rating, but it did earn an EAL-4+
Common Criteria The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (International Organization for Standardization, ISO/International Electrotechnical Commission, IEC 15408) for co ...
rating. Along with Sidewinder, Gauntlet had been one of the earliest
application layer An application layer is an abstraction layer that specifies the shared communication protocols and interface methods used by hosts in a communications network. An ''application layer'' abstraction is specified in both the Internet Protocol Su ...
firewalls; both had developed a large customer base in the
United States Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
. Gauntlet was originally developed by Trusted Information Systems (TIS) as a commercial version of the ''TIS Firewall Toolkit'', an early open source firewall package developed under a
DARPA The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
contract.


Use of company products for governmental censorship

The OpenNet Initiative studied filtering software used by governments to block access by their citizens and found Secure Computing's SmartFilter program heavily used by both the Iranian and Saudi governments. According to Secure Computing, any use of its software in Iran is without its consent— U.S. sanctions prohibit American companies from any dealings with Iran—and in 2005 the company said it is actively working to stop its illegal use.Iranian net censorship powered by US technology
Will Knight, ''
New Scientist ''New Scientist'' is a popular science magazine covering all aspects of science and technology. Based in London, it publishes weekly English-language editions in the United Kingdom, the United States and Australia. An editorially separate organ ...
'', June 27, 2005; accessed September 20, 2008.
Secure Computing Tries to Block Illegal Downloads in Iran
K.C. Jones, ''
InformationWeek ''InformationWeek'' is a digital magazine which conducts corresponding face-to-face events, virtual events, and research. It is headquartered in San Francisco, California California () is a U.S. state, state in the Western United State ...
'', October 14, 2005; accessed September 20, 2008.
In response to the company,
Jonathan Zittrain Jonathan L. Zittrain (born December 24, 1969) is an American professor of cyber law, Internet law and the George Bemis Professor of International Law at Harvard Law School. He is also a professor at the Harvard Kennedy School, a professor of co ...
, co-director of
Harvard Law School Harvard Law School (HLS) is the law school of Harvard University, a Private university, private research university in Cambridge, Massachusetts. Founded in 1817, Harvard Law School is the oldest law school in continuous operation in the United ...
's Berkman Center for Internet and Society, stated, " e fact remains that the software has been in use for an extended period of time there. And we've seen Secure Computing software turn up in more than just Iran. We've seen it in Saudi Arabia as well." In 2001 ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' reported that Secure Computing was one of ten companies competing for the Saudi government's contract for software to block its citizens' access to websites it deemed offensive.Companies Compete to Provide Internet Veil for the Saudis
Jennifer 8. Lee, November 19, 2001; accessed September 20, 2008.
The company already had a deal with the Saudis that was due to expire in 2003. In its defense, Secure Computing has always stated that it cannot control how customers use a product once it has been sold. According to the OpenNet Initiative's 2007 report, the Saudi government's censorship "most extensively covers religious and social content, though sites relating to opposition groups and regional political and human rights issues are also targeted."Saudi Arabia country profile
OpenNet Initiative, May 10, 2007; accessed September 20, 2008.
The governments of the United Arab Emirates, Oman, Sudan, and Tunisia also actively use SmartFilter. The Tunisian government goes so far as to redirect blocked pages to a fake Error 404 page, to hide the fact that blocking software is being used.Deibert, Ronald. "Access Denied: The Practice and Policy of Global Internet Filtering." The President and Fellows of Harvard College, 2008, p. 15. The Tunisian Government is generally recognized as having a poor record when it comes to the right of free expression.


See also

* Forcepoint


References


External links


Secure Computing Corporation web site
{{Webarchive, url=https://web.archive.org/web/20170927190711/http://securecomputing.com/ , date=2017-09-27 *
Cost Profile of a Highly Assured, Secure Operating System
', an overview of the LOCK system. Computer security software companies Companies based in San Jose, California Defunct software companies of the United States Defunct computer companies of the United States Defunct computer hardware companies