Secure Computing Corporation (SCC) was a
public company
A public company is a company whose ownership is organized via shares of share capital, stock which are intended to be freely traded on a stock exchange or in over-the-counter (finance), over-the-counter markets. A public (publicly traded) co ...
that developed and sold
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
appliances and hosted services to protect users and data.
McAfee
McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
acquired the company in 2008.
The company also developed filtering systems used by governments such as
Iran
Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
and
Saudi Arabia
Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in West Asia. Located in the centre of the Middle East, it covers the bulk of the Arabian Peninsula and has a land area of about , making it the List of Asian countries ...
that blocks their citizens from accessing information on the Internet.
[Snuffing out Net's benefit to democracy]
Jim Landers, ''Dallas Morning News
''The Dallas Morning News'' is a daily newspaper serving the Dallas–Fort Worth area of Texas, with an average print circulation in 2022 of 65,369. It was founded on October 1, 1885, by Alfred Horatio Belo as a satellite publication of the ' ...
'', December 20, 2005; accessed September 20, 2008.[Iran targets dissent on the net]
Clark Boyd, '' BBC.com'', June 24, 2005; accessed September 20, 2008.
Company history
In 1984, a research group called the Secure Computing Technology Center (SCTC) was formed at
Honeywell
Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building automation, industrial automa ...
in
Minneapolis, Minnesota
Minneapolis is a city in Hennepin County, Minnesota, United States, and its county seat. With a population of 429,954 as of the 2020 United States census, 2020 census, it is the state's List of cities in Minnesota, most populous city. Locat ...
. The centerpiece of SCTC was its work on
security-evaluated operating systems for the NSA. This work included the
Secure Ada Target (SAT) and the
Logical Coprocessing Kernel (LOCK), both designed to meet the stringent A1 level of the
Trusted Computer Systems Evaluation Criteria (TCSEC).
Over the next several years, Secure Computing morphed from a small
defense contractor
A defense contractor is a business organization or individual that provides products or services to a military or intelligence department of a government. Products typically include military or civilian aircraft, ships, vehicles, weaponry, and ...
into a commercial product vendor, largely because the investment community was much less interested in purchasing security goods from defense contractors than from commercial product vendors, especially vendors in the growing
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
space.
Secure Computing became a publicly traded company in 1995. Following the pattern of other
Internet-related startups, the stock price tripled its first day: it opened at $16 a share and closed at $48. The price peaked around $64 in the next several weeks and then collapsed over the following year or so. It ranged between roughly $3 and $20 afterward until the company was purchased by McAfee.
The company headquarters were moved to
San Jose, California
San Jose, officially the City of San José ( ; ), is a cultural, commercial, and political center within Silicon Valley and the San Francisco Bay Area. With a city population of 997,368 and a metropolitan area population of 1.95 million, it is ...
, in 1998, though the bulk of the workforce remained in the
Twin Cities. The Roseville employees completed a move to
St. Paul, Minnesota
Saint Paul (often abbreviated St. Paul) is the capital city of the U.S. state of Minnesota and the county seat of Ramsey County. As of the 2020 census, the city had a population of 311,527, making it Minnesota's second-most populous city a ...
, in February 2006. Several other sites now exist, largely the result of mergers.
Mergers and acquisitions
Secure Computing consisted of several merged units, one of the oldest being Enigma Logic, Inc., which was started around 1982. Bob Bosen, the founder, claims to have created the first
security token
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked door ...
to provide
challenge–response authentication
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authentication, authenticated.
The simplest exa ...
. Bosen published a
computer game for the
TRS-80
The TRS-80 Micro Computer System (TRS-80, later renamed the Model I to distinguish it from successors) is a desktop microcomputer developed by American company Tandy Corporation and sold through their Radio Shack stores. Launched in 1977, it is ...
home computer
Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a s ...
in 1979, called ''80 Space Raiders'', that used a simple challenge–response mechanism for copy protection. People who used the mechanism encouraged him to repackage it for remote authentication. Bosen started Enigma Logic to do so, and filed for patents in 1982–83; a patent was issued in the United Kingdom in 1986. Ultimately, the "challenge" portion of the challenge–response was eliminated to produce a
one-time password token similar to the
SecurID product. Enigma Logic merged with Secure Computing Corporation in 1996.
Secure Computing acquired the SmartFilter product line by purchasing Webster Network Strategies, the producer of the WebTrack product, in 1996. The acquisition included the domain name webster.com, which was eventually sold to the publishers of ''
Webster's Dictionary
''Webster's Dictionary'' is any of the US English language dictionaries edited in the early 19th century by Noah Webster (1758–1843), a US lexicographer, as well as numerous related or unrelated dictionaries that have adopted the Webster's n ...
''.
Shortly after acquiring the Webster/SmartFilter product, Secure Computing merged with Border Network Technologies, a Canadian company selling the
Borderware firewall. Border Network Technologies boasted an excellent product and a highly developed set of sales channels; some said that the sales channels were a major inducement for the merger. Although the plan was to completely merge the Borderware product with Sidewinder, and to offer a single product to existing users of both products, this never quite succeeded. In 1998, the Borderware business unit was sold to a new company, Borderware Technologies Inc., formed by one of the original Borderware founders.
By this time, the mergers had yielded a highly distributed company with offices in
Minnesota
Minnesota ( ) is a U.S. state, state in the Upper Midwestern region of the United States. It is bordered by the Canadian provinces of Manitoba and Ontario to the north and east and by the U.S. states of Wisconsin to the east, Iowa to the so ...
,
Florida
Florida ( ; ) is a U.S. state, state in the Southeastern United States, Southeastern region of the United States. It borders the Gulf of Mexico to the west, Alabama to the northwest, Georgia (U.S. state), Georgia to the north, the Atlantic ...
,
California
California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
, and two or three in
Ontario
Ontario is the southernmost Provinces and territories of Canada, province of Canada. Located in Central Canada, Ontario is the Population of Canada by province and territory, country's most populous province. As of the 2021 Canadian census, it ...
. This proved unwieldy, and the company scaled back to offices in Minnesota and California.
In 2002, the company took over the Gauntlet Firewall product from
Network Associates.
In 2003, Secure Computing acquired
N2H2, the makers of the
Bess web filtering package. There has been some consolidation of Bess and SmartFilter, and Bess is now referred to as "Smartfilter, Bess edition" in company literature.
An acquisition of
CyberGuard was announced in August 2005 and approved in January 2006. (A year earlier, CyberGuard had attempted to acquire Secure Computing, but the proposal had been rejected). This was the largest merger by Secure Computing at the time and resulted in the addition of several product lines, including three classes of firewalls, content and protocol filtering systems, and an enterprise-wide management system for controlling all of those products. Several offices were also added, including CyberGuard's main facility in
Deerfield Beach, Florida, as well as the Webwasher development office in
Paderborn, Germany, and a SnapGear development office in
Brisbane, Australia.
In 2006, the company merged with Atlanta-based
CipherTrust, a developer of email security solutions. The merger was announced in July 2006 and completed in August 2006.
On July 30, 2008, Secure Computing announced its intention to sell the SafeWord authentication product line to
Aladdin Knowledge Systems, leaving the company with a business focused on web/mail security and firewalls. The sale was concluded later that year.
On September 22, 2008, McAfee announced its intention to acquire Secure Computing. The acquisition was completed not long afterwards, and the combined company formed the world's largest dedicated security company at the time.
Products
TrustedSource reputation system
TrustedSource, a
reputation system that Secure Computing obtained as part of the
CipherTrust acquisition, was a key technology for the company, enabling all product lines with global intelligence capability based on behavioral analysis of traffic patterns from all of company's email, web and firewall devices and hosted services, as well as those of numerous OEM partners. TrustedSource derived real-time reputation scores of IPs, URLs, domains, and mail/web content based on a variety of data mining/analysis techniques, such as
Support Vector Machine
In machine learning, support vector machines (SVMs, also support vector networks) are supervised max-margin models with associated learning algorithms that analyze data for classification and regression analysis. Developed at AT&T Bell Laborato ...
,
Random forest
Random forests or random decision forests is an ensemble learning method for statistical classification, classification, regression analysis, regression and other tasks that works by creating a multitude of decision tree learning, decision trees ...
, and Term-Frequency Inverse-Document Frequency (
TFIDF) classifiers.
Web security
The company's flagship web security product line was the
Secure Web appliance (formerly known as Webwasher). It provided Anti-Malware protection, TrustedSource reputation-enabled URL filtering controls, content caching, and SSL scanning capabilities.
In June 2008, Secure Computing launched
Secure Web Protection Service, an in-the-cloud hosted web security service that provided a similar set of features to the
Secure Web appliance, without requiring any on-premises equipment or software.
Mail security
The company's flagship email security product line was the
Secure Mail appliance (formerly known as IronMail). It provided TrustedSource reputation-enabled anti-spam, data-leakage protection (DLP), encryption and anti-malware capabilities.
Secure firewalls
The company's flagship firewall product, formerly known as Sidewinder, was renamed McAfee Firewall Enterprise; McAfee sold Sidewinder to Forcepoint in January 2016. Over the years, Secure Computing (and its antecedent organizations) has offered the following major lines of firewall products:
* Firewall Enterprise (Sidewinder) – historically based on SecureOS, the company's derivative of
BSDi (previously
BSD/OS), but later based on
FreeBSD
FreeBSD is a free-software Unix-like operating system descended from the Berkeley Software Distribution (BSD). The first version was released in 1993 developed from 386BSD, one of the first fully functional and free Unix clones on affordable ...
.
* Secure Firewall Reporter
* Secure Firewall CommandCenter
* CyberGuard
** Secure SnapGear – embedded system based on
μClinux
** Classic – built on
UnixWare
** TSP (Total Stream Protection) – built on
Linux
Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
* Borderware – sold off, as noted previously
* SecureZone – discontinued
* Firewall for
NT – discontinued
* Gauntlet – built on
Solaris, nearly phased out
The Sidewinder firewall incorporated technical features of the high-assurance LOCK system, including
Type enforcement, a technology later applied in
SELinux. However, interaction between Secure Computing and the
open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
community was spotty due to the company's ownership of
patent
A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an sufficiency of disclosure, enabling discl ...
s related to Type enforcement. The Sidewinder never really tried to achieve an A1
TCSEC rating, but it did earn an EAL-4+
Common Criteria
The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (International Organization for Standardization, ISO/International Electrotechnical Commission, IEC 15408) for co ...
rating.
Along with Sidewinder, Gauntlet had been one of the earliest
application layer
An application layer is an abstraction layer that specifies the shared communication protocols and interface methods used by hosts in a communications network. An ''application layer'' abstraction is specified in both the Internet Protocol Su ...
firewalls; both had developed a large customer base in the
United States Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
. Gauntlet was originally developed by
Trusted Information Systems (TIS) as a commercial version of the ''TIS Firewall Toolkit'', an early open source firewall package developed under a
DARPA
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military. Originally known as the Adva ...
contract.
Use of company products for governmental censorship
The
OpenNet Initiative studied filtering software used by governments to block access by their citizens and found Secure Computing's SmartFilter program heavily used by both the Iranian and Saudi governments.
[ According to Secure Computing, any use of its software in Iran is without its consent— U.S. sanctions prohibit American companies from any dealings with Iran—and in 2005 the company said it is actively working to stop its illegal use.][Iranian net censorship powered by US technology]
Will Knight, ''New Scientist
''New Scientist'' is a popular science magazine covering all aspects of science and technology. Based in London, it publishes weekly English-language editions in the United Kingdom, the United States and Australia. An editorially separate organ ...
'', June 27, 2005; accessed September 20, 2008.[Secure Computing Tries to Block Illegal Downloads in Iran]
K.C. Jones, ''InformationWeek
''InformationWeek'' is a digital magazine which conducts corresponding face-to-face events, virtual events, and research. It is headquartered in San Francisco, California
California () is a U.S. state, state in the Western United State ...
'', October 14, 2005; accessed September 20, 2008.
In response to the company, Jonathan Zittrain
Jonathan L. Zittrain (born December 24, 1969) is an American professor of cyber law, Internet law and the George Bemis Professor of International Law at Harvard Law School. He is also a professor at the Harvard Kennedy School, a professor of co ...
, co-director of Harvard Law School
Harvard Law School (HLS) is the law school of Harvard University, a Private university, private research university in Cambridge, Massachusetts. Founded in 1817, Harvard Law School is the oldest law school in continuous operation in the United ...
's Berkman Center for Internet and Society, stated, " e fact remains that the software has been in use for an extended period of time there. And we've seen Secure Computing software turn up in more than just Iran. We've seen it in Saudi Arabia as well."[
In 2001 '']The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' reported that Secure Computing was one of ten companies competing for the Saudi government's contract for software to block its citizens' access to websites it deemed offensive.[Companies Compete to Provide Internet Veil for the Saudis]
Jennifer 8. Lee, November 19, 2001; accessed September 20, 2008. The company already had a deal with the Saudis that was due to expire in 2003. In its defense, Secure Computing has always stated that it cannot control how customers use a product once it has been sold.[ According to the OpenNet Initiative's 2007 report, the Saudi government's censorship "most extensively covers religious and social content, though sites relating to opposition groups and regional political and human rights issues are also targeted."][Saudi Arabia country profile]
OpenNet Initiative, May 10, 2007; accessed September 20, 2008.
The governments of the United Arab Emirates, Oman, Sudan, and Tunisia also actively use SmartFilter. The Tunisian government goes so far as to redirect blocked pages to a fake Error 404 page, to hide the fact that blocking software is being used.[Deibert, Ronald. "Access Denied: The Practice and Policy of Global Internet Filtering." The President and Fellows of Harvard College, 2008, p. 15.] The Tunisian Government is generally recognized as having a poor record when it comes to the right of free expression.
See also
* Forcepoint
References
External links
Secure Computing Corporation web site
{{Webarchive, url=https://web.archive.org/web/20170927190711/http://securecomputing.com/ , date=2017-09-27
*
Cost Profile of a Highly Assured, Secure Operating System
', an overview of the LOCK system.
Computer security software companies
Companies based in San Jose, California
Defunct software companies of the United States
Defunct computer companies of the United States
Defunct computer hardware companies