Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Security Infrastructure

Internet Identity Launches BGP Security Solution

Tacoma, Washington based IID (Internet Identity), a provider of technology and services that help organizations secure Internet presence, today announced the availability of a new border gateway protocol (BGP) security solution for the extended enterprise designed to detect, diagnose and mitigate BGP security threats.

Tacoma, Washington based IID (Internet Identity), a provider of technology and services that help organizations secure Internet presence, today announced the availability of a new border gateway protocol (BGP) security solution for the extended enterprise designed to detect, diagnose and mitigate BGP security threats. Announced at the RSA Conference in San Francisco, “IID ActiveTrust BGP” is designed to help secure everything from Internet transactions and messages to corporate and consumer data for both an organization and its vast web of partners (the extended enterprise).

Border Gateway Protocol (BGP) is the protocol that supports routing decisions made to pass data across the Internet. As the core routing system for the Internet, it finds the most efficient route for Internet data to be transmitted around the world, deciding which “links” carry Internet data. BGP is most commonly used within and between Internet Service Providers (ISPs). If the domain name system (DNS) is the Internet’s address book, then BGP is its navigation system providing turn-by-turn directions for all Internet connections.

By hijacking these BGP translations, attackers can drive unsuspecting surfers and corporate users to malicious sites, making large parts of the ‘Net largely useless or insecure. They can also intercept corporate e-mail, financial transactions, and other highly sensitive data and personal information. The financial and security implications associated with such acts can be tremendous. “The possibility of BGP hijackings are nothing new, but what is new is that we’ve entered an age of sophisticated cybercrime and potentially even cyber ‘warfare’ where the stakes are higher than ever to protect sensitive data,” said Rodney Joffe, Senior Vice President and Senior Technologist at Neustar, Inc. “It is good to see such services like ActiveTrust BGP protecting blind spots that were created long ago in the Internet’s infrastructure that we’re seeing exploited now.”

The recent BGP incident where 15 percent of the world’s Internet traffic routes were advertised by a Chinese state-controlled telecommunications company shows how vulnerable organizations are to BGP exploits. In that case, China Telecom advertised erroneous BGP routes that funneled traffic for websites, email and other transactions of the U.S. Senate, Department of Defense, NASA and Department of Commerce through Chinese networks before it reached its intended destination.

ActiveTrust BGP proactively identifies, alerts for and mitigates malicious or accidental routing issues such as the incident in China, helping secure web, data and messaging transactions. Not a mere monitoring solution, ActiveTrust BGP provides action in three critical ways:

Detect – Numerous automated systems constantly probe the BGP infrastructure for any malicious or accidental configuration issues affecting an organization and its extended enterprise like business partners, ISPs and more. The IID team instantly alerts an organization when it identifies a suspicious change within its extended enterprise’s BGP routing infrastructure.

Diagnose – IID’s 24/7 expert team layers human intelligence and insight onto an automated system, determining the likely importance and impact of a given BGP change. The team immediately communicates critical issues to designated stakeholders within the customer organization.

Mitigate – Through IID’s relationships with key Internet infrastructure providers, law enforcement authorities, security partners and more, it brings all parties together including extended enterprise partners, ISPs, domain registrars, software vendors, etc. to resolve the issue in a timely fashion.

Advertisement. Scroll to continue reading.

“Unless the core routing principals for the Internet changes, there will be no magic potion to stop BGP hijacking,” said IID President and CTO Rod Rasmussen. “Until then, the only way to limit damage from such attacks is to detect, diagnose and mitigate them as soon as possible – and ActiveTrust BGP does just that.”

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Management & Strategy

Hundreds of companies are showcasing their products and services this week at the 2023 edition of the RSA Conference in San Francisco.

Security Infrastructure

Security vendor consolidation is picking up steam with good reason. Everyone wants to improve security efficiency and effectiveness while paying for less.

Cloud Security

The term ‘zero trust’ is now used so much and so widely that it has almost lost its meaning.

Security Infrastructure

Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a...

Funding/M&A

Responding to Cyber Threats Against Critical Infrastructures: Wired Business Media Acquires Long Running ICS Cybersecurity Conference Series

Security Infrastructure

Comcast jumps into the enterprise cybersecurity business, betting that its internal security tools and inventions can find traction in an expanding marketplace.

Audits

The PCI Security Standards Council (SSC), the organization that oversees the Payment Card Industry Data Security Standard (PCI DSS), this week announced the release...