News

Blog

Viewing posts from the Blog category

OmnitechIT – Trendmicro Event

EVENTO OmnitechIT – Trendmicro
Fregene (Roma) 10 settembre 2015 – “Stabilimento La Vela” – Lungomare di Levante
OmnitechIT sta organizzando in collaborazione con Trendmicro un evento per evidenziare come la sicurezza nelle aziende e la gestione sicura delle informazioni è fondamentale considerando le minacce del moderno Cyber crime.
Per qualsiasi ulteriore informazione potete contattare Loretta Mazzoni – Marketing and Communication Coordinator al seguente indirizzo email: Loretta.mazzoni@omnitechit.eu

OmnitechIT – Trendmicro Event
Fregene (Rome) 10 September 2015 – “La Vela” – Lungomare di Levante
OmnitechIT is organizing in collaboration with Trendmicro an event to highlight how business security and safety information management is critical considering the modern cyber crime threats.
For more information and details please contact Loretta Mazzoni, Marketing & Communication Coordinator at: Loretta.mazzoni@omnitechit.eu

OmnitechIt and Okan University close an agreement for a training course post graduate

Istanbul 2015-07-09

OmnitechIT & Okan Üniversitesi arasında başta eğitim, Co-op programı olmak üzere iş birliği protokolü imzalandı. Okan Kariyer Merkezi’inde gerçekleşen toplantıya firmanın Ceo’su Roberto MIGNEMI,Teklif ve Çözüm Direktörü Elio Di SANDRO, Yönetici Ortak Dr. Cem Bülent ÜNAL ve Kariyer Merkezi Müdürü Teoman DUMAN katıldı.

OmnitechIT and Okan University in Istanbul, Turkey, signed Memorandum of Understanding for the program Co-Op in the University Careers Centre.
Ceo Roberto MIGNEMI, Offering Director Elio Di SANDRO, Managing Partner Cem Bülent ÜNAL and Career Center Director Teoman DUMAN.

OMNITECHIT releases Managed Security Services

Rome 2015-07-01

OMNITECHIT releases Managed Security Services
Managed Security Services (MSS), by OMNITECHIT is a set of services created to help organizations be more secure. Most IT systems needs to be available 24×7 and accessable for customers, partners and employees. That also means that organizations needs resources to manage the security aspects around these IT systems. Running this 24×7 is expensive, and many organizations don’t have the capacity and sometimes even the knowledge for a specialized, cost effective, continuous support around their IT systems.
MSS by OMNITECHIT is managed from a Security Operation Center (SOC) in Rome, Italy, within the company headquarter. OMNITECHIT provides a 24×7 service for their clients with a team of highly technical staff, being able to combine deep expertise with efficiency at reduced cost.

“We have seen a demand from our customers to help them to manage the solutions we have implemented” says Roberto Mignemi, CEO of OMNITECHIT. “The lack of knowledge and resources out there within the areas we will offer, makes this a great option for our customers”

OMNITECHIT provides MSS in the following areas of IT Security:

Identity & Access Management and Governance
This area is the core of OMNITECHIT with long experience and deep knowledge in different systems and procedures how to handle and manage identities and access combined with governance in an organization.

Security Intelligence & Event Management
It is of high importance to understand the network traffic and to able to monitor and log the network activities.
OMNITECHIT helps organizations run the SIEM product selected but even more important helps the organization analyze and understand the data collected.

Security Risk Assessment
OMNITECHIT can perform different types of security tests towards the network and applications to prevent cybercriminals to enter into the infrastructure in order to deploy malware and steel valuable information.

For more information contact Loretta Mazzoni, Marketing & Communication coordinator, loretta.mazzoni@omnitechit.eu

Please follow this link to read more about Managed Security Services.

EVENT OmnitechIT – Darktrace

Rome, May 6 2015, 12:00-14:30

Eataly – Piazzale 12 Ottobre 1492

OmnitechIT is organizing an interesting “lunch briefing” with Darktrace to discuss current threats and their evolution, the impact on the business and the innovative approach “Enterprise Immune System” to mitigate the risks from cyber attack and large-scale theft of intellectual property.

With our Holistic approach to IT Security combined with deep specialization, We support our customers in protecting their information assets across the entire IT stack, to reach an adaptive, context aware security posture facing the ever changing sophisticated exposures in the era of information, cloud, mobile and social.

For more information please contact Loretta Mazzoni, Marketing & Communication Coordinator at Loretta.mazzoni@omnitechit.eu

New subsidiary in Turkey

Rome, February 16 2015

OmnitechIT, an industry leader for IT Security and Service Management in Europe, announced today that it is launching a new subsidiary in Turkey. The office will be located in the Technopark in Istanbul.

“Turkey is in interesting and evolving market for security services”, says Robert Mignemi, CEO of OmnitechIT. “We also will use our company in Turkey as a development center for our next generation of Managed Security Services.“

More enterprises are changing the way they do business, moving more data to the cloud. OmnitechIT support its customers across the entire IT stack, in the era of big data, cloud, mobile and social.

New OmnitechIT company in Spain

Rome, January 26, 2015

OmnitechIT, an industry leader for IT Security and Service Management in Europe, announced today that it is launching a new subsidiary in Spain with its main office in Madrid.

“This new subsidiary is in line with the company’s expansion in Europe. We see an increase in demand for IT Security services for companies that needs to protect their digital assets when data and applications moves to the cloud.”, says Robert Mignemi, CEO of OmnitechIT.

With its headquarter in Rome, OmnitechIT also has several other locations in Europe, including Oslo and Stockholm. OmnitechIT support its customers by improving visibility, control, automation, administration and protection around their critical information assets across the entire IT stack, in the era of big data, cloud, mobile and social.

More information about OmnitechIT is available at http://new.omnitechit.eu

Omnitech is expanding and taking on a new identity

Rome, november 10, 2014

Omnitech, a leader in IT security services announced today that they are continuing to expand their business in Europe. At the same time the company is changing the name from OMNITECH to OMNITECHIT, combined with a new slogan and a new graphical identity.

The market for IT security services is expanding rapidly in Europe, especially in the areas of cloud and mobile. Many enterprises are changing the way they do business, moving more applications and data to the cloud, and at the same time the employees needs access to the company infrastructure from their mobile devices. These infrastructure changes requires new security solutions.

“We started our European expansion in 2012 in Sweden, and during spring this year we also opened up a company in Norway. During the fall this year we have on-going projects in Spain and Turkey, where we plan to open offices by the end of this year. We also have requests for our services in other European countries right now, and our plan is to continue to expand our organization throughout Europe in 2015-2016”, says Roberto Mignemi, CEO of OMNITECHIT.

“To reflect our plans for expansion in Europe we also decided to change our name, slogan, domain and visual identity”, Mr Mignemi continues.

More information about OMNITECHIT is available at http://new.omnitechit.eu

Shellshock Bug

Shellshock (also known as Bashdoor) is a security bug in the Bourne Again SHell (BASH)
Command Line Interpreter (CLI), also known as a shell. The BASH shell is widely distributed as the default CLI on many unix-like OS, including most types of Linux, many types of Unix, some types of BSD and Apple’s OSX.

Shellshock could allow hackers to remotely issue administrative commands to web servers. Seeing as a hacker can force a server to do anything he/she wants, there is a serious risk that private information can easily be stolen from affected servers. This could mean significant problems for companies with a web presence in the Internet whose servers are affected, according to a few information security professionals.

Since the announcement of the initial Shellshock bug (24 September 2014), related bugs in BASH were found by various researchers. The most important of these is the CVE-2014-6271 bug. It gives a good sense of the severity:

“GNU BASH through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from BASH execution.”

Therefore, it seems to be clear that anything that can manipulate the environment variables has the potential to be a vector for this vulnerability. Some experts are calling the Shellshock bug “a far more serious threat than the Heartbleed vulnerability”, which was discovered months ago (April 2014) and is still known to be affecting thousands of devices. That is because Shellshock allows unauthenticated attackers to remotely execute commands, while Heartbleed only allows intruders to steal information from servers. If an attacker identifies a vulnerable server, he/she can perform a number of different types of requests and several forms of attack, as a consequence. However, a more serious problem is faced by network devices that use embedded Linux, such as routers, switches, and security appliances. If there is an older, no longer supported model, it may be close to impossible to patch it and will likely be vulnerable to attacks.

An analysis of attacks experienced on this vulnerability shows that most of them are targeting HTTP web servers. Servers that run the Common Gateway Interface (CGI) or FastCGI have the capability to expose BASH to a HTTP request vector. A maliciously “handmade” HTTP request can allow an attacker to inject arbitrary commands onto the server and BASH will execute them, if invoked. BASH can be called directly by the CGI, or it could be called via a subprocess or system command. If BASH is started at any point within the context of this malicious CGI request, then the vulnerability will be triggered.
Actually, this bug has existed in the BASH code for over twenty years, since BASH program was written. However, it is not possible to estimate if or not this vulnerability was exploited in the past. The high level of severity is given by a combination of three concurrent factors:

  • the large number of vulnerable (web) servers on the Internet;
  • an easy accessibility of various exploit tools;
  • the importance of the outcome of exploitation, seeing as once a vector is found, arbitrary code execution is often easily gained.

Here is a basic explanation on what network and security administrators can do to protect their corporate’s infrastructure:

first of all, note that there’s no evidence that an exploitable Windows OS vector exists, although it’s possible;

it’s necessary obtain the latest patches from vendors and patch the affected systems to the latest version of BASH (all major Linux distributors have released patches that stop most attacks);

  • where patching is not possible, or if a patch is not available for your platform, evaluate migrating to another shell program;
  • check system’s exposure: for example, Red Hat has released a comprehensive guide which explains how to determine if a system is or not un-patched and vulnerable;
  • keep update network and server security products;
  • note that Intrusion Prevention Systems (IPS) and other types of network based detection SW or appliances are very effective for detecting and preventing Shellshock exploits, because the string sequence required to trigger the vulnerability is very distinguishable. Therefore, make sure your IPS systems are updated with the correct rule sets to detect and prevent exploitation attempts;
  • keep monitoring servers and access points in your network infrastructure;
  • specifically for Apache Web server, there are some Mod_Security rules that can stop attempts to exploit Shellshock. Mod_security is an Apache module that helps to protect websites from various attacks. It is used to block commonly known exploits by use of regular expressions and rule sets. These rules, created by Red Hat, are as follow:

Request Header values:
SecRule REQUEST_HEADERS “^\(\) {” “phase:1,deny,id:1000000,t:urlDecode,status:400,log,msg:’CVE-2014-6271 – Bash Attack'”

SERVER_PROTOCOL values:
SecRule REQUEST_LINE “\(\) {” “phase:1,deny,id:1000001,status:400,log,msg:’CVE-2014-6271 – Bash Attack'”

GET/POST names:
SecRule ARGS_NAMES “^\(\) {” “phase:2,deny,id:1000002,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014-6271 – Bash Attack'”

GET/POST values:
SecRule ARGS “^\(\) {” “phase:2,deny,id:1000003,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014-6271 – Bash Attack'”

File names for uploads:
SecRule FILES_NAMES “^\(\) {” “phase:2,deny,id:1000004,t:urlDecode,t:urlDecodeUni,status:400,log,msg:’CVE-2014-6271 – Bash Attack'”

Moreover, note that all the major Linux distributions now have patches available for the two original issues (CVE-2014-6271 and CVE-2014-7169). Several other related vulnerabilities in BASH remain un-patched, for now. However, there are no public reports yet of attacks taking advantage of these vulnerabilities and they are more difficult to exploit.

Finally, the experience relating to the major security vulnerabilities shows that reactive patching in itself is not sufficient to ensure protection against this types of attack. A proper implementation of proactive auditing policies and procedures is required in order to achieve an in-depth knowledge of the enterprise’s network infrastructure.
The less an administrator know about what software is running and where in the network, the longer it will take for him to deal with crises like Shellshock.

 

References

http://www.zdnet.com/shellshock-makes-heartbleed-look-insignificant-7000034143/

http://www.zdnet.com/the-shellshock-faq-heres-what-you-need-to-know-7000034219/

https://access.redhat.com/articles/1200223

http://cve.mitre.org/index.html

Identity Management

In general terms, Identity Management can be defined as management of individual digital identity within an organization, being it a company, a city or an entire country. In the recognition of personal identity, the specific allocation of one or more roles within the company is a key issue in both a social and working context. In the modern IT world, with the proliferation of applications, userID, passwords, database, and different accounts for each single application, you need a generalist and centralized approach. This approach makes it possible to achieve two main objectives:

  • Certain and unique recognition of the person that is trying to get access, with clear roles and features;
  • Simplification of access functions, without neglecting any security aspect.

Identity Management is an IT discipline, founded relatively recently, which aims to solve and automate the mechanisms of start, development and termination of the workers digital identities.
The IdM (Identity Management) tools include:

  • Password management tools;
  • User provisioning and deprovisioning;
  • User access centralization;
  • Single-Sign-On systems;
  • Roles and authorisations management;
  • Authorization processes management.

It goes without saying that the IT tool is used to automate a well-designed organizational process. However, without a clear idea of resources organization, IT tools can only partly solve management problems.

How can the use of digital identity management systems make improvements? With the development of e-commerce, the implementation of mobile systems and web-based applications, the concept of the workstation has become an almost absolute level of abstraction. There is almost no connection between clients which use applications and users. Users have (or rather claim to have) the possibility to connect to corporate resources using the most various devices: smartphones, tablets, personal PCs, and with the most disparate operating systems. User recognition, accounting, and digital identity security measures play a fundamental role. Beyond legal issues and compliance with ITIL and security best practices, use of IdM tools can lead to undoubted practical benefits, just think about the Self Service Password Reset systems. Over 70% of help desk calls concern password reset and the difficulty task for operators is always the same: having a reasonable certainty that the user for which assistance is sought is actually the person who is calling. Automate password reset systems, with safe Identification tools lead to real benefit concerning the time and resources.

Generally each new application brings with it a clearly defined database of users and roles, resulting in a proliferation of users and passwords, all with different criteria of complexity and with different expiration times. Being able to access the payroll web application can become a real nightmare, between PC passwords, network passwords and application passwords. The use of valid IdM systems allows the company to maximize the centralization of password management, to allow access to most resources with a single password (SSO), or at least synchronize accesses to systems that do not support SSO.

The Single-Sign-On is a blessing and a curse for all IT administrators: on the one hand, the use of a single user makes easier life for both users and administrator. On the other hand, compromise of that account could provide access to a multitude of resources and information, including the most sensitive.
It goes without saying that it is necessary in every way to preserve that access from any kind of tampering.

Modern IdM systems generally consist of four main elements:

  • A central storage that contains all digital IDs;
  • A unique tool for managing the life cycle of user accounts (creation, modification, privileges assignment, deletion etc.);
  • A system that manages Accesses and Authentications (which therefore it put Policies into operation);
  • An auditing system that allows to check the development of events and any possible deviations from Policies.

It is rare when talking about Identity Management to not approach Access Management. Especially since the term most frequently used in the management of digital identities is not so much IdM as rather IAM (Identity Access Management). An equally effective access management, especially when talking about Single-Sign-On, and must accompany a strict policy on identity.

The Access and Authentication mechanisms must follow data privacy and importance to manage: you switch from password policy to strong authentication systems: token, OTP (one time password), biometric systems.

The evolution of Cloud Computing, which has become a current hot topic in the context of security, has opened up new vistas (scenarios) for what concerns the Identity Management: no more Software as a Service (SaaS), but now Infrastructure as a Service (IaaS): the needs of corporate IT infrastructure growth and shrinkage (perhaps to cope with service spikes) caused companies to draw upon Cloud services (partially or entirely). Digital Identities management in an exposed environment, assumes even greater relevance: you are no longer protected by perimeter security. Infrastructure fruition takes place through the more disparate devices that is not always controllable. Companies sometimes interface with dozens of Cloud service providers, who need to provide secure and transverse interfaces to the integration with IAM tools, in order to extend internal Authentication/Authorization methods to all third-party provider while preserving the SSO.

The security challenge in the Cloud has just begun: it goes from Hybrid Cloud, in which the third party part is simply seen as an extension of their IT infrastructure, to the Cloud Suit, where both services, application platforms and the same infrastructure are hosted by providers, while wanting to maintain management and control.

Omnitech will participate at IBM BusinessConnect 2014

Omnitech will with its Norwegian company, Omnitechit Security AS, participate at IBM BusinessConnect 2014, in Oslo, Norway on October 21. This years event focuses at the new digital arena on the following categories, Cloud, Big Data & Analytics, Mobile, Social Business and Security.
Omnitechit Security AS will be represented in the Security section.

More about IBM BusinessConnect 2014 at: http://www.ibm.com/no/no/