Secure Computing Corporation (SCC) was a
public company
A public company is a company whose ownership is organized via shares of stock which are intended to be freely traded on a stock exchange or in over-the-counter markets. A public (publicly traded) company can be listed on a stock exchange ( l ...
that developed and sold
computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
appliances and hosted services to protect users and data.
McAfee
McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company head ...
acquired the company in 2008.
The company also developed filtering systems used by governments such as
Iran
Iran, officially the Islamic Republic of Iran, and also called Persia, is a country located in Western Asia. It is bordered by Iraq and Turkey to the west, by Azerbaijan and Armenia to the northwest, by the Caspian Sea and Turkm ...
and
Saudi Arabia
Saudi Arabia, officially the Kingdom of Saudi Arabia (KSA), is a country in Western Asia. It covers the bulk of the Arabian Peninsula, and has a land area of about , making it the List of Asian countries by area, fifth-largest country in Asia ...
that blocks their citizens from accessing information on the Internet.
[Snuffing out Net's benefit to democracy]
Jim Landers, ''Dallas Morning News
''The Dallas Morning News'' is a daily newspaper serving the Dallas–Fort Worth area of Texas, with an average print circulation of 65,369. It was founded on October 1, 1885 by Alfred Horatio Belo as a satellite publication of the '' Galvest ...
'', December 20, 2005; accessed September 20, 2008.[Iran targets dissent on the net]
Clark Boyd, ''BBC.com
BBC Online, formerly known as BBCi, is the BBC's online service. It is a large network of websites including such high-profile sites as BBC News and Sport, the on-demand video and radio services branded BBC iPlayer and BBC Sounds, the childr ...
'', June 24, 2005; accessed September 20, 2008.
Company history
In 1984, a research group called the Secure Computing Technology Center (SCTC) was formed at
Honeywell
Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building technologies, performance ma ...
in
Minneapolis, Minnesota. The centerpiece of SCTC was its work on
security-evaluated operating systems for the NSA. This work included the
Secure Ada Target (SAT) and the
Logical Coprocessing Kernel
Logic is the study of correct reasoning. It includes both formal and informal logic. Formal logic is the science of deductively valid inferences or of logical truths. It is a formal science investigating how conclusions follow from premise ...
(LOCK), both designed to meet the stringent A1 level of the
Trusted Computer Systems Evaluation Criteria (TCSEC).
Over the next several years, Secure Computing morphed from a small
defense contractor
The arms industry, also known as the arms trade, is a global industry which manufactures and sells weapons and military technology. It consists of a commercial industry involved in the research and development, engineering, production, and ...
into a commercial product vendor, largely because the investment community was much less interested in purchasing security goods from defense contractors than from commercial product vendors, especially vendors in the growing
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
space.
Secure Computing became a publicly traded company in 1995. Following the pattern of other
Internet-related startups, the stock price tripled its first day: it opened at $16 a share and closed at $48. The price peaked around $64 in the next several weeks and then collapsed over the following year or so. It ranged between roughly $3 and $20 afterward until the company was purchased by McAfee.
The company headquarters were moved to
San Jose, California
San Jose, officially San José (; ; ), is a major city in the U.S. state of California that is the cultural, financial, and political center of Silicon Valley and largest city in Northern California by both population and area. With a 2020 popul ...
, in 1998, though the bulk of the workforce remained in the
Twin Cities
Twin cities are a special case of two neighboring cities or urban centres that grow into a single conurbation – or narrowly separated urban areas – over time. There are no formal criteria, but twin cities are generally comparable in stat ...
. The Roseville employees completed a move to
St. Paul, Minnesota
Saint Paul (abbreviated St. Paul) is the capital of the U.S. state of Minnesota and the county seat of Ramsey County. Situated on high bluffs overlooking a bend in the Mississippi River, Saint Paul is a regional business hub and the center ...
, in February 2006. Several other sites now exist, largely the result of mergers.
Mergers and acquisitions
Secure Computing consisted of several merged units, one of the oldest being Enigma Logic, Inc., which was started around 1982. Bob Bosen, the founder, claims to have created the first
security token
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to access something. Examples of security tokens incl ...
to provide
challenge–response authentication
In computer security, challenge–response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.
The simplest example of a ch ...
. Bosen published a
computer game
Video games, also known as computer games, are electronic games that involves interaction with a user interface or input device such as a joystick, controller, keyboard, or motion sensing device to generate visual feedback. This feedbac ...
for the
TRS-80
The TRS-80 Micro Computer System (TRS-80, later renamed the Model I to distinguish it from successors) is a desktop microcomputer launched in 1977 and sold by Tandy Corporation through their Radio Shack stores. The name is an abbreviation of ...
home computer in 1979, called ''80 Space Raiders'', that used a simple challenge–response mechanism for copy protection. People who used the mechanism encouraged him to repackage it for remote authentication. Bosen started Enigma Logic to do so, and filed for patents in 1982–83; a patent was issued in the United Kingdom in 1986. Ultimately, the "challenge" portion of the challenge–response was eliminated to produce a
one-time password
A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid seve ...
token similar to the
SecurID
RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA for performing two-factor authentication for a user to a network resource.
Description
The RSA SecurID authentication mechanism consists of a " token"—either ...
product. Enigma Logic merged with Secure Computing Corporation in 1996.
Secure Computing acquired the SmartFilter product line by purchasing Webster Network Strategies, the producer of the WebTrack product, in 1996. The acquisition included the domain name webster.com, which was eventually sold to the publishers of ''
Webster's Dictionary
''Webster's Dictionary'' is any of the English language dictionaries edited in the early 19th century by American lexicographer Noah Webster (1758–1843), as well as numerous related or unrelated dictionaries that have adopted the Webster's n ...
''.
Shortly after acquiring the Webster/SmartFilter product, Secure Computing merged with Border Network Technologies, a Canadian company selling the
Borderware firewall. Border Network Technologies boasted an excellent product and a highly developed set of sales channels; some said that the sales channels were a major inducement for the merger. Although the plan was to completely merge the Borderware product with Sidewinder, and to offer a single product to existing users of both products, this never quite succeeded. In 1998, the Borderware business unit was sold to a new company, Borderware Technologies Inc., formed by one of the original Borderware founders.
By this time, the mergers had yielded a highly distributed company with offices in
Minnesota
Minnesota () is a state in the upper midwestern region of the United States. It is the 12th largest U.S. state in area and the List of U.S. states and territories by population, 22nd most populous, with over 5.75 million residents. Minne ...
,
Florida
Florida is a state located in the Southeastern region of the United States. Florida is bordered to the west by the Gulf of Mexico, to the northwest by Alabama, to the north by Georgia, to the east by the Bahamas and Atlantic Ocean, a ...
,
California
California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the ...
, and two or three in
Ontario
Ontario ( ; ) is one of the thirteen provinces and territories of Canada.Ontario is located in the geographic eastern half of Canada, but it has historically and politically been considered to be part of Central Canada. Located in Central C ...
. This proved unwieldy, and the company scaled back to offices in Minnesota and California.
In 2002, the company took over the Gauntlet Firewall product from
Network Associates
McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company hea ...
.
In 2003, Secure Computing acquired
N2H2, the makers of the
Bess web filtering package. There has been some consolidation of Bess and SmartFilter, and Bess is now referred to as "Smartfilter, Bess edition" in company literature.
An acquisition of
CyberGuard was announced in August 2005 and approved in January 2006. (A year earlier, CyberGuard had attempted to acquire Secure Computing, but the proposal had been rejected). This was the largest merger by Secure Computing at the time and resulted in the addition of several product lines, including three classes of firewalls, content and protocol filtering systems, and an enterprise-wide management system for controlling all of those products. Several offices were also added, including CyberGuard's main facility in
Deerfield Beach, Florida
Deerfield Beach is a city in Broward County, Florida, United States, just south of the Palm Beach County line. The city is named for the numerous deer that once roamed the area. As of the 2020 census, the population was 86,859. It is a principal ...
, as well as the Webwasher development office in
Paderborn, Germany, and a SnapGear development office in
Brisbane, Australia
Brisbane ( ) is the capital and most populous city of the Australian state of Queensland, and the third-most populous city in Australia and Oceania, with a population of approximately 2.6 million. Brisbane lies at the centre of the South ...
.
In 2006, the company merged with Atlanta-based
CipherTrust, a developer of email security solutions. The merger was announced in July 2006 and completed in August 2006.
On July 30, 2008, Secure Computing announced its intention to sell the SafeWord authentication product line to
Aladdin Knowledge Systems
Aladdin Knowledge Systems (formerly and ) was a company that produced software for digital rights management and Internet security. The company was acquired by Safenet Inc, in 2009. Its corporate headquarters are located in Belcamp, MD.
Histor ...
, leaving the company with a business focused on web/mail security and firewalls. The sale was concluded later that year.
On September 22, 2008, McAfee announced its intention to acquire Secure Computing. The acquisition was completed not long afterwards, and the combined company formed the world's largest dedicated security company at the time.
Products
TrustedSource reputation system
TrustedSource
TrustedSource is an Internet reputation system originally developed by CipherTrust and now owned by Intel Security. It provides reputation scores for Internet identities, such as IP addresses, URLs, domains, and email/web content.
Reputatio ...
, a
reputation system
Reputation systems are programs or algorithms that allow users to rate each other in online communities in order to build trust through reputation. Some common uses of these systems can be found on E-commerce websites such as eBay, Amazon.com, ...
that Secure Computing obtained as part of the
CipherTrust acquisition, was a key technology for the company, enabling all product lines with global intelligence capability based on behavioral analysis of traffic patterns from all of company's email, web and firewall devices and hosted services, as well as those of numerous OEM partners. TrustedSource derived real-time reputation scores of IPs, URLs, domains, and mail/web content based on a variety of data mining/analysis techniques, such as
Support Vector Machine
In machine learning, support vector machines (SVMs, also support vector networks) are supervised learning models with associated learning algorithms that analyze data for classification and regression analysis. Developed at AT&T Bell Laboratories ...
,
Random forest
Random forests or random decision forests is an ensemble learning method for classification, regression and other tasks that operates by constructing a multitude of decision trees at training time. For classification tasks, the output of th ...
, and Term-Frequency Inverse-Document Frequency (
TFIDF) classifiers.
Web security
The company's flagship web security product line was the
Secure Web
Secure may refer to:
* Security, being protected against danger or loss(es)
** Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources
** Information security, defending informatio ...
appliance (formerly known as Webwasher). It provided Anti-Malware protection, TrustedSource reputation-enabled URL filtering controls, content caching, and SSL scanning capabilities.
In June 2008, Secure Computing launched
Secure Web Protection Service
Secure may refer to:
* Security, being protected against danger or loss(es)
** Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources
** Information security, defending informatio ...
, an in-the-cloud hosted web security service that provided a similar set of features to the
Secure Web
Secure may refer to:
* Security, being protected against danger or loss(es)
** Physical security, security measures that are designed to deny unauthorized access to facilities, equipment, and resources
** Information security, defending informatio ...
appliance, without requiring any on-premises equipment or software.
Mail security
The company's flagship email security product line was the
Secure Mail appliance (formerly known as IronMail). It provided TrustedSource reputation-enabled anti-spam, data-leakage protection (DLP), encryption and anti-malware capabilities.
Secure firewalls
The company's flagship firewall product, formerly known as Sidewinder, was renamed McAfee Firewall Enterprise; McAfee sold Sidewinder to Forcepoint in January 2016. Over the years, Secure Computing (and its antecedent organizations) has offered the following major lines of firewall products:
* Firewall Enterprise (Sidewinder) – historically based on SecureOS, the company's derivative of
BSDi (previously
BSD/OS
BSD/OS (originally called BSD/386 and sometimes known as BSDi) is a discontinued proprietary version of the BSD operating system developed by Berkeley Software Design, Inc. (BSDi).
BSD/OS had a reputation for reliability in server roles; the re ...
), but later based on
FreeBSD
FreeBSD is a free and open-source Unix-like operating system descended from the Berkeley Software Distribution (BSD), which was based on Research Unix. The first version of FreeBSD was released in 1993. In 2005, FreeBSD was the most popular ...
.
* Secure Firewall Reporter
* Secure Firewall CommandCenter
* CyberGuard
** Secure SnapGear – embedded system based on
μClinux
μClinux is a variation of the Linux kernel, previously maintained as a fork, that targets microcontrollers without a memory management unit (MMU). It was integrated into the mainline kernel as of 2.5.46; the project continues to develop patc ...
** Classic – built on
UnixWare
** TSP (Total Stream Protection) – built on
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which i ...
* Borderware – sold off, as noted previously
* SecureZone – discontinued
* Firewall for
NT – discontinued
* Gauntlet – built on
Solaris, nearly phased out
The Sidewinder firewall incorporated technical features of the high-assurance LOCK system, including
Type enforcement, a technology later applied in
SELinux
Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC).
SELinux is a set of kernel modifications and user-space ...
. However, interaction between Secure Computing and the
open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
community was spotty due to the company's ownership of
patent
A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an sufficiency of disclosure, enabling disclo ...
s related to Type enforcement. The Sidewinder never really tried to achieve an A1
TCSEC
Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TC ...
rating, but it did earn an EAL-4+
Common Criteria
The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard ( ISO/ IEC 15408) for computer security certification. It is currently in version 3.1 revision 5.
Common Criter ...
rating.
Along with Sidewinder, Gauntlet had been one of the earliest
application layer
An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network. An ''application layer'' abstraction is specified in both the Internet Protocol ...
firewalls; both had developed a large customer base in the
United States Department of Defense
The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national secur ...
. Gauntlet was originally developed by
Trusted Information Systems
Trusted Information Systems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such as NSA, DARPA, ARL, AFRL, SPAW ...
(TIS) as a commercial version of the ''TIS Firewall Toolkit'', an early open source firewall package developed under a
DARPA
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.
Originally known as the Ad ...
contract.
Use of company products for governmental censorship
The
OpenNet Initiative
The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. The project employed a number of technical means, as well as an international network of investigato ...
studied filtering software used by governments to block access by their citizens and found Secure Computing's SmartFilter program heavily used by both the Iranian and Saudi governments.
[ According to Secure Computing, any use of its software in Iran is without its consent— U.S. sanctions prohibit American companies from any dealings with Iran—and in 2005 the company said it is actively working to stop its illegal use.][Iranian net censorship powered by US technology]
Will Knight, ''New Scientist
''New Scientist'' is a magazine covering all aspects of science and technology. Based in London, it publishes weekly English-language editions in the United Kingdom, the United States and Australia. An editorially separate organisation publish ...
'', June 27, 2005; accessed September 20, 2008.[Secure Computing Tries to Block Illegal Downloads in Iran]
K.C. Jones, ''InformationWeek
''InformationWeek'' is a digital magazine which conducts corresponding face-to-face events, virtual events, and research. It is headquartered in San Francisco, California
California is a state in the Western United States, located alo ...
'', October 14, 2005; accessed September 20, 2008.
In response to the company, Jonathan Zittrain
Jonathan L. Zittrain (born December 24, 1969) is an American professor of Internet law and the George Bemis Professor of International Law at Harvard Law School. He is also a professor at the Harvard Kennedy School, a professor of computer sci ...
, co-director of Harvard Law School
Harvard Law School (Harvard Law or HLS) is the law school of Harvard University, a private research university in Cambridge, Massachusetts. Founded in 1817, it is the oldest continuously operating law school in the United States.
Each class ...
's Berkman Center for Internet and Society
The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace. Founded at Harvard Law School, the center traditionally focused on internet-related legal issues. On May 15, 2008, ...
, stated, " e fact remains that the software has been in use for an extended period of time there. And we've seen Secure Computing software turn up in more than just Iran. We've seen it in Saudi Arabia as well."[
In 2001 '']The New York Times
''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'' reported that Secure Computing was one of ten companies competing for the Saudi government's contract for software to block its citizens' access to websites it deemed offensive.[Companies Compete to Provide Internet Veil for the Saudis]
Jennifer 8. Lee
Jennifer 8. Lee (Chinese name: ; pinyin: '; POJ: ') (born March 15, 1976) is an American journalist who previously worked for ''The New York Times''. She is also the co-founder and president of the literary studio Plympton, as well as a produce ...
, November 19, 2001; accessed September 20, 2008. The company already had a deal with the Saudis that was due to expire in 2003. In its defense, Secure Computing has always stated that it cannot control how customers use a product once it has been sold.[ According to the OpenNet Initiative's 2007 report, the Saudi government's censorship "most extensively covers religious and social content, though sites relating to opposition groups and regional political and human rights issues are also targeted."][Saudi Arabia country profile]
OpenNet Initiative, May 10, 2007; accessed September 20, 2008.
The governments of the United Arab Emirates, Oman, Sudan, and Tunisia also actively use SmartFilter. The Tunisian government goes so far as to redirect blocked pages to a fake Error 404
In computer network communications, the HTTP 404, 404 not found, 404, 404 error, page not found or file not found error message is a hypertext transfer protocol (HTTP) standard response code, to indicate that the browser was able to commun ...
page, to hide the fact that blocking software is being used.[Deibert, Ronald. "Access Denied: The Practice and Policy of Global Internet Filtering." The President and Fellows of Harvard College, 2008, p. 15.] The Tunisian Government is generally recognized as having a poor record when it comes to the right of free expression.
See also
* Forcepoint
Forcepoint, an American multinational corporation software company headquartered in Austin, Texas, that develops computer security software and data protection, cloud access security broker, firewall and cross-domain solutions.
Forcepoint was fo ...
References
{{reflist
External links
Secure Computing Corporation web site
*
Cost Profile of a Highly Assured, Secure Operating System
', an overview of the LOCK system.
Computer security software companies
Companies based in San Jose, California
Defunct companies of the United States