BluePoint Security product Q&A

Discussion in 'other anti-malware software' started by BluePointSecurity, Aug 31, 2009.

Thread Status:
Not open for further replies.
  1. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    this one looks in a way like prevx,maybe i am wrong:)
     
  2. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    Please report them! You may even get a free license out of it ;)


    I know not everyone liked the videos series, hence why we took it down. At the same time I think people should be informed (maybe in a less Hollywood way of course) of how easy it is to bypass "most" of the products out there simply by opening up a developer and writing a new threat. There's a complete false sense of security with many products. We would be happy to provide a copy of the keylogger to any vendor that asks, although it won't solve the problem. They'll add it to their def list and if someone were to create another 30 minutes later, same problem. And it gets worse, the keylogger did not "exploit" any holes in the os or products being tested. It was simply 30 lines of code in vb6. Meaning, the keylogger didn't even attempt to evade these products, most of them just didn't seem to bother preventing it.

    To me, this is why we still see infections and prevention failure.
     
  3. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    We are similiar to Prevx in that both products utilize the cloud for detection, however the security model is completely different. Prevx uses heuristic detection while BluePoint relys upon white listing (default deny anything we don't know about or that is not trusted without your permission).

    Our security model is based upon if we don't know the publisher it's denied and you are asked for permission. Quite a few notifications, yes, but you are rewarded with very very strong protection against new malware. Nothing will be executed silently behind your back.
     
  4. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    i think this is cool idea to prevent any unknown publisher from loading,just to prevent infections
    it will be even nicer if bluepoint silently blocks all silently without any alerts,but again will have to have an installation mode for trusted publishers:)
     
  5. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA

    Gotta admit, we keep beating the hell out of you and you come back for more. Hell, I may actually make you a friend soon.:blink: Nah!

    Lets look at your quote. Isnt your math wrong. I would say with that combo and the average user a 50 percent of right or wrong would apply.

    Now for some advice. Quit pushing. Quit comparing. Quit hanging out here all day. Invest that time in the product. Only respond to legit questions and answers that only relate to your product. Give a few licences away. Get any frigging videos or references to off the internet and you just might, might, want to honestly, apologize that was the wrong approach to take. The weird thing is, it may have been accurate in some circumstances.

    People at other forums talk about the family atmosphere here, the "You better like the products that Wilders does or you are toast." That is such BS. There are more things run through the grinder here then anywhere else. There are more experts and idiots,:D here then anywhere else. And that my friend, is what makes this place special. You dont kick the door in, you knock. So, you got one groupie, do as I suggest and you may get more. But remember, You dont kick the door in, because, the backward swing, can damage your hip bone.

    So, lets start afresh, people try it. If it stinks tell why based on the product not the person. If it works, can someone beside jmonge let us know. And if you listen to these good folks here, you may just have something. Oh, and dont create a product for geeks, create one for all.;)
     
    Last edited: Aug 31, 2009
  6. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    One last jab, you are right in comparing yourself to Prevx. Reader must figure out answer.;)
     
  7. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    Out of the box simplicity is one of them.

    Take a look at this screenshot:

    http://www.torchsoft.com/images/md_screenshot.jpg

    Grandma certainly isn't figuring that one out anytime soon. Although I could easily teach her how bluepoint works in about 15 minutes.

    There are certainly other products on the market that can protect you properly with the proper configuration and settings of course. We aren't really out to compete with the more obscure products, we are after the AV companies, that's where the real failures are.

    BluePoint easily prevents malware from all vectors (usb, network, cd etc). We are not concerned about where malware comes from, only what is trusted and what is not when it comes to executable code.
     
  8. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    I consider Prevx to be an excellent product, we would be happy to be associated with them. They consistently outperform the AV companies with ease. As has been previously stated, our security model differs from theirs quite a bit, the similarity is only in the fact that they use the cloud as we do instead of pushing defs to customers.
     
  9. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    Since when did threats play by rules?

    just poking at you ;)
     
  10. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    Advice taken and I even agree with most of it!
     
    Last edited by a moderator: Aug 31, 2009
  11. BrendanK.

    BrendanK. Guest

    Well I'm going to take your product later today for a rigorous test drive (3,000 safe well known applications, and 3,000 malicious to be fair ;)) :) I like the deny approach, however, I would like it more to by default be deny not matter what. Technically speaking, if an average user wants to run something they will not matter if it is unknown, however, since you are using a white listing approach, all unknown applications SHOULD be blocked automatically with no user intervention. Therefore, your whitelist should always be up to date with safe software, rather then focusing on malicious. That way average users will have a large database of white listed applications, which can allow them to install SAFE software. Just a tip ;)
     
  12. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    Totally agree or not, many a vendor has learned that the consumer always comes first. Take care and good luck with some accurate testing of your product here. That I can assure you, it will be given.:thumb:
     
    Last edited by a moderator: Aug 31, 2009
  13. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,882
    I think its a behavioral blocker like Threatfire or Mamutu. A classical HIPS would have a set of configurable rules. If you need more comprehensive protection this can be used in place of Threatfire and alongside a traditional anti-virus product to provide all the protection one needs. TF is free while this one is a paid security product.
     
  14. CogitoTesting

    CogitoTesting Registered Member

    Joined:
    Jul 4, 2009
    Posts:
    901
    Location:
    Sea of Tranquility, Luna
    Come on we are living in a capitalist world. Such a behavior such as trashing your competitor is expected. It is a tough world, it's the survival of the fittest i.e crushed or be crushed. There is no such thing as kumbaya my Lord, Kumbaya in a competitive world.

    Follow jmonge advice try the product and voice your opinion later. Please never forget that the capitalist business world is a jungle, one cannot afford to be soft and weak when it comes to a product's competitors.
     
  15. CogitoTesting

    CogitoTesting Registered Member

    Joined:
    Jul 4, 2009
    Posts:
    901
    Location:
    Sea of Tranquility, Luna
    Are you sure you are using ESS? This morning I had the faint notion that you were using McAfee Total Security 2010 beta. :D
     
  16. BrendanK.

    BrendanK. Guest

    Ok, I installed 200 samples. As many as the VM could hold :p All 200 samples were shown as unknown, 198 remained undetected during the scan. A scan of the computer detected 18/2554 take about 100 html samples off (sorry I forgot to remove them :/).

    The 1,200 safe samples of files I had, only 102 were classified as white listed. Missing whitelisted applications included, Wordpad and Notepad?

    Also, one of the samples infected Task Manager and BluePoint kept blocking Task Manager from running as it was infected.

    The 18 samples detected were unable to be removed or quarantined, as they did not show up in the detection panel?

    A lot of work needs to be done, as this looks promising, but I would not let the average user use it just yet.

    I must say though, this was not an easy test. Of the 2554 samples, most vendors only detect around ~600.

    ~Comment removed.~
     
    Last edited by a moderator: Aug 31, 2009
  17. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    Mcafee, and it is beta, killed my internet in less then 12 hours. It kills me how Eset gets the heck it does when there are so many suites that it puts to shame in quality.

    But this is about BluePoint and we need to embrace the offer to test it. There is no better testing bed then Wilders, when you really think about it. Be fair to this vendor and give him the same constructive feedback Wilders does for all. That is really all that matters.
     
  18. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,882
    I think it should be set to deny on default. Windows7 Firewall Control acts in a "deny" mode unless you specifically authorize a service or executable. If its malware, you don't want it to run. In other words, if you don't trust the software, that's exactly what a behavioral blocker/anti-executable should perform for the average user. If you trust it, you can allow it.
     
  19. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    333halfevil:

    Out of curiosity, were you able to infect the vm after installing BluePoint or was it infected prior to the install?

    Thanks for the feedback guys, you've been busy!
     
  20. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    I'd really like to see some prevention tests if you guys have time, that's really what the products was designed for.

    Again, we really appreciate the honest no BS feedback, good and bad.

    PM me, I may be willing to provide license keys if you're willing to test things out for us.

    Thanks
     
  21. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    very generous offer, you are to be commended. This folks can help you, it may take awhile but they can make your software even better. Me? No, I just try to offer advice.

    cheers
    Jeff
     
  22. BluePointSecurity

    BluePointSecurity Registered Member

    Joined:
    Aug 1, 2009
    Posts:
    134
    One other thing I forgot to mention, make sure when you are running your scans while testing, you check under settings -> file types to scan -> selected ALL.

    Also, under settings tick off heuristic scanning as well as compressed files.

    You may end up with lower than expected detection rates otherwise.

    These settings apply to on demand scanning only, not real-time protection.
     
  23. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    I did reinstall, and do a brief test. But on the chance it was a conflict with Malware Defender or Online Armor, I uninstalled both of those. (THat would almost be a deal breaker). I then did a clean scan of all files, which came up clean. That's wrong, I have a folder of malware, some not password protected.

    Decided as a first test to try killdisk. First thing was I used Powerarc to remove it from the archive. Got a "unknown file" pop up on that. Allowed it and then ran the kill disk exe. Bluepoint, did detect malware, and shut it down without a prompt.

    I then tried another virus I have, and Bluepoint let it run with out a peep.

    Let me comment a bit about philosophy. Way back when Prevx was a pure HIPS, they got some good user feedback and discovered at least 50% of the time when users were presented with a prompt the allowed malware.

    Both OA and MD, have the pop up thing and it's great if you don't know what you are doing, which most don't.

    I have a situation, which illustrates the mom and pop issue. I have a business I run and have two young ladies who work for me. We use Outlook as an email client, and are in a position, that a clients email has an attachment, we have to look at it. The problem is if they get a pop up from either program they don't know what to do.

    Solution is Sandbloxie. Both browsers and Outlook run Sandboxed, so they can pretty much allow whatever, and let it run without hurting the system.

    Could Bluepoint, take over that role. Not by a longshot yet. If you need pop ups, its not going to be good. The classic default deny is Faronics Anti Executable, and did does it's job ruthlessly, but it also in some ways drives me nuts, to the point, I don't run it.

    So for Bluepoint, to truly be revolutionary, it's going to have to find a way to allow what's needed to run, and block what's bad, with no pop ups.

    My humble 2 cents.

    Pete
     
  24. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    cool;) i noticed that when i disable the notification unknown publisher or even malware get a ride to quarentine vault;) i tested with a malware sample and with the notification on first and blue point alerted me about unknown file detected,publisher unknown and also description unknown,with notification on who wants to allow this :):):) this unknown notification explain it all.now i did same test with notification off and run same sample now i didnt get any notification and silently sent this malware to quarentine which is cool ;) very cool indeed,i run a scan and this file was quarentine and ofcourse was not running it was in jail :):) nice program:thumb: the file i was testing is the card.exe :)
     
  25. BrendanK.

    BrendanK. Guest

    I infected the machine AFTER installation. I would never do it beforehand :p

    If I denied the installation, I doubt it would have infected the VM. However, I was pretending to be an every day user, like I really wanted to install the program. Therefore I allowed 200 malicious applications to execute, and ran a scan on it while it was loaded into the memory.

    Then I reset the VM, with BluePoint already installed, updated, ran a scan with 2554 samples (all extracted into a folder) and let it detect. I did configure the scanner beforehand, giving it the best chance at detecting the malware.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.