Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Post on 08-Jun-2015

431 views 0 download

Tags:

description

Lumension Security is making the revolution in Endpoint Security by enabling one agent one platform solution to answer all the endpoint security related questions.

Transcript of Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

The Evolving State of Endpoint Management

& Security

Maik Bockelmann VP EMEA

He told me … what’s happen today morning!

Devices Nodes

I think I know … where he really is!

Devices Nodes

What is an Endpoint?

The Endpoint: Any device with a URL specifying where the endpoint can be accessed, and binding properties that specify how the data will be transferred. -Wikipedia

Devices Nodes

5 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Do you remember? … how easy it was!

… and it was IT’s Job to Say NO!

6

IT Networks 2000: Static Networks

7

Corporate HQ

Remote Offices & Subsidiaries

WAN

Corporate Data Center

….. And data centers used to house a company’s data inside a safe and

well-defined perimeter

That Was Yesterday!

8 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Today’s Endpoint Management & Security

Landscape has Fundamentally Changed

9 9

Forces Impacting Today's Endpoint Environment

9 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

New Threat Landscape

Compliance

Consumerization

of IT

Total Cost of Ownership

Total Economic Impact From Data Loss & Security Breaches

Well Funded. Well Organized.

Financially Motivated.

Today We Deal with a Growing Cyber Mafia

* information provided by Interior Ministry on losses from card fraud - comparison with those of payment systems REMA (mio RUB)

Losses from card fraud

Losings: Russia in 2009

Камера на ПИН-ПАД

Wincor ProCash Wincor, Diebold

New types of devices

NCR

Насадка для кражи треков

Diebold

Через отверстие проводится подключение к штатной головке считывателя магнитной полосы

…or just shopping … and the story starts

…or just shopping … welcome surprise

…or just shopping … and please block your card

…or just shopping … what’s happen

…or just shopping … analysis

21 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Ponemon Institute, 2009

60% of your employees would take confidential information if they left your organization.

Consumerization of IT

Consumerization of IT

23 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

An adoption trend led by a technology savvy workforce that self-provisions collaborative tools, information sources, and human networks — requiring minimal or no ongoing support from a central IT organization.

Employee provisioned laptop programs can lead to greater user satisfaction and reduce total ownership costs up to 44% percent. Gartner 2008

If Facebook were a country:

24 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

It would be the 4th largest country in the world

1.  China 2.  India 3.  US 4.  Facebook 5.  Indonesia 6.  Brazil 7.  Pakistan 8.  Bangladesh

Age of Mobile Computing

25 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Netbook

Terminals

3GS

Cellular

Speed & Flexibility

Mobility & Power

Changing IT Role: Enables the Use of New Technology

26

Major Shift For IT Security

It’s now IT’s job to say YES!

Growing Compliance

Mounting External Compliance Regulations

28 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

EU Directive

Basel II

HIPAA

Sarbanes-Oxley, Section 404

PCI Data Security Standards (DSS)

PII Security Standards

21CFR11

Gramm Leach Bliley (GLBA)

USA Patriot Act

SB1386 (CA Privacy Act)

EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive

HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA

21CFR11 21CFR11 21CFR11 21CFR11 21CFR11

Gramm Leach Bliley (GLBA)

Gramm Leach Bliley (GLBA)

Gramm Leach Bliley (GLBA)

Gramm Leach Bliley (GLBA)

USA Patriot Act USA Patriot Act USA Patriot Act

SB1386 (CA Privacy Act)

SB1386 (CA Privacy Act)

Basel II

PCI Data Security Standards (DSS)

Time *The Struggle to Manage Security Compliance for Multiple Regulations”..SecurityCompliance.com

3 out 4 organizations must comply with two or more regulations and corresponding audits.

43% of organizations comply with 3 or more regulations.

Our IT Networks Were Never Designed With Compliance In Mind

Today Organizations Spend 30-50% More On Compliance Than They Should

Total Cost of Ownership

31 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

TCO Pressures Will Drive IT To Even Greater Distributed and Virtual Solutions

The average company has intellectual property worth $ xx million

stored, accessed and managed overseas.

Unsecured Economies report 2009

IT Networks 2009: Highly Distributed

33

Corporate HQ

Mobile Endpoints

Remote Offices & Subsidiaries

WAN Internet

Data Center

Data has effectively moved away from the data center to a borderless endpoint

Cloud Computing is a REALITY

…but which cloud will it be?

So What Does All This Mean For Endpoint Security?

Our approach to IT security remains the same:

Threat Centric

While the Endpoint & Networks are changing…

There will always be ways to breakdown walls!

Break with the Old Approach

It’s No Longer Relevant

1.  Think Differently About the Endpoint

2.  Converge our Silos

3.  Adopt a Trust-Centric Approach

People are “The New Perimeter”

41 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Need For Optimized IT Risk Management

42

In a world where nothing can be 100% secure the game organizations play is “optimization” – How do I mitigate the most amount of IT risk with the lowest investment of time and money?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION 42

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Nodes Devices Applications Business Processes

People Compliance Regulations

Limited IT Resources and Investment Budget | Personnel | Technology

Growing complexity and external pressure

43

Functional Silos

Operational IT

Lifecycle Management, Remove Risk from Technology

IT Security

Stopping Threats, & Protecting Data

We need to start thinking differently

We need a Trust-Centric Approach to Endpoint Management & Security

Trust Stack of the Future

45

Today’s Trust Stack

New application New application

Is this known bad? Is this known good? Is this known bad? Is this unwanted? Do I trust the Vendor? What program introduced it? Do I trust where it came from? Do I trust the user installing it? Am I licensed for this?

Allow / Block / Remove

Trust Stack of the Future

? ?

Allow / Block / Restrict / Remove

Challenges with Today's Technology Approaches?

47 47

Compliance & IT Risk Management

Console

47

Visibility: Disparate Data

Vulnerability Assesment

Systems Mgt Patching AV/Malware Data Protection Compliance

Limited visibility Disparate workflows across ops & security Limited relational insight Limited user productivity across multiple management consoles

Data Data Data Data Data Data

48

Inefficient Scalability

• Network and endpoint resources are not scalable and require high server to endpoint ratios and cannot meet changing needs without additional costs • Network resources are taxed as higher levels of bandwidth, storage and processing are required to manage multiple and disparate systems • Existing security and operations platforms are rarely open and extensible • Multiple agents are required to perform related tasks leading to increased agent bloat

49 49

Lumension Endpoint Management and Security Suite

49

Lumension® Patch and Remediation

Lumension® Scan

Lumension® Security Configuration Management

Lumension® Asset Manager

Lumension® Power Mgmt Reporting

Lumension® Content Wizard

Lumension® Risk Manager

Lumension® Enterprise Reporting

Compliance Endpoint Operations Endpoint Security

Lumension® AntiVirus

Lumension® Application Control

Lumension® Endpoint Integrity Service [IWL]

Lumension® Device Control

Lumension® Data Loss Prevention

PGP® Whole Disk Encryption

IT Risk M

anagement

Intelligent Whitelisting

49

CTP

CTP

L.E.M.S.S. - DEMO December 2nd 2010