2014 Ultimate Buyers Guide to Endpoint Security Solutions

34
Presents 2014 Ultimate Endpoint Security Buyer’s Guide Mike Rothman, President [email protected] Twitter: @securityincite

Transcript of 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Page 1: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Presents

2014 Ultimate Endpoint Security Buyer’s Guide2014 Ultimate Endpoint Security Buyer’s Guide

Mike Rothman, President

[email protected]

Twitter: @securityincite

Page 2: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

About SecurosisAbout Securosis

• Independent analysts with backgrounds on

both the user and vendor side.

• Focused on deep technical and industry

expertise.

• We like pragmatic.

• We are security guys - that’s all we do.

Page 3: 2014 Ultimate Buyers Guide to Endpoint Security Solutions
Page 4: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Advanced Malware is AdvancedAdvanced Malware is Advanced

• Attacks > Defenses

• Advanced Attackers > You

• Yet you can track the

indicators and follow their trail.

• But first you need to

understand the kill chain.

http://flic.kr/p/4UPRJ7

Page 5: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

The Kill ChainThe Kill Chain

http://computer-forensics.sans.org/blog/2009/10/14/security-intelligence-attacking-the-kill-chain#

Page 6: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Defining Endpoint SecurityDefining Endpoint Security

Page 7: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Anti-Malware: Protecting Endpoints from Attack

Anti-Malware: Protecting Endpoints from Attack

Page 8: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

The Negative Security ModelThe Negative Security Model

http://www.despair.com/tradition.html

Page 9: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

How customers view Endpoint ProtectionHow customers view Endpoint Protection

• Compliance is the main driver

for endpoint protection

• Whether it works or not is not

the issue.

• And to be clear, traditional

anti-malware technology

doesn’t work anymore.

http://flic.kr/p/9kC2Q1

Page 10: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Adversaries: Better and BetterAdversaries: Better and Better

Advanced Malware

Polymorphism

Sophisticated targeting

Professional Processes

http://www.flickr.com/photos/dzingeek/4587871752/

Page 11: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

You don’t know what malware is going to look like...

But you DO know what software should and should

not do.

You don’t know what malware is going to look like...

But you DO know what software should and should

not do.

Page 12: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Advanced Protection TechniquesAdvanced Protection Techniques

• Better Heuristics• Profile the “Big 7” (browsers,

Java, Adobe, Word, Excel, PPT, Outlook)

• “Application HIPS”

• Better Isolation (Sandboxes)• Browser Isolation• O/S Isolation (virtualization)

• White Listing (endpoints user experience impact, good for servers)

• Endpoint Activity Monitoring• Device Forensics• Retrospective Alerting

Page 13: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Endpoint Hygiene: Reducing Attack Surface

Endpoint Hygiene: Reducing Attack Surface

Page 14: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Endpoint HygieneEndpoint Hygiene

Page 15: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Patch Management ProcessPatch Management Process

http://www.flickr.com/photos/smallritual/6964911694/

Page 16: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Patch Management Technology ConsiderationsPatch Management Technology Considerations

• Coverage (OS and apps)

• Library of patches

• Intelligence/Research

• Discovery

• Patch deployment and

software removal

• Agent vs. agentless

• Handling remote devices

• Deployment/scalability

architecture

• Scheduling flexibility

Page 17: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Configuration Management ProcessConfiguration Management Process

http://www.flickr.com/photos/smallritual/6964911694/

Page 18: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Configuration Management Technology ConsiderationsConfiguration Management Technology Considerations

• Coverage (OS and apps)

• Discovery

• Supported standards and benchmarks

• Agent vs. agentless

• Handling remote devices

• Integration with

operational processes

• Policy exceptions

• Who has the “special

machines?”

Page 19: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Device Control Use CasesDevice Control Use Cases

• Data Leakage

• Data Privacy (Encryption)

• Malware Proliferation

(Sneakernet)

http://www.flickr.com/photos/rave2npg/2667464740/

Page 20: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Device Control ProcessDevice Control Process

Page 21: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Device Control Technology ConsiderationsDevice Control Technology Considerations

• Device support

• Policy granularity

• Encryption algorithm

support

• Agent (small footprint)

• Hardware key logger

protection

• Offline support

• Forensics

• Grace periods/User

override

Page 22: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Blurring lines between technologiesBlurring lines between technologies

• Periodic Controls

(Patch/Config) with

Vulnerability Management & IT

Ops

• Device Control with Endpoint

DLP

• Who wants the hot potato?

• Accountability and

organizational complexities

http://www.flickr.com/photos/zen/253267347/

Page 23: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

The Impact of BYOD and MobilityThe Impact of BYOD and Mobility

Page 24: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

BYODBYOD

• Not just mobile devices

• Selective

enforcement/granularity of

policies

• Require Anti-malware?

• Manage Hygiene?

http://www.flickr.com/photos/jennip/8465930151/

Page 25: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Mobility/Smart DevicesMobility/Smart Devices

• Management a bigger problem

than security (for now)

• Mobile malware?

• MDM/MAM and other

management technologies

• Containers

http://www.flickr.com/photos/becw/2404120929/

Page 26: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

BYOD/Mobile stand alone?BYOD/Mobile stand alone?

No...

http://www.flickr.com/photos/rabanito/3191183434/

Page 27: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Endpoint Security PlatformEndpoint Security Platform

Brings it all together

into a well oiled

machine...

http://www.flickr.com/photos/andrewl04/3163980834/

Page 28: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Buying ConsiderationsBuying Considerations

Page 29: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Endpoint Security Platform Buying ConsiderationsEndpoint Security Platform Buying Considerations• Dashboard

• Discovery

• Asset Repository

Integration

• Alert Management

• Alert queue

• Navigation/workflow

• Agent Management

• Policy Creation and Management

• Baselines/Templates for customization

• Alert only policies

• System Administration

• Reporting

Page 30: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

To Cloud or Not to CloudTo Cloud or Not to Cloud

• No server management

• Uptime

• Multi-tenancy: Data segregation and protection

• User experience

http://www.flickr.com/photos/52859023@N00/644335254

Page 31: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Buying Process/Vendor SelectionBuying Process/Vendor Selection

• Buying Process: Define

Requirements, Short list,

Test/PoC, Test support,

Negotiate

• Confirm with peer group

• Big vs. small vendor

• Platform vs. pricing leverage

• Research & Intelligence

http://www.flickr.com/photos/jeffanddayna/4081090389/

Page 32: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

SummarySummary

• Don’t forget about the security

of endpoint security

• Exploitable agents

• Weak platform security

• Cloud app vulnerabilities

• Malware protection remains a

cat/mouse game

• BYOD/Mobility just another

consideration

http://www.flickr.com/photos/74571262@N08/6710953053/

Page 33: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Read our stuffRead our stuff• Blog

• http://securosis.com/blog

• Research

• http://nexus.securosis.com/

• http://securosis.com/research

• We publish (almost) everything for free

• Contribute. Make it better.

Page 34: 2014 Ultimate Buyers Guide to Endpoint Security Solutions

Mike RothmanSecurosis LLC

Mike RothmanSecurosis LLC

[email protected]

http://securosis.com/blog

Twitter: @securityincite