E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints
-
Upload
lumension -
Category
Technology
-
view
443 -
download
1
description
Transcript of E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints
![Page 1: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/1.jpg)
E is for Endpoint: How to Implement the Vital Layers to Protect Your Endpoints
![Page 2: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/2.jpg)
Today’s Agenda
Current Threat Landscape
Back to Basics with Patch and Configuration Management
Stopping Unknown Applications & Attacks
Q&A
![Page 3: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/3.jpg)
Today’s Panelists
3
Eric OgrenPrincipal AnalystOgren Group
Paul HenrySecurity & Forensics Analyst
![Page 4: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/4.jpg)
4
The Malware Trend Continues…
![Page 5: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/5.jpg)
5
Not Simply A Microsoft Issue
•Since 2009 the most hacked software was 3rd party apps and browser add-ons like Adobe and QuickTime.
•Yet we focus our attention on patching Microsoft OS/Applications.
![Page 6: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/6.jpg)
6
All Hail The New Malware King – Java !
![Page 7: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/7.jpg)
7
Apple Also Got A Needed Dose Of Reality
![Page 8: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/8.jpg)
8
600,000 Infected Mac’s Globally
![Page 9: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/9.jpg)
9
BYOD – On Going Blind Adoption
• A recent survey of Companies with 2,000 or more employees indicated that 70% permitted BYOD yet less then 30% had policies to address device security
![Page 10: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/10.jpg)
10
… Your Plugging That In To My Network?
Source: Juniper Mobile Threat Report
![Page 11: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/11.jpg)
E is for Endpoint Series
11
1: Think Different 2: Back to Basics With Patch and Configuration Management 3: How to Check Unknown Apps at the Door 4: Enabling the Self-Defending Endpoint 5: Secrets to Reducing Complexity and Cost 6: How to Continuously Manage Compliance and Risk
![Page 12: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/12.jpg)
Patch and Configuration Management
![Page 13: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/13.jpg)
Eliminate Exploitable Surface Area
Source: John Pescatore Vice President, Gartner Fellow
30% Missing Patches
Areas of Risk at the Endpoint
65% Misconfigurations
5% Zero-Day
13
![Page 14: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/14.jpg)
Patch Management Back in Vogue
Source:
1 - SANS Institute
14
•The top security priority is “patching client-side software”1
» Streamline patch management and reporting across OS’s AND applications
![Page 15: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/15.jpg)
3rd Party Applications
15
•Patch and defend is not just a Microsoft issue
» More than 2/3 of today’s vulnerabilities come from non-Microsoft applications
![Page 16: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/16.jpg)
Application Control
![Page 17: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/17.jpg)
Defining a Trusted Environment
17
![Page 18: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/18.jpg)
Stop Unwanted Applications
»Immediate and simple risk mitigation
18
![Page 19: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/19.jpg)
Application Whitelisting
19
Authorized• Operating Systems• Business Software
• Productivity Software
Known malware• Viruses• Worms• Trojans
Unauthorized• Games• iTunes
• Shareware• Unlicensed S/W
Unknown Malware• Zero day• Targeted• Keyloggers• Spyware
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
![Page 20: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/20.jpg)
Layered Approach to Endpoint Protection
20PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
![Page 21: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/21.jpg)
More Information
• Quantify Your IT Risk with Free Scanners» http://www.lumension.com/special-offer/
premium-security-tools.aspx
• Lumension® Endpoint Management and Security Suite» Demo:
http://www.lumension.com/endpoint-management-security-suite/demo.aspx
» Evaluation: http://www.lumension.com/endpoint-management-security-suite/free-trial.aspx
E is for Endpoint Webcast and Whitepaper Series
http://www.lumension.com/E-is-for-Endpoint.aspx
21
![Page 22: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/22.jpg)
Q&A
![Page 23: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints](https://reader035.fdocuments.in/reader035/viewer/2022081404/55757670d8b42adb7e8b4805/html5/thumbnails/23.jpg)
Global Headquarters8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255
1.888.725.7828
http://blog.lumension.com