Practical Steps to Managing and Integrating Endpoint Security

12
Practical Steps For Integrating and Managing Endpoint Security Made possible by: © 2011 Monterey Technology Group Inc.

description

Randy Franklin Smith, from Ultimate Windows Security.com, discusses the range of endpoint security threats and the need for: * Integration and consolidated management for core endpoint security technologies * Centralized patch management for multiple software vendors and platforms * Scalability in terms of endpoint quantity and granularity or different endpoint types and profiles * Integration with Active Directory to leverage organization and policy information * Visibility into endpoint discovery, agent status and operation * Wake On LAN capability to coordinate system security maintenance with power management and green initiatives

Transcript of Practical Steps to Managing and Integrating Endpoint Security

Page 1: Practical Steps to Managing and Integrating Endpoint Security

Practical Steps For Integrating and Managing Endpoint Security

Made possible by:

© 2011 Monterey Technology Group Inc.

Page 2: Practical Steps to Managing and Integrating Endpoint Security

Brought to you by

Speakers:Russ Ernst, Group Product ManagerAndrea Hilwig, Product Marketing Manager

http://www.lumension.com/endpoint-management-security-suite.aspx

Page 3: Practical Steps to Managing and Integrating Endpoint Security

Preview of Key Points

Categorizing endpoint security risksIdentifying endpoint security technologiesMapping risks to technologies and

prioritizingAssessing Integration in Integrated

Security Suites

© 2011 Monterey Technology Group Inc.

Page 4: Practical Steps to Managing and Integrating Endpoint Security

Categorizing endpoint security risks

MalwareMalicious ContentMisbehaved UserInbound Network PenetrationNetwork Data LeakagePhysical Data LossPhysical Data Leakage

Page 5: Practical Steps to Managing and Integrating Endpoint Security

Identifying endpoint security technologies and countermeasures

PatchingAVFirewallWhitelistingLeast Privilege ConfigurationDevice ControlEncryptionEnd-user Security Awareness Training

Page 6: Practical Steps to Managing and Integrating Endpoint Security

Mapping risks to technologiesand prioritizing

Technologies

Patching AV FirewallWhite-listing

Device Control

Harddisk Encryption

Least Privilege

Training

Risks

Malware ● ● ● ● ●

Malicious Content ● ● ● ● ●

Physical Data Loss ● ● ●

Physical Data Leakage ● ● ● ●

Inbound Network Penetration

● ●

Misbehaved User ● ● ● ● ●

Network Data Leakage ● ● ● ● ●

Page 7: Practical Steps to Managing and Integrating Endpoint Security

The need for integration and consolidation in endpoint security

Too many management interfacesToo many agents…

Page 8: Practical Steps to Managing and Integrating Endpoint Security

Prioritizing

What combination of technologies best address your core risks?

Which risks do you feel like you may need a best of breed point solution?

Page 9: Practical Steps to Managing and Integrating Endpoint Security

Endpoint security suites

No suite does it allWhich one best covers your core risks?

Everyone claims integration but close examination neededAgentUIWindows and non-Windows Integration with Active Directory to leverage

organization and policy informationSilos within the productSingle pane of glass

Page 10: Practical Steps to Managing and Integrating Endpoint Security

Endpoint security suites

Additional issuesCentralized patch management for multiple software vendors and platforms

Scalability in terms of endpoint quantity and granularity or different endpoint types and profiles

Visibility into endpoint discovery, agent status and operation

Wake On LAN capability to coordinate system security maintenance with power management and green initiatives

Page 11: Practical Steps to Managing and Integrating Endpoint Security

Bottom Line

Endpoint security is a many headed beastRequires a coordinated, planned and strategic

approachAvoid deploying point solutions to address this

week’s security scareThe right suite covers your core risks, your

core platforms and provides real integration

© 2011 Monterey Technology Group Inc.

Page 12: Practical Steps to Managing and Integrating Endpoint Security

Brought to you by

Speakers:Russ Ernst, Group Product ManagerAndrea Hilwig, Product Marketing Manager

http://www.lumension.com/endpoint-management-security-suite.aspx