Practical Steps to Managing and Integrating Endpoint Security
-
Upload
lumension -
Category
Technology
-
view
670 -
download
1
description
Transcript of Practical Steps to Managing and Integrating Endpoint Security
Practical Steps For Integrating and Managing Endpoint Security
Made possible by:
© 2011 Monterey Technology Group Inc.
Brought to you by
Speakers:Russ Ernst, Group Product ManagerAndrea Hilwig, Product Marketing Manager
http://www.lumension.com/endpoint-management-security-suite.aspx
Preview of Key Points
Categorizing endpoint security risksIdentifying endpoint security technologiesMapping risks to technologies and
prioritizingAssessing Integration in Integrated
Security Suites
© 2011 Monterey Technology Group Inc.
Categorizing endpoint security risks
MalwareMalicious ContentMisbehaved UserInbound Network PenetrationNetwork Data LeakagePhysical Data LossPhysical Data Leakage
Identifying endpoint security technologies and countermeasures
PatchingAVFirewallWhitelistingLeast Privilege ConfigurationDevice ControlEncryptionEnd-user Security Awareness Training
Mapping risks to technologiesand prioritizing
Technologies
Patching AV FirewallWhite-listing
Device Control
Harddisk Encryption
Least Privilege
Training
Risks
Malware ● ● ● ● ●
Malicious Content ● ● ● ● ●
Physical Data Loss ● ● ●
Physical Data Leakage ● ● ● ●
Inbound Network Penetration
● ●
Misbehaved User ● ● ● ● ●
Network Data Leakage ● ● ● ● ●
The need for integration and consolidation in endpoint security
Too many management interfacesToo many agents…
Prioritizing
What combination of technologies best address your core risks?
Which risks do you feel like you may need a best of breed point solution?
Endpoint security suites
No suite does it allWhich one best covers your core risks?
Everyone claims integration but close examination neededAgentUIWindows and non-Windows Integration with Active Directory to leverage
organization and policy informationSilos within the productSingle pane of glass
Endpoint security suites
Additional issuesCentralized patch management for multiple software vendors and platforms
Scalability in terms of endpoint quantity and granularity or different endpoint types and profiles
Visibility into endpoint discovery, agent status and operation
Wake On LAN capability to coordinate system security maintenance with power management and green initiatives
Bottom Line
Endpoint security is a many headed beastRequires a coordinated, planned and strategic
approachAvoid deploying point solutions to address this
week’s security scareThe right suite covers your core risks, your
core platforms and provides real integration
© 2011 Monterey Technology Group Inc.
Brought to you by
Speakers:Russ Ernst, Group Product ManagerAndrea Hilwig, Product Marketing Manager
http://www.lumension.com/endpoint-management-security-suite.aspx