Real World Defense Strategies for Targeted Endpoint Threats
-
Upload
lumension -
Category
Technology
-
view
213 -
download
3
description
Transcript of Real World Defense Strategies for Targeted Endpoint Threats
![Page 1: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/1.jpg)
Sponsored byReal World Defense
Strategies for Targeted Endpoint Threats
© 2013 Monterey Technology Group Inc.
![Page 2: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/2.jpg)
Thanks to
© 2013 Monterey Technology Group Inc.
www.Lumension.com
Paul Zimski
![Page 3: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/3.jpg)
Preview of Key Points
Phases of a targeted attack
How to disrupt, hinder, detect and prevent attackers at each phase
Endpoint security best practices Endpoint management processes Hardening steps Monitoring techniques Endpoint security technologies
Discover
Distribute
Exploit
Control
Execute
![Page 4: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/4.jpg)
Discover
What it is Reconnaissance Casing the joint
How to fight it Human Difficult
![Page 5: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/5.jpg)
Distribute
What it is Package Deliver the payload
How to fight it Web
Content scanning Website reputation
Email Scanning Filtering Training
Device control
![Page 6: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/6.jpg)
Exploit
What it is Trigger the payload Exploit the vulnerability
How to fight it Configuration control
Attack surface reduction Fast patching Application control
Whitelisting Memory protection Anti-malware
![Page 7: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/7.jpg)
Control
What it is Install persistent malware on system Connect back to command & control
How to fight it Application control
Whitelisting Anti-malware Configuration control Network egress scanning
![Page 8: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/8.jpg)
Execute
What it is Spread-out Begin taking action against planned objectives
How to fight it Application control
Whitelisting Anti-malware Configuration control Network egress scanning Host monitoring
New EXEs New accounts Suspicious access patterns to critical information
![Page 9: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/9.jpg)
Bottom line
Fight them every step of the way Defense-in-depth
Endpoint security is a many headed beast So many risk vectors So many security technologies
Integration between endp0int security techn0logies One agent One console
![Page 10: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/10.jpg)
18
Defense-in-Depth with Lumension
Click to edit Master title style
Physical Access
Por
t / D
evic
e C
ontr
ol a
nd E
ncry
ptio
n
Full DiskEncryption
Fire
wal
l Man
agem
ent
Pat
ch a
nd C
onfig
urat
ion
Man
agem
ent
Ant
i-Mal
war
e
NetworkAccess
Sponsored by
![Page 11: Real World Defense Strategies for Targeted Endpoint Threats](https://reader036.fdocuments.in/reader036/viewer/2022081603/55757631d8b42adb7e8b47d9/html5/thumbnails/11.jpg)
Sponsored by
• Free Security Scanner Tools» Vulnerability Scanner – discover
all OS and application vulnerabilities on your network
» Application Scanner – discover all the apps being used in your network
» Device Scanner – discover all the devices being used in your network
http://www.lumension.com/Resources/Security-Tools.aspx
• Lumension® Endpoint Management and Security Suite» Online Demo Video:
http://www.lumension.com/Resources/Demo-Center/Vulnerability-Management.aspx
» Free Trial (virtual or download):http://www.lumension.com/endpoint-management-security-suite/free-trial.aspx
• Get a Quote (and more)http://www.lumension.com/endpoint-management-security-suite/buy-now.aspx#2
11