Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management...
-
Upload
lumension -
Category
Technology
-
view
841 -
download
0
Transcript of Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management...
![Page 1: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/1.jpg)
Stronger Security and IT Operational Excellence:How to Achieve Both from Your Endpoint Management and Security Suite
Hosted by
![Page 3: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/3.jpg)
*Any* Computing*Any* Computing
• Connecting to critical information• At any time• From any where• On any device
![Page 4: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/4.jpg)
Defining the “Endpoint” Defining the “Endpoint”
![Page 5: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/5.jpg)
• Over the past few years, lots of stuff has
been added to endpoint agents:• Anti-spyware• HIPS• Firewall• Encryption
• 10 lbs of **** in a 2 lb. bag
Endpoint Agent OverloadEndpoint Agent Overload
![Page 6: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/6.jpg)
Problem: ScaleProblem: Scale• Attacks aplenty• Millions of new malware
samples• Automated attack kits
• Financial motives brings
new attackers
• The problem isn’t getting
better
![Page 7: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/7.jpg)
Problem: EffectivenessProblem: Effectiveness
• Detection rates on slippery downward slope
• Today’s attacks are not predictable
• Attacks target different exposures
• Web browsers
• Applications (XSS & CSRF)
![Page 8: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/8.jpg)
Problem: SilosProblem: Silos
![Page 9: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/9.jpg)
Ah No.
Are we more Secure?Are we more Secure?
![Page 10: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/10.jpg)
It’s not working.It’s not working.
So why are endpoint security suites still
a multi-billion dollar business?
![Page 11: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/11.jpg)
![Page 12: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/12.jpg)
Oh crap! The Cloud is coming...Oh crap! The Cloud is coming...
• What happens when data can be
both internal/external?
• Perimeter? Buh Bye.
• Increases focus on the endpoint.
![Page 13: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/13.jpg)
The Answer?The Answer?
• Layered Defenses
• Fundamentals
• Management Leverage
![Page 14: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/14.jpg)
Operating SystemsOperating Systems
• Operating systems are getting more secure (relatively)
• Windows 7, Mac OS X
• Mobile OS lockdown and control (iOS vs. Android)
• But it’s still a lot of code and there will be problems
• Anti-Exploitation Techniques
• Data Execution Prevention (DEP)
• Address Space Layout Randomization (ASLR)
![Page 15: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/15.jpg)
Endpoint Security FundamentalsEndpoint Security Fundamentals• Patch and Update
• Secure Configurations
• HIPS/file integrity
monitoring
• System lockdown
(standard user, GPO,
white listing)
![Page 16: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/16.jpg)
The Continuum of IntegrationThe Continuum of Integration
![Page 17: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/17.jpg)
Visibility vs. ControlVisibility vs. Control
![Page 18: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/18.jpg)
SummarySummary• Endpoint security is not dead, nor is it a panacea
• Agent technologies evolving
• Management silos hurt efficiency and effectiveness
• Defense in depth still critical
• Pay attention to the fundamentals
![Page 19: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/19.jpg)
Securosis LLCMike Rothman
http://securosis.com
Twitter: @securityincite
![Page 20: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/20.jpg)
Paul ZimskiVP of Solution Strategy
Lumension
![Page 21: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/21.jpg)
Challenges of Endpoint Management
21
IT Operations
Challenges
IT Security
» Lack of Common Management Console
» Increasing Agent Bloat
» Increasing and costly back-end Integration
» Lack of visibility and collaboration with IT security
Challenges» Need for better accuracy
» User access rights (Local Admin)
» Lack of Scalability
» Silos and insufficient collaboration between IT and business operations*
Lack of integration across technologies is the #1 IT security
risk.*
*Worldwide State of The Endpoint Report 2009
![Page 22: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/22.jpg)
Consolidate Your Endpoint Security Technologies
• Multiple Consoles• 3-6 different management consoles on average
• Agent Bloat• 3-10 agents* installed per endpoint• Decreased network performance
• Lack of Control• 54% of IT security professionals cite managing
the complexity of security as their #1 challenge• Decreasing visibility-disparate data• Ad-hoc monitoring of security posture
• 43% of existing access rights were either excessive or should have been retired
• Increasing TCO of Point Technologies• Integration & Maintenance
Lumension Global State of The Worldwide Endpoint 2009
22
![Page 23: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/23.jpg)
New Approach to Endpoint Management & Security
![Page 24: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/24.jpg)
Agile Architecture
Best of BreedSolution Capability
Modular Delivery
The Lumension Approach
24
![Page 25: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/25.jpg)
Unified Management Console
25
2009 Integration
Endpoint Operations
Endpoint Security
Compliance
» Role-based workflows
» Consolidated data
» Intuitive web interface
» Central control & visibility
» Operational & strategic reporting
» Improved productivity
25
![Page 26: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/26.jpg)
Modular Agent – Pluggable Enterprise Service Bus
•Single common agent delivers and manages many capabilities via pluggable services
•Provides single, integrated communication mechanism between the agent and the server
•Monitors and secures modules on the endpoint
26
Patch and Remediation
Application Control
Client Transport
SecurityCO
MM
Eve
nt Q
ueue
26
![Page 27: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/27.jpg)
Lumension® Endpoint Management and Security Suite
•Single Endpoint Management solution on a unified platform» Ease of management» Feature extensibility via separately licensed
modules» Integrated endpoint security workflows
•Reduced management overhead» Integrated console» Centralized visibility and control» Single agent architecture
27A
nti
viru
s
Ap
pli
cati
on
Co
ntr
ol
Pat
ch &
Rem
edia
tio
n
Po
wer
Man
agem
ent
n M
od
ule
L.E.M.S.S. Platform
27
![Page 28: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/28.jpg)
Effective and Operational IT Security
SingleConsole
Agile architecture
Single Promotable Agent
Many Consoles
Disparate Architecture
ManyAgents
IT Control Made Simple
• Agile platform architecture
• Leverage existing endpoint technology
• Reduced integration and maintenance costs
• Improved endpoint performance
• More effective endpoint security
Effective but not Efficient
Effective AND Efficient
28
![Page 29: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/29.jpg)
Defense-in-Depth
Patch & Config.Mgmt.
» Address the core IT risk with Patch & Configuration Management
» Stop unwanted / un-trusted change with Application Control
» Protect against insider risk with Device Control
» Deploy a broad defensive perimeter with AntiVirus
» Reduce endpoint complexity with a truly integrated Endpoint Management and Security Suite
29
![Page 30: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/30.jpg)
Lumension Solution Strategy
Endpoint Security
Endpoint Operations
Unified Platform
Endpoint Management & Security
“By 2011, leading enterprise endpoint protection platform (EPP) and PC life cycle management (PCLM) vendors will offer mature integrated security and operations tools. IT organizations should understand the benefits of these tools and develop a strategy for adoption.”
Peter FirstbrookGartner Analyst 2009
30
![Page 31: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/31.jpg)
Lumension® Endpoint Management and Security Suite
• Expanded visibility and control of endpoints - both online and offline
• Heterogeneous O/S support
» Linux (RHEL), Oracle Enterprise Linux, Microsoft, Mac
• Largest 3rd party application vulnerability content support
» Adobe, Microsoft, Apple and more
• Power Management supports custom power policy definition and reporting
• NIST-validated Configuration Management solution
• Mandatory baseline import/export for efficient syndication of baseline polices
Endpoint
Security
End
poin
t O
pera
tions
Endpoint Operations
ManagementLumension® AntiVirus
Lumension® Application Control
Lumension® Device Control
Lumension® Patch and Remediation
Lumension® Configuration Mgmt.
Lumension® Power Management
31
![Page 32: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/32.jpg)
Lumension® Endpoint Management and Security Suite
• Granular policy-based whitelisting, blacklisting and device policy distribution
• Comprehensive discovery of apps, online/offline machines and removable devices
• Proactive protection against Zero-day threats
• Effective malware removal to ensure cleaned system environments
• Integrated workflow across multiple defense layers
• Flexible Trust Engine for change mgmt. across processes, paths, users, vendors
• Encryption to ensure secure data in the event of accidental or malicious data loss
Endpoint
Security
End
poin
t O
pera
tions
Endpoint Security
Lumension® AntiVirus
Lumension® Application Control
Lumension® Device Control
Lumension® Patch and Remediation
Lumension® Configuration Mgmt.
Lumension® Power Management
32
![Page 33: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/33.jpg)
Endpoint
Security
End
poin
t O
pera
tions
Lumension® Endpoint Management and Security Suite
Total Endpoint Management
• Comprehensive solution suite that unifies IT operational and security functions• Delivers a more effective defense-in-depth endpoint security solution• Simplifies endpoint system and agent management through a single console• Centralizes policy management and reporting• Expands operational and security visibility• Reduces technology complexity and integration costs• Flexible and modularly licensed best-of-breed application modules• Scalable and agile single-agent, single-server platform architecture
Lumension® AntiVirus
Lumension® Application Control
Lumension® Device Control
Lumension® Patch and Remediation
Lumension® Configuration Mgmt.
Lumension® Power Management
33
![Page 34: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/34.jpg)
Q&A
![Page 35: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/35.jpg)
Global Headquarters8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255
1.888.725.7828
![Page 36: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite](https://reader030.fdocuments.in/reader030/viewer/2022032514/55d51c63bb61eba1228b4770/html5/thumbnails/36.jpg)
Attendee Services
• Download a copy of today’s presentation
• Provide your feedback! Please complete our survey
• View our calendar of upcoming events
• A recorded version of this seminar will be available at www.eSeminarsLive.com
Hosted by