Your SlideShare is downloading. ×
Lumension Security Solutions
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Lumension Security Solutions


Published on

Lumension Security Vulnerability Management, Endpoint and Data Protection Brief.

Lumension Security Vulnerability Management, Endpoint and Data Protection Brief.

Published in: Technology, Business

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide
  • Transcript

    • 1. Lumension Security Solutions
    • 2. Optimal Security Solutions Optimal Security Proactive Risk Management and Operational and Security Security & Compliance Reporting Endpoint Protection Vulnerability Management Data Protection Best Practices Open Standards Integrated Platform Flexible Architecture
    • 3. Lumension Solutions
      • Vulnerability Management
      • Endpoint Protection
      • Data Protection
      • Security & Compliance Reporting
    • 4. Effectiveness - Risk Reduction and Threat Elimination Vulnerability Management Removes risk from technology Endpoint Protection Filters threats from technology IT Operations:
        • IT Security
        • The Endpoint
      Reduces attackable “surface area” Stops attacks Optimal Security Optimised security Lower support burdens Increased user productivity Lower TCO
    • 5. Vulnerability Management Solution
    • 6. Lumension Security Vulnerability Management Suite
      • Discover
        • Discover all network assets
      • Assess
        • Vulnerability and configuration assessment
        • Network + agent-based scanners with integrated view
      • Prioritise
        • Prioritise threats and mitigation actions
      • Remediate
        • Deploy Security patches
        • Mitigate risk with custom remediations
      • Report
        • Numerous reporting options
        • Reporting across entire Enterprise Network
      Lumension Security Vulnerability Management Suite is a process-driven solution:
    • 7. In-Depth Discovery
      • Provides visibility to the entire network environment to discover all assets, both managed and unmanaged
      • In-depth scans of heterogeneous networks to discover all computing assets
      • Flexible grouping and classification
      • Discover silent or hidden network nodes, even if not currently managed by agents
    • 8.
      • Assess against Lumension’s large pre-built vulnerability and configuration repositories as well as customized vulnerability policies.
      • Agent & agent-less assessment options provide complete enterprise visibility
      • Credentialed-based scanner performs deep analysis of endpoints to accurately discover & determine vulnerabilities without impacting production environments or network assets
      Thorough Assessment
      • Assess OS, Application, and Security Configuration vulnerabilities that exist within the network environment to proactively identify and prioritise known issues before they can be exploited
    • 9. Detailed Prioritisation
      • Multiple views of vulnerabilities grouped by vulnerability specifics or by computing assets (machines).
      • Prioritise vulnerability assessment information by vulnerability severity and/or organisational impact.
    • 10. Intelligent Patch & Remediation
      • Agent-based patch & remediation tool simplifies the process of maintaining a secure environment by continuously monitoring, detecting and remediating policy-driven environments
      • Automatically and quickly deploys patches to an entire network across many different platforms (e.g. Windows, Linux, Unix, Mac) and across applications (e.g. Adobe, WinZip, Real Networks)
      • Lumension Vulnerability Management provides fully integrated agent-based remediation capabilities in heterogeneous environments.
    • 11. Comprehensive Reporting
      • Single and consolidated management console provides a holistic view of environmental risk
      • Composite Reports combine the discovery and assessment information from both network and agent-based scanners to provide a more complete view of the environment
      • Role-based administration provides tailored information to the appropriate audiences.
      • Full range of operational and management reports
    • 12. Benefits
      • Discover, assess, prioritise, remediate & report on the entire network environment from one solution.
      • Complete enterprise visibility and effective vulnerability assessment via network and agent-based scanners.
      • Single solution to patch and remediate a heterogeneous network with our scalable remediation tools and various deployment options.
      • Comprehensive and policy-based reporting capabilities for business analysis and compliance.
    • 13. Endpoint Protection Solution
    • 14. Lumension Security Endpoint Protection white grey black Trusted applications that serve a business purpose and are supported by the organisation Unwanted applications that are not condoned by the organisation. These can be explicitly added to the black or automatically if not in grey or white.
      • Extended trust based on context:
      • Process
      • Publisher
      • Path
      • Person
    • 15. Lumension Security Endpoint Protection Solution
      • Malware and threat protection without signature updates or behavioral technologies
      • Authorises only trusted applications that serve a legitimate business need
      • Lowers helpdesk burden and operational TCO by enforcing supported software and eliminating system conflicts
      • Increases end-user productivity by preventing non-business applications from being installed
    • 16. Data Protection Solution
    • 17. Lumension Security Data Protection Solution Protects data from theft or loss
      • Controls the flow of data to devices (inbound and outbound data including port access)
      • Encrypts data (moved onto removable devices)
      • Detailed forensics and auditing (of data moved to / from a device)
      • Enables Compliance (Data Protection Regulations and Standards)
      Device Control Integrated PGP Whole Disk Encryption
    • 18. Security & Compliance Reporting
    • 19. Security & Compliance Reporting
      • Measure and Ensure Network Security
      • Demonstrate Compliance to Security Policies and Regulations
      • Use or Extend Over Two-Dozen Sample Reports
      • Easily Create and Share Custom Reports
      • Open Reporting Schema Works With Existing Reporting Tools
      Consolidated Analysis and Reporting of all Enterprise Vulnerability Management Information