Your SlideShare is downloading. ×
0
E is for Endpoint:How to Implement theVital Layers to ProtectYour Endpoints
Today’s Agenda             Current Threat Landscape             Back to Basics with Patch and Configuration Management    ...
Today’s Panelists     Eric Ogren          Paul Henry     Principal Analyst   Security & Forensics Analyst     Ogren Group3
The Malware Trend Continues…4
Not Simply A Microsoft Issue•Since 2009 the most hacked software was 3rd party apps and browser add-ons like Adobe and Qui...
All Hail The New Malware King – Java !6
Apple Also Got A Needed Dose Of Reality7
600,000 Infected Mac’s Globally8
BYOD – On Going Blind Adoption    • A recent survey     of Companies     with 2,000 or     more employees     indicated th...
… Your Plugging That In To My Network?                          Source: Juniper Mobile Threat Report10
E is for Endpoint Series 1: Think Different 2: Back to Basics With Patch and Configuration Management 3: How to Check Unkn...
Patch and Configuration Management
Eliminate Exploitable Surface Area                         Areas of Risk                        at the Endpoint           ...
Patch Management Back in Vogue • The top security priority is “patching   client-side software”1     » Streamline patch ma...
3rd Party Applications• Patch and defend is not just a  Microsoft issue     » More than 2/3 of today’s vulnerabilities com...
Application Control
Defining a Trusted Environment17
Stop Unwanted Applications     »Immediate and simple risk mitigation18
Application Whitelisting                                     Unauthorized                                           •Games...
Layered Approach to Endpoint Protection20      PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
More Information• Quantify Your IT Risk with Free              E is for Endpoint Webcast and  Scanners                    ...
Q&A
Global Headquarters8660 East Hartford DriveSuite 300Scottsdale, AZ 852551.888.725.7828info@lumension.comhttp://blog.lumens...
Upcoming SlideShare
Loading in...5
×

E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

446

Published on

IT security professionals rank third-party application vulnerabilities as the greatest security risk in 2012. Yet, malware continues to exploit these - and other - vulnerabilities to breach our defenses. Knowing how to bridge the gap between knowing the problem and finding a solution is critical to mitigate risks in your endpoint environment.

In this presentation, learn:
• What the vital layers of defense are for your endpoints.
• How to thwart exploitation of your endpoint OS, configuration and 3rd party application vulnerabilities.
• How to prevent unknown applications from executing on your systems.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
446
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints"

  1. 1. E is for Endpoint:How to Implement theVital Layers to ProtectYour Endpoints
  2. 2. Today’s Agenda Current Threat Landscape Back to Basics with Patch and Configuration Management Stopping Unknown Applications & Attacks Q&A
  3. 3. Today’s Panelists Eric Ogren Paul Henry Principal Analyst Security & Forensics Analyst Ogren Group3
  4. 4. The Malware Trend Continues…4
  5. 5. Not Simply A Microsoft Issue•Since 2009 the most hacked software was 3rd party apps and browser add-ons like Adobe and QuickTime.•Yet we focus our attention on patching Microsoft OS/Applications.5
  6. 6. All Hail The New Malware King – Java !6
  7. 7. Apple Also Got A Needed Dose Of Reality7
  8. 8. 600,000 Infected Mac’s Globally8
  9. 9. BYOD – On Going Blind Adoption • A recent survey of Companies with 2,000 or more employees indicated that 70% permitted BYOD yet less then 30% had policies to address device security9
  10. 10. … Your Plugging That In To My Network? Source: Juniper Mobile Threat Report10
  11. 11. E is for Endpoint Series 1: Think Different 2: Back to Basics With Patch and Configuration Management 3: How to Check Unknown Apps at the Door 4: Enabling the Self-Defending Endpoint 5: Secrets to Reducing Complexity and Cost 6: How to Continuously Manage Compliance and Risk11
  12. 12. Patch and Configuration Management
  13. 13. Eliminate Exploitable Surface Area Areas of Risk at the Endpoint 5% Zero-Day 30% Missing Patches 65% Misconfigurations Source: John Pescatore Vice President, Gartner Fellow13
  14. 14. Patch Management Back in Vogue • The top security priority is “patching client-side software”1 » Streamline patch management and reporting across OS’s AND applicationsSource:1 - SANS Institute14
  15. 15. 3rd Party Applications• Patch and defend is not just a Microsoft issue » More than 2/3 of today’s vulnerabilities come from non-Microsoft applications15
  16. 16. Application Control
  17. 17. Defining a Trusted Environment17
  18. 18. Stop Unwanted Applications »Immediate and simple risk mitigation18
  19. 19. Application Whitelisting Unauthorized •Games •iTunes •Shareware •Unlicensed S/W Known malware • Viruses • Worms • Trojans Authorized Unknown Malware • Zero day •Operating Systems • Targeted •Business Software • Keyloggers • Spyware •Productivity Software19 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  20. 20. Layered Approach to Endpoint Protection20 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  21. 21. More Information• Quantify Your IT Risk with Free E is for Endpoint Webcast and Scanners Whitepaper Series » http://www.lumension.com/special-offer/ premium-security-tools.aspx http://www.lumension.com/E-is-for-Endpoint.aspx• Lumension® Endpoint Management and Security Suite » Demo: http://www.lumension.com/endpoint- management-security-suite/demo.aspx » Evaluation: http://www.lumension.com/endpoint- management-security-suite/free-trial.aspx21
  22. 22. Q&A
  23. 23. Global Headquarters8660 East Hartford DriveSuite 300Scottsdale, AZ 852551.888.725.7828info@lumension.comhttp://blog.lumension.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×