Endpoint Security Fundamentals Part 2: Leveraging the Right Enforcement Controls

1,044 views
965 views

Published on

In this webcast, Mike Rothman, analyst with Securosis, examines:

1) How to automate the update and patch management process across applications and operating systems

2) How to define and enforce standardized and secure endpoint configurations

3) How to effectively layer your defense and the evolving role that application whitelisting plays

4) How to implement USB device control and encryption technologies to protect data

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,044
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Endpoint Security Fundamentals Part 2: Leveraging the Right Enforcement Controls

  1. 1. Endpoint Security Fundamentals: Part 2 Leveraging the Right Enforcement Controls
  2. 2. Today’s Speakers Mike Rothman Analyst and President Securosis, LLC Jeff Hughes Director, Solution Marketing Lumension
  3. 3. Endpoint Security Fundamentals
  4. 4. <ul><li>Exploits are out there, are you ready? </li></ul>http://www.flickr.com/photos/tnboriqua/522458474/
  5. 5. <ul><li>Reduce attack surface with savvy configs </li></ul>http://www.flickr.com/photos/aconaway/4148498461/
  6. 6. <ul><li>Do you need it? </li></ul><ul><li>Socially Engineered Malware </li></ul><ul><li>Reputation </li></ul>Anti-Malware
  7. 7. <ul><li>It works. </li></ul><ul><li>Is your organization ready? </li></ul>Application Whitelisting http://www.flickr.com/photos/brixton/4710698298/
  8. 8. <ul><li>USB Device Control </li></ul>http://www.flickr.com/photos/jayneandd/4450623309/ Moore’s Law is not your friend...
  9. 9. <ul><li>Users will be users (and lose things) </li></ul>Full Disk Encryption http://www.flickr.com/photos/itatton/773405871/
  10. 10. Summary <ul><li>There are lots of controls available to protect your endpoints </li></ul><ul><li>Patching and Secure Configuration deliver the biggest bang for the buck </li></ul><ul><li>White listing addresses weaknesses in anti-malware - but impacts user experience </li></ul><ul><li>USB Device Control and Full Disk Encryption are about keeping data where it belongs </li></ul>
  11. 11. <ul><li>[email_address] </li></ul><ul><li>http://securosis.com </li></ul><ul><li>Twitter: @ securityincite </li></ul>Securosis LLC Mike Rothman
  12. 12. Q&A
  13. 13. Resources and Tools <ul><li>Endpoint Security Fundamentals Resource Center </li></ul><ul><ul><li>http://www.lumension.com/Resources/eBooks/Endpoint-Security-Fundamentals.aspx </li></ul></ul><ul><li>Other Resources </li></ul><ul><ul><li>Podcasts, Videos, Webcasts </li></ul></ul><ul><ul><li>On-Demand Demos </li></ul></ul><ul><ul><li>Scanners </li></ul></ul><ul><li>Product Evaluations </li></ul><ul><ul><li>Virtual Environment </li></ul></ul><ul><ul><li>Full Software Download </li></ul></ul>
  14. 14. <ul><li>Global Headquarters </li></ul><ul><li>8660 East Hartford Drive </li></ul><ul><li>Suite 300 </li></ul><ul><li>Scottsdale, AZ 85255 </li></ul><ul><li>1.888.725.7828 </li></ul><ul><li>[email_address] </li></ul><ul><li>blog.lumension.com </li></ul>

×