Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement Today

776 views

Published on

With the availability of Lumension® Endpoint Management and Security Suite (L.E.M.S.S.) v7.2 just around the corner, it’s time to take a deep dive into the new capabilities available for your organization implement to improve your IT risk and systems management.
Learn the Top 11 NEW capabilities in L.E.M.S.S. and how you can effectively implement and take advantage of these capabilities in L.E.M.S.S. – both existing and new in v7.2 – to improve your security by leveraging modules and add-ons within LEMSS.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
776
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement Today

  1. 1. Effectively UtilizingL.E.M.S.S.Top 11 SecurityCapabilities You CanImplement Today
  2. 2. Today’s Speakers Chris Merritt Kevin Garnier Solution Marketing Sales Engineering and Lumension Professional Services Lumension2
  3. 3. Traditional Defenses Don’t Always WorkTraditional Technical IT Defenses• Antivirus• Patching Microsoft OS and Apps• Gateway Firewalls• Strong Passwords If They Did, We Wouldn’t Have IT Security Breaches!3
  4. 4. Where Traditional Defenses Fall Short Gaps in Technical IT Defenses • Risk from Unpatched 3rd Party Apps • Preventing Zero-Day Attacks and Targeted Malware • Controlling “Local Admins Gone Wild” • Actionable Reporting and Security Measurement4
  5. 5. 5 Access Firewall Management Network Anti-Malware Application Control / Whitelisting Full Disk Encryption New Defense-in-Depth Approach Port / Device Control Access Physical
  6. 6. 11 Low-Cost Security Capabilities You Can Implement Today
  7. 7. 1 – Leverage the Platform Lumension® Endpoint Management and Security Suite Discovery & Agent Deployment Enhanced Wake on LAN Role Based Access Control Active Directory Synchronization HW/SW Inventory Assessment Centralized Reporting Scalable | Modular Extensible Agent | Modular Products | SecurePatch & Remediation Application Control AntiVirus Device Control• Heterogeneous • Whitelisting with • Comprehensive • Control Removable Platform Support Reputation Service Malware Signature Devices rd• Broadest 3 Party • Simplified Whitelist Database • Enforced Encryption Vulnerability Content and Policy Creation • Variant and Exploit for Removable• Automated Baselines • Automated “Trust Detection Storage and Advanced Patch Engine” Whitelist • Sandbox Analysis • Filename Tracking• Deployment and Maintenance • Run-time Scanning & Full File Reboot Control • Deny Unwanted Shadowing Audits • CPU Throttling Applications7
  8. 8. 2 – Improve Patch CoverageExpanded Microsoft Windows content Available MS Content» Targeting non-Security updates to platforms and applicationsNew process for generating and releasingMicrosoft content» Support uninstall for Windows content when supported by Microsoft» Support automated superseding and aging of Microsoft Windows contentFaster release of Patch Tuesday content Support for more non-security patches» Built when Windows Update receives » Eliminates the need to build as content, not when MBSA is updated many non-security patches via standard contentOptimized content delivery» Improved detection times on WinXP Over 1000 new non-security bulletins and Win2003 added to the content repository8
  9. 9. 3 – Streamline Patch ProcessLeverage endpoint agent status to home in on priority tasksFeature Sort by Agent Status Icon» Ability to sort endpoints by statusBenefits» Allows admin to easily sort and select machines by patch status» Easily select machines in “Dirty C” or “Dirty R” state for rebooting» Streamlines reboot process to save admin time / effort9
  10. 10. 4 – Centrally Manage Power Usage Step 1: Step 2: Step 3: Step 4: Set Your Manage Your Audit Your Qualify for a Power Policy Endpoints Savings Rebate Define and Secure / Audit and Report on Qualify for a distribute power manage your your PCs and qualify rebate with your policies for your systems for a power local power systems company rebate company “Turn OFF your “Turn ON your “Audit Your Power “Apply for a PCs” PCs” Savings” Rebate”10
  11. 11. 5 – Enforce Windows Security SettingsSimple wizard-based policy creationand baseline enforcement – withoutrequiring additional tools:» Patch Creation» Software Installs and Uninstalls» Windows Security Policies» Power Management Policies» NEW! Windows Firewall Policies11
  12. 12. 6 – Incorporate Add’l Defenses Known Unknown Unwanted, Application Configuration Malware Malware Unlicensed, Vulnerabilities Vulnerabilities Unsupported Applications AntiVirus X X Application Control X X Patch & Remediation X X SecurityConfiguration XManagement12
  13. 13. 7 – Augment Local App Knowledge Workflow 1. Hashes sent to EIS Lumension 2. EIS returns verification rating for Endpoint known files Integrity Service 3. App Library displays rating in verification column 4. Dashboard widget updated 1 2 Trust Rating » Confidence level that file is what it claims to be • High/Medium/Low • Unknown / Not Assessed Benefits » Reduces App Library management overhead • Use verification rating to make authorization/grouping decisions • Additional features to further simplify the task of App Library management » Select all across multiple pages 3 4 » Drag & Drop » Authorize/Deny from Library13
  14. 14. 8 – Introduce “Denied Apps” Policy Eliminate unknown or unwanted applications on your endpoints User Endpoint ViewAdmin Console ViewPrevent applications from executingeven while endpoints are in monitormode only14
  15. 15. 9 – Maintain Flexible Security Effectively Balance Security and Productivity • End user flexibility • “Third Way” between Monitor and LockdownAdmin Console View User Endpoint View15
  16. 16. 10 – Protect Against Physical Infiltration16
  17. 17. 11 – Introduce Reporting Transparency Enhanced Reporting » Graphical » Dynamic » Customizable » Flexible » Interactive » Secure » Schedulable » Instantaneous“I no longer have to wait for a report. I canget the information I need immediately.”Lumension Customer17
  18. 18. 12 – Encrypt HDs / Removable Storage18
  19. 19. Q&A
  20. 20. More Information• Free Security Scanner Tools • Get a Quote (and more) » Application Scanner – discover all the apps http://www.lumension.com/ being used in your network intelligent-whitelisting/buy-now.aspx#7 » Vulnerability Scanner – discover all OS and application vulnerabilities on your network » Device Scanner – discover all the devices being used in your network http://www.lumension.com/Resources/ Security-Tools.aspx• Lumension® Intelligent Whitelisting™ » Online Demo Video: http://www.lumension.com/Resources/ Demo-Center/Endpoint-Security.aspx » Free Trial (virtual or download): http://www.lumension.com/ intelligent-whitelisting/free-trial.aspxFor in-depth technical discussion …• kevin.garnier@lumension.com• chris.merritt@lumension.com20
  21. 21. Global Headquarters8660 East Hartford DriveSuite 300Scottsdale, AZ 852551.888.725.7828info@lumension.com

×