Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite
 

Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

on

  • 1,068 views

How can you effectively and cost-efficiently manage and secure your endpoints in today’s evolving IT environment? By managing endpoints throughout your entire lifecycle. It’s not simply about ...

How can you effectively and cost-efficiently manage and secure your endpoints in today’s evolving IT environment? By managing endpoints throughout your entire lifecycle. It’s not simply about adding new security layers – i.e. antivirus, patch management, configuration management, etc. – but how these capabilities work together without degrading endpoint performance and, subsequently, end-user and IT productivity.

In this Webcast, you will learn:

1. Strategies that enable IT operations and security to effectively break down the traditional silos to reduce IT risk and improve overall productivity;

2. How to centralize management and visibility of your entire endpoint environment – across physical and virtual machines, online and offline systems, and a variety of operating systems and applications;

3. How to ensure an effective, defense-in-depth security approach;

4. Key capabilities to look for in an endpoint management and security suite;

5. Cost benefits of consolidating best-of-breed endpoint operations and security technologies into one unified solution.

Featured Speakers
Mike Rothman - Analyst & President - Securosis
Paul Zimski - VP of Solution Strategy - Lumension
Salvatore Salamone - Executive Editor, Strategic Content - Ziff Davis Enterprise

Statistics

Views

Total Views
1,068
Views on SlideShare
1,068
Embed Views
0

Actions

Likes
0
Downloads
43
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • 49% of endpoint TCO is associated with security and operational management** Complex system managementDecreased endpoint performance and lack of scalability-Agent BloatCostly integration, and maintenance Limited visibility and collaboration
  • Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
  • “Over 90% of cyber attacks exploit known security flaws for which a remediation is available” GartnerAddress the Core Risk: (Patch & Configuration Management)Application vulnerabilitiesConfiguration driftStop Unwanted/Untrusted Change (Application Control)Stop all unknown/untrusted applications from executingGain visibility over endpoint application environmentCombine behavioral analysis of AV and application white list policy together for most effective zero day defenseProtect Against Insider Risk (Device Control)Physical entry of malwareAccidental or malicious data lossDevice visibilityDeploy a Broad Defense (Anti-Virus)Known and fast spreading malwareEfficient malware removableReduce Endpoint Complexity (Endpoint Management and Security Suite)Reduce malware incidents and related costsReduce systems integration and maintenance costsGain visibility across IT operations and security functionsCentralize policy management and reportingSimplified systems managementSocial networking applications were detected in 95% of organizations. **78% of Web 2.0 applications support file transfer.**2/3 of applications have known vulnerabilities.**28% of applications were known to propagate malware.**
  • Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
  • Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
  • Reduced complexity via an agile single console-single agent-single server architecture that can manage thousands of endpoints across online and offline states. Delivers best-of-breed modularly licensed, product capabilitiesUnifies IT operational and security workflows to enable greater control visibility, and more effective policy managementSimplified and real time systems, agent, and policy management within a single consoleCentralized reporting and logging to increase accuracy, reduce compliance burden, and enhance visibility

Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite Presentation Transcript

  • Stronger Security and IT Operational Excellence:How to Achieve Both from Your Endpoint Management and Security Suite
    Hosted by
  • Mike Rothman
    Analyst & President
    Securosis LLC
    http://securosis.com
  • *Any* Computing
    Connecting to critical information
    At any time
    From any where
    On any device
  • Defining the “Endpoint”
  • Over the past few years, lots of stuff has been added to endpoint agents:
    Anti-spyware
    HIPS
    Firewall
    Encryption
    10 lbs of **** in a 2 lb. bag
    Endpoint Agent Overload
  • Problem: Scale
    Attacks aplenty
    Millions of new malware samples
    Automated attack kits
    Financial motives brings new attackers
    The problem isn’t getting better
  • Problem: Effectiveness
    Detection rates on slippery downward slope
    Today’s attacks are not predictable
    Attacks target different exposures
    Web browsers
    Applications (XSS & CSRF)
  • Problem: Silos
  • Ah
    No.
    Are we more Secure?
  • It’s not working.
    So why are endpoint security suites still
    a multi-billion dollar business?
  • Oh crap! The Cloud is coming...
    What happens when data can be both internal/external?
    Perimeter? Buh Bye.
    Increases focus on the endpoint.
  • The Answer?
    Layered Defenses
    Fundamentals
    Management Leverage
  • Operating Systems
    Operating systems are getting more secure (relatively)
    Windows 7, Mac OS X
    Mobile OS lockdown and control (iOS vs. Android)
    But it’s still a lot of code and there will be problems
    Anti-Exploitation Techniques
    Data Execution Prevention (DEP)
    Address Space Layout Randomization (ASLR)
  • Endpoint Security Fundamentals
    Patch and Update
    Secure Configurations
    HIPS/file integrity monitoring
    System lockdown (standard user, GPO, white listing)
  • The Continuum of Integration
  • Visibility vs. Control
  • Summary
    Endpoint security is not dead, nor is it a panacea
    Agent technologies evolving
    Management silos hurt efficiency and effectiveness
    Defense in depth still critical
    Pay attention to the fundamentals
  • Mike Rothman
    Securosis LLC
    mrothman@securosis.com
    http://securosis.com
    Twitter: @securityincite
  • Paul ZimskiVP of Solution StrategyLumension
  • Challenges of Endpoint Management
    21
    IT Operations
    IT Security
    Lack of integration across technologies is the #1 IT security risk.*
    Challenges
    Challenges
    • Lack of Common Management Console
    • Increasing Agent Bloat
    • Increasing and costly back-end Integration
    • Lack of visibility and collaboration with IT security
    • Need for better accuracy
    • User access rights (Local Admin)
    • Lack of Scalability
    • Silos and insufficient collaboration between IT and business operations*
    *Worldwide State of The Endpoint Report 2009
  • Consolidate Your Endpoint Security Technologies
    • Multiple Consoles
    • 3-6 different management consoles on average
    • Agent Bloat
    • 3-10 agents* installed per endpoint
    • Decreased network performance
    • Lack of Control
    • 54% of IT security professionals cite managing the complexity of security as their #1 challenge
    • Decreasing visibility-disparate data
    • Ad-hoc monitoring of security posture
    • 43% of existing access rights were either excessive or should have been retired
    • Increasing TCO of Point Technologies
    • Integration & Maintenance
    Lumension Global State of The Worldwide Endpoint 2009
    22
  • New Approach to Endpoint Management & Security
  • Agile Architecture
    Best of BreedSolution Capability
    Modular Delivery
    The Lumension Approach
    24
  • Unified Management Console
    • Role-based workflows
    • Consolidated data
    • Intuitive web interface
    • Central control & visibility
    • Operational & strategic reporting
    • Improved productivity
    2009 Integration
    Endpoint Operations
    Endpoint Security
    Compliance
    25
    25
  • Modular Agent – Pluggable Enterprise Service Bus
    Single common agent delivers and manages many capabilities via pluggable services
    Provides single, integrated communication mechanism between the agent and the server
    Monitors and secures modules on the endpoint
    Patch and Remediation
    Event Queue
    Application Control
    Client Transport
    COMM
    Security
    26
    26
  • Lumension® Endpoint Management and Security Suite
    Single Endpoint Management solution on a unified platform
    Ease of management
    Feature extensibility via separately licensed modules
    Integrated endpoint security workflows
    Reduced management overhead
    Integrated console
    Centralized visibility and control
    Single agent architecture
    L.E.M.S.S. Platform
    Antivirus
    Application Control
    Patch & Remediation
    Power Management
    n Module
    27
    27
  • Effective and Operational IT Security
    Effective
    but not Efficient
    Effective
    AND Efficient
    Many Consoles
    IT Control Made Simple
    Single
    Console
    • Agile platform architecture
    • Leverage existing endpoint technology
    • Reduced integration and maintenance costs
    • Improved endpoint performance
    • More effective endpoint security
    Agile architecture
    Disparate Architecture
    Single Promotable Agent
    Many
    Agents
    28
  • Defense-in-Depth
    • Address the core IT risk with Patch & Configuration Management
    • Stop unwanted / un-trusted change with Application Control
    • Protect against insider risk with Device Control
    • Deploy a broad defensive perimeter with AntiVirus
    • Reduce endpoint complexity with a truly integrated Endpoint Management and Security Suite
    AntiVirus
    Device Control
    Device Control
    Application Control
    Application Control
    Patch & Config.
    Mgmt.
    29
  • Lumension Solution Strategy
    Endpoint Management & Security
    “By 2011, leading enterprise endpoint protection platform (EPP) and PC life cycle management (PCLM) vendors will offer mature integrated security and operations tools. IT organizations should understand the benefits of these tools and develop a strategy for adoption.”
    Peter Firstbrook
    Gartner Analyst 2009
    Endpoint Operations
    Endpoint
    Security
    Unified
    Platform
    30
  • Lumension® Endpoint Management and Security Suite
    Endpoint Operations Management
    Lumension® AntiVirus
    Lumension® Patch and Remediation
    Endpoint Security
    Endpoint Operations
    Lumension® Application Control
    Lumension® Configuration Mgmt.
    Lumension® Device Control
    Lumension® Power Management
    • Expanded visibility and control of endpoints - both online and offline
    • Heterogeneous O/S support
    • Linux (RHEL), Oracle Enterprise Linux, Microsoft, Mac
    • Largest 3rd party application vulnerability content support
    • Adobe, Microsoft, Apple and more
    • Power Management supports custom power policy definition and reporting
    • NIST-validated Configuration Management solution
    • Mandatory baseline import/export for efficient syndication of baseline polices
    31
  • Lumension® Endpoint Management and Security Suite
    Endpoint Security
    Lumension® AntiVirus
    Lumension® Patch and Remediation
    Endpoint Security
    Endpoint Operations
    Lumension® Application Control
    Lumension® Configuration Mgmt.
    Lumension® Device Control
    Lumension® Power Management
    • Granular policy-based whitelisting, blacklisting and device policy distribution
    • Comprehensive discovery of apps, online/offline machines and removable devices
    • Proactive protection against Zero-day threats
    • Effective malware removal to ensure cleaned system environments
    • Integrated workflow across multiple defense layers
    • Flexible Trust Engine for change mgmt. across processes, paths, users, vendors
    • Encryption to ensure secure data in the event of accidental or malicious data loss
    32
  • Lumension® Endpoint Management and Security Suite
    Total Endpoint Management
    Lumension® AntiVirus
    Lumension® Patch and Remediation
    Endpoint Security
    Endpoint Operations
    Lumension® Application Control
    Lumension® Configuration Mgmt.
    Lumension® Device Control
    Lumension® Power Management
    • Comprehensive solution suite that unifies IT operational and security functions
    • Delivers a more effective defense-in-depth endpoint security solution
    • Simplifies endpoint system and agent management through a single console
    • Centralizes policy management and reporting
    • Expands operational and security visibility
    • Reduces technology complexity and integration costs
    • Flexible and modularly licensed best-of-breed application modules
    • Scalable and agile single-agent, single-server platform architecture
    33
  • Q&A
  • Global Headquarters
    8660 East Hartford Drive
    Suite 300
    Scottsdale, AZ 85255
    1.888.725.7828
    info@lumension.com
  • Attendee Services
    • Download a copy of today’s presentation
    • Provide your feedback! Please complete our survey
    • View our calendar of upcoming events
    • A recorded version of this seminar will be available at www.eSeminarsLive.com
    Hosted by