• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 

Securing Your Endpoints Using Novell ZENworks Endpoint Security Management

on

  • 1,406 views

Endpoint security is one of the greatest concerns on the minds of senior management today. Protecting your data and controlling how systems access resources is of the utmost importance. You must take ...

Endpoint security is one of the greatest concerns on the minds of senior management today. Protecting your data and controlling how systems access resources is of the utmost importance. You must take actions to protect your infrastructure while ensuring your employees can continue to perform their jobs effectively and efficiently. Come to this session to learn how you can leverage the power of Novell ZENworks Endpoint Security Management across your enterprise to achieve this delicate balance—so you and the rest of your organization can sleep at night.

Statistics

Views

Total Views
1,406
Views on SlideShare
1,401
Embed Views
5

Actions

Likes
0
Downloads
56
Comments
0

1 Embed 5

http://www.slideshare.net 5

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Securing Your Endpoints Using Novell ZENworks Endpoint Security Management Securing Your Endpoints Using Novell ZENworks Endpoint Security Management Presentation Transcript

    • Securing Your Endpoints Using Novell ZENworks ® ® Endpoint Security Management Pete Green Scott Guscar Technical Specialist - ZENworks Technology Sales Specialist Novell, Inc./pegreen@novell.com Novell, Inc./sguscar@novell.com
    • Agenda • Economic Effects on Security • Compliance • High Profile Breaches • DLP/ILP • “Yes. Endpoints are Outsiders.” • ZENworks Endpoint Security Features ® • Demonstration • Questions and Answers 2 © Novell, Inc. All rights reserved.
    • Economic Effects on IT Security 2010
    • Economic Effects on IT Security 2010 4 © Novell, Inc. All rights reserved.
    • Economic Effects on IT Security 2010 (cont.) Threats Information Security Budgets C h a n g e Upturn Downturn Upturn Time 5 © Novell, Inc. All rights reserved.
    • Compliance 2010
    • Compliance 2010 • PCI Focus • Legal picture of PCI is • SAS-70 very bleak and very real • ISO 27002 • Who is minding the legal risk? – Instead of focusing on detail of PCI-DSS, adopt ISO • Negligence is no excuse 27002 for holistic security T.J. Hooper as precedent “Radio is new technology. We can’t be expected to have radio on our cargo ships!” There are precautions so imperative that even their universal disregard will not excuse their omission. The T.J.Hooper 60 F.2d 737 (2nd cir), cert. denied, 287 U.S. 662 (1932). 7 © Novell, Inc. All rights reserved.
    • High Profile Breaches
    • High Profile Breaches Source: Privacy Rights Clearinghouse 9 © Novell, Inc. All rights reserved.
    • DLP/ILP
    • DLP 2010 • Data Leakage Prevention • Data Loss Prevention • Data Loss Protection • Information Leak Prevention • Information Loss Prevention DLP Calculator - http://www.tech-404.com/calculator.html • Information Loss Protection 11 © Novell, Inc. All rights reserved.
    • DLP 2010 (cont.) Endpoint Network/E-mail Appps/DB FS/CMS Storage LAN Internal Enterprise Production Employee Applications Database File Server Disk Arrays Backup Tape WAN Remote VPN Disk Arrays Backup Systems Employee Business Replica File Server Analytics Disk Arrays Backup Disk Partners Collaboration and Outsourced Staging Content Mgmt. Dev. Systems Endpoint Network/E-mail Appps/DB FS/CMS Storage 12 © Novell, Inc. All rights reserved.
    • DLP 2010 (cont.) Endpoint Network/E-mail Appps/DB FS/CMS Storage LAN Network Leak Endpoint Priviledge User Priviledge User Tapes lost or Internal Email-IM- HTTP- EnterpriseBreachProduction theft/loss FileBreach Server stolen Employee FTP-etc. Applications Database Disk Arrays Backup Tape WAN Remote VPN Disk Arrays Backup Systems Endpoint Leak Email leak or BusinessApps. DB or Replica File Server Employee File Server/CMS Via print/copy Packets sniffed Encryption Key Analytics Hack In transit Hack Disk Arrays Backup Disk Partners Public Collaboration and (Semi) IP Sent to Infrastructure Outsourced Staging Unintentional Content User Trusted Mgmt. Discarded disk non trusted user Dev. Distribution Systems exploited Access Hack Misuse Endpoint Network/E-mail Appps/DB FS/CMS Storage 13 © Novell, Inc. All rights reserved.
    • DLP 2010 (cont.) Endpoint Network/E-mail Appps/DB FS/CMS Storage LAN Network Leak Endpoint Priviledge User Priviledge User Tapes lost or Internal Email-IM- HTTP- EnterpriseBreachProduction theft/loss FileBreach Server stolen Employee FTP-etc. Applications Database Disk Arrays Backup Tape WAN Remote VPN Disk Arrays Backup Systems Endpoint Leak Email leak or BusinessApps. DB or Replica File Server Employee File Server/CMS Via print/copy Packets sniffed Encryption Key Analytics Hack In transit Hack Disk Arrays Backup Disk Partners Public Collaboration and (Semi) IP Sent to Infrastructure Outsourced Staging Unintentional Content User Trusted Mgmt. Discarded disk non trusted user Dev. Distribution Systems exploited Access Hack Misuse Endpoint Network/E-mail Appps/DB FS/CMS Storage 14 © Novell, Inc. All rights reserved.
    • DLP 2010 (cont.) File shares, Servers, Laptops 300+ File Typed Databases and Repositories -Microsoft file shares -Microsoft Office Files -SharePoint, Documentum -Unix file shares -PDF's -Lotus Notes, Exchange -NAS/SAN storage -PSTs -Microsoft Access -Oracle, SQL, DB2 -Windows 2000, 2003 -Zip Files Data at Rest -Windows XP, Vista -Contact Mgmt Systems File shares, Servers, Laptops Instant Messages Web Traffic -SMTP email -Yahoo IM -FTP -Exchange, Lotus, etc. -MSN Messenger -HTTP -Webmail -AOL Messenger -HTTPS -Text and attachments -TCP/IP Data in Motion Print and Burn USB Copy and Save As -Local printers -External hard drives -Copy to Network shares -Network printers -Memory sticks -Copy to external drives -Burn ro CDs/DVDs -Removable media -Save As to external drives Data in Use 15 © Novell, Inc. All rights reserved.
    • DLP 2010 (cont.) File shares, Servers, Laptops 300+ File Typed Databases and Repositories -Microsoft file shares -Microsoft Office Files -SharePoint, Documentum -Unix file shares -PDF's -Lotus Notes, Exchange -NAS/SAN storage -PSTs -Microsoft Access -Oracle, SQL, DB2 -Windows 2000, 2003 -Zip Files Data at Rest -Windows XP, Vista -Contact Mgmt Systems File shares, Servers, Laptops Instant Messages Web Traffic -SMTP email -Yahoo IM -FTP -Exchange, Lotus, etc. -MSN Messenger -HTTP -Webmail -AOL Messenger -HTTPS -Text and attachments -TCP/IP Data in Motion Print and Burn USB Copy and Save As -Local printers -External hard drives -Copy to Network shares -Network printers -Memory sticks -Copy to external drives -Burn ro CDs/DVDs -Removable media -Save As to external drives Data in Use 16 © Novell, Inc. All rights reserved.
    • Yes. Endpoints are Outsiders
    • Endpoints are Outsiders 2010 • “There used to be this thing called the ‘Network Perimeter’”. Exhibit 2. The B orderless Enterprise Source: Yankee Group, 2009 Desktop Pager video E-mail Mobile Phone Conferencing Audio Your Business Conferencing Front Back Fax Suppliers SCM Office ERP Office CRM Customers Collaboration Software Employees Voice Mail Messaging Software Laptop Phone PDA Room Based video 18 © Novell, Inc. All rights reserved.
    • Endpoints are Outsiders 2010 (cont.) Source: ISSA Journal, June 2009 – A Forward-looking Approach to the Network Perimeter Paradigm, by Fernando Alonso 19 © Novell, Inc. All rights reserved.
    • Endpoints are Outsiders 2010 (cont.) • Over 26,000 different USB • Billions and billions of USB products exist, 4.3 billion devices have been sold to date shipped in 2007 – Over 220 million iPods – Storage devices – Over 30 million iPhones – Networking adapters – ANY form factor – Printers, scanners, webcams – Music albums now sold as USB – Coffee warmers, hand – Their capacity keeps growing – massagers 16GB flash drive is $20 – Virtually impossible to trace Source: In-STAT/MDR 20 © Novell, Inc. All rights reserved.
    • Inside ZENworks Endpoint Security ®
    • Inside ZENworks Endpoint Security ® 22 © Novell, Inc. All rights reserved.
    • ZENworks Endpoint Security ® Demonstration
    • ZENworks Endpoint Security ® Questions and Answers
    • Inside ZENworks Endpoint Security ® (cont.) 25 © Novell, Inc. All rights reserved.
    • Inside ZENworks Endpoint Security ® (cont.) 26 © Novell, Inc. All rights reserved.
    • Inside ZENworks Endpoint Security ® (cont.) 27 © Novell, Inc. All rights reserved.
    • Inside ZENworks Endpoint Security ® (cont.) 28 © Novell, Inc. All rights reserved.
    • Inside ZENworks Endpoint Security ® (cont.) 29 © Novell, Inc. All rights reserved.
    • Inside ZENworks Endpoint Security ® (cont.) 30 © Novell, Inc. All rights reserved.
    • Inside ZENworks Endpoint Security ® (cont.) 31 © Novell, Inc. All rights reserved.
    • Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.