SlideShare a Scribd company logo
1 of 2
Download to read offline
Lumension ® Device Control                                       (formerly SanCtuary)
                                                                                                                        Datasheet


                                                                                                                       Key Benefits
Enforce Security Policies for Removable Devices,                                                                         » Protects Data from Loss /
                                                                                                                           Theft
Media and Data                                                                                                           » Enables Secure Use of
Data leakage caused by the accidental or sometimes malicious                                                               Productivity Tools, Like
                                                                                                                           USB Sticks
use of removable devices and/or removable media has reached
                                                                                                                         » Enhances Security Policy
alarming levels. In fact, over 85% of privacy and security                                                                 Enforcement
                                                                                                                         » Delivers Precise Control
professionals reported at least one breach and almost 64%
                                                                                                                           with Access Limits
reported multiple breaches that required notification.1

                                                                                                                       “One of the main benefits in
Organization-wide Device Management                                                                                    deploying Lumension Device
To enhance productivity, organizations need to provide employees and partners                                          Control is its whitelist feature,
access to data. With more employees working remotely, access is required from                                          which ensures that no device,
outside the network. But the potential impact of data loss, be it accidental or mali-                                  unless authorized, can ever
cious, is a very real concern. And today, removable media / devices are the most                                       be used, no matter how it gets
common data leakage routes -- no file copy limits, no encryption, no audit trails                                      plugged in. Flash memory USB
and no central management.                                                                                             devices represent a significant
                                                                                                                       risk with the potential to steal
The information contained in customer and corporate data, such as personally                                           company data or introduce
identifiable information (PII) and intellectual property (IP), is worth billions to                                    “malware”, which could render
some. And the costs for recovery of data and lost business are rapidly rising as                                       the computer unusable and
well: the total average cost of a data breach incident is estimated to be $6.6 mil-                                    quickly infect other PCs on the
lion or $202 per compromised record, with the cost of lost business averaging                                          same network. Device Control
$4.6 million or $139 per record. 2                                                                                     is a really strong, easy to use
                                                                                                                       product which is why Barclays
Lumension Device Control provides:                                                                                     chose this solution.”
     » Enforcement of removable device usage and data encryption policies                                              Paul Douglas, ADIR Desktop
     » Central management of devices and data using a whitelist / “default deny” approach                              Build Team Manager, Barclays
     » Enablement of productivity-enhancing tools while limiting the potential for
       data leakage and its impact


Key Features
     » Whitelist / “Default Deny”                                » Context-Sensitive Permissions
     » Policy Enforced Encryption for                            » Centralized Management /
       Removable Storage Data Copy                                 Administrators’ Roles
       Restriction                                               » Role Based Access Control
     » File Type Filtering                                       » Tamper-proof Agent
     » Temporary / Scheduled Access                              » Flexible / Scalable Architecture




1.    Deloitte & touche and Ponemon Institute, enterprise@risk: 2007 Privacy & Data Protection Survey, December 2007
2.    Ponemon Institute, 2008 annual Study: Cost of Data Breach Study, february 2009
How Lumension Device Control Works                                                                             System Requirements
                                                                                                                » Server: Windows Server
                                1.    Discover - Identify all removable devices that are currently or
                                                                                                                  2003, Windows Server
                                          have ever been connected to your endpoints.
                                                                                                                  2008
                                         2.     Assess - Categorize all “plug and play” devices by
                                                                                                                » Client: Windows XP
                                                    class, model and/or specific ID and define policy
                                                                                                                  Professional, Windows
                                                        through a whitelist approach.
                                                                                                                  2000 Professional,
                                                   3.    Implement - Enforce file copy limitations, file
                                                                                                                  Windows Server 2003,
                                                          type filtering and forced encryption policies for
                                                                                                                  Windows Vista
                                                          data moved onto removable devices.
                                                                                                               Complete Requirements
                                                   4.     Monitor - Track all policy changes, administrator
                                                         activities and file transfers to ensure continuous
                                                                                                               Online Resources
                                                        policy enforcement.
                                                                                                                » FREE TRIAL
                                              5.        Report - Provide visibility into device and data us-
                                                                                                                » Data Protection Blog
                                                   age to demonstrate compliance with corporate and/or
                                                                                                                » Device Scanner
                                              regulatory policies.
                                                                                                                » Taking Control of Your
                                                                                                                  Data: Protecting Business
Key Features
                                                                                                                  Information from Loss or
Whitelist / “Default Deny”: Assigns permis-                Temporary / Scheduled Access: Grants us-
                                                                                                                  Theft
sions for authorized removable devices and                 ers temporary / scheduled access to removable
                                                                                                                » Webcast: Data on the Edge
media to individual users or user groups; by               devices/media; used to grant access “in the fu-
default, devices / media and users not explicitly          ture” for a limited period.
authorized are denied access.
                                                                                                               Contact Lumension
                                                           Context-Sensitive Permissions: Applies dif-
                                                                                                                » Global Headquarters
Policy Enforced Encryption for Removable                   ferent permissions when the endpoint is con-
                                                                                                                    15880 N. Greenway Hayden
Storage: Centrally encrypts removable devices              nected to the network, when it is not, and/or
                                                                                                                    Suite 100
(such as USB flash drives) and media (such as              regardless of connection status.
                                                                                                                    Scottsdale, AZ 85260
DVDs/CDs), plus enforces encryption policies
                                                                                                                    +1.480.970.1025
when copying to devices / media.                           Role Based Access Control: Assigns permis-
                                                                                                                    sales@lumension.com
                                                           sions to individual users or user groups based
Data Copy Restriction: Restricts the daily                 on their Windows Active Directory or Novell
                                                                                                                » United Kingdom
amount of data copied to removable devices                 eDirectory identity, both of which are fully sup-
                                                                                                                    +44.0.1908.357.897
and media on a per-user basis; also, limits us-            ported.
                                                                                                                    sales.uk@lumension.com
age to specific time frames / days.
                                                           Tamper-proof Agent: Installs agents on every
                                                                                                                » Europe
File Type Filtering: Controls file types that              endpoint on the network; agents are protected
                                                                                                                    +352.265.364.11
may be moved to and from removable devices                 against unauthorized removal – even by users
                                                                                                                    sales-emea@lumension.com
(such as USB sticks) and media (such as DVDs/              with administrative permissions.. Only Device
CDs) on a per-user basis.                                  Control Administrators may deactivate this pro-
                                                                                                                » Asia & Pacific
                                                           tection.
                                                                                                                    +65.6725.6415
Centralized Management / Administrators’
                                                                                                                    sales-apac@lumension.com
Roles: Centrally defines and manages user,                 Flexible / Scalable Architecture: Provides or-
user groups, computer and computer groups                  ganization-wide control and enforcement using
access to authorized removable devices / me-               scalable client-server architecture with a cen-
dia on the network; by default, those devices /            tral database that is optimized for performance.
media and users not explicitly authorized are              Supports virtualized server configurations.
denied access.


www.lumension.com
Vulnerability management | endpoint Protection | Data Protection | reporting and Compliance

                                                                                                                                LDC-DS-EN-28-07-09

More Related Content

What's hot

Operations Foundation Business Brief 2
Operations Foundation Business Brief 2Operations Foundation Business Brief 2
Operations Foundation Business Brief 2wdjohnson1
 
20090106c Presentation Custom
20090106c   Presentation   Custom20090106c   Presentation   Custom
20090106c Presentation Customgkelley
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Webroot
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010Vadimazz
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin RowneySymantec
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationOregon Law Practice Management
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical FacilitiesSE_NAM_Training
 
ITFM Business Brief
ITFM Business BriefITFM Business Brief
ITFM Business Briefwdjohnson1
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft Private Cloud
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer Englishcynapspro GmbH
 
Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Nuno Alves
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Lumension
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach FinalHossam Hassanien
 

What's hot (20)

Operations Foundation Business Brief 2
Operations Foundation Business Brief 2Operations Foundation Business Brief 2
Operations Foundation Business Brief 2
 
20090106c Presentation Custom
20090106c   Presentation   Custom20090106c   Presentation   Custom
20090106c Presentation Custom
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.
 
Mis Data Sheet 2010
Mis Data Sheet 2010Mis Data Sheet 2010
Mis Data Sheet 2010
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
Resources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client InformationResources for Lawyers Who Have Experienced Theft of Client Information
Resources for Lawyers Who Have Experienced Theft of Client Information
 
WP82 Physical Security in Mission Critical Facilities
WP82   Physical Security in Mission Critical FacilitiesWP82   Physical Security in Mission Critical Facilities
WP82 Physical Security in Mission Critical Facilities
 
ITFM Business Brief
ITFM Business BriefITFM Business Brief
ITFM Business Brief
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28Xen client4.5 customer-presentation-2012-12-28
Xen client4.5 customer-presentation-2012-12-28
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should ...
 
Business Intelligence In Cloud Computing A Tokenization Approach Final
Business Intelligence In Cloud Computing  A Tokenization Approach FinalBusiness Intelligence In Cloud Computing  A Tokenization Approach Final
Business Intelligence In Cloud Computing A Tokenization Approach Final
 

Similar to Ldc

Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Lumension
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsLumension
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHKirill Kertsenbaum
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?SolarWinds
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 

Similar to Ldc (20)

Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
Effectively Utilizing LEMSS: Top 11 Security Capabilities You Can Implement T...
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Pace IT - Admin Tools (Part 1)
Pace IT - Admin Tools (Part 1)Pace IT - Admin Tools (Part 1)
Pace IT - Admin Tools (Part 1)
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISHIntroducing New Kaspersky Endpoint Security for Business - ENGLISH
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Ldc

  • 1. Lumension ® Device Control (formerly SanCtuary) Datasheet Key Benefits Enforce Security Policies for Removable Devices, » Protects Data from Loss / Theft Media and Data » Enables Secure Use of Data leakage caused by the accidental or sometimes malicious Productivity Tools, Like USB Sticks use of removable devices and/or removable media has reached » Enhances Security Policy alarming levels. In fact, over 85% of privacy and security Enforcement » Delivers Precise Control professionals reported at least one breach and almost 64% with Access Limits reported multiple breaches that required notification.1 “One of the main benefits in Organization-wide Device Management deploying Lumension Device To enhance productivity, organizations need to provide employees and partners Control is its whitelist feature, access to data. With more employees working remotely, access is required from which ensures that no device, outside the network. But the potential impact of data loss, be it accidental or mali- unless authorized, can ever cious, is a very real concern. And today, removable media / devices are the most be used, no matter how it gets common data leakage routes -- no file copy limits, no encryption, no audit trails plugged in. Flash memory USB and no central management. devices represent a significant risk with the potential to steal The information contained in customer and corporate data, such as personally company data or introduce identifiable information (PII) and intellectual property (IP), is worth billions to “malware”, which could render some. And the costs for recovery of data and lost business are rapidly rising as the computer unusable and well: the total average cost of a data breach incident is estimated to be $6.6 mil- quickly infect other PCs on the lion or $202 per compromised record, with the cost of lost business averaging same network. Device Control $4.6 million or $139 per record. 2 is a really strong, easy to use product which is why Barclays Lumension Device Control provides: chose this solution.” » Enforcement of removable device usage and data encryption policies Paul Douglas, ADIR Desktop » Central management of devices and data using a whitelist / “default deny” approach Build Team Manager, Barclays » Enablement of productivity-enhancing tools while limiting the potential for data leakage and its impact Key Features » Whitelist / “Default Deny” » Context-Sensitive Permissions » Policy Enforced Encryption for » Centralized Management / Removable Storage Data Copy Administrators’ Roles Restriction » Role Based Access Control » File Type Filtering » Tamper-proof Agent » Temporary / Scheduled Access » Flexible / Scalable Architecture 1. Deloitte & touche and Ponemon Institute, enterprise@risk: 2007 Privacy & Data Protection Survey, December 2007 2. Ponemon Institute, 2008 annual Study: Cost of Data Breach Study, february 2009
  • 2. How Lumension Device Control Works System Requirements » Server: Windows Server 1. Discover - Identify all removable devices that are currently or 2003, Windows Server have ever been connected to your endpoints. 2008 2. Assess - Categorize all “plug and play” devices by » Client: Windows XP class, model and/or specific ID and define policy Professional, Windows through a whitelist approach. 2000 Professional, 3. Implement - Enforce file copy limitations, file Windows Server 2003, type filtering and forced encryption policies for Windows Vista data moved onto removable devices. Complete Requirements 4. Monitor - Track all policy changes, administrator activities and file transfers to ensure continuous Online Resources policy enforcement. » FREE TRIAL 5. Report - Provide visibility into device and data us- » Data Protection Blog age to demonstrate compliance with corporate and/or » Device Scanner regulatory policies. » Taking Control of Your Data: Protecting Business Key Features Information from Loss or Whitelist / “Default Deny”: Assigns permis- Temporary / Scheduled Access: Grants us- Theft sions for authorized removable devices and ers temporary / scheduled access to removable » Webcast: Data on the Edge media to individual users or user groups; by devices/media; used to grant access “in the fu- default, devices / media and users not explicitly ture” for a limited period. authorized are denied access. Contact Lumension Context-Sensitive Permissions: Applies dif- » Global Headquarters Policy Enforced Encryption for Removable ferent permissions when the endpoint is con- 15880 N. Greenway Hayden Storage: Centrally encrypts removable devices nected to the network, when it is not, and/or Suite 100 (such as USB flash drives) and media (such as regardless of connection status. Scottsdale, AZ 85260 DVDs/CDs), plus enforces encryption policies +1.480.970.1025 when copying to devices / media. Role Based Access Control: Assigns permis- sales@lumension.com sions to individual users or user groups based Data Copy Restriction: Restricts the daily on their Windows Active Directory or Novell » United Kingdom amount of data copied to removable devices eDirectory identity, both of which are fully sup- +44.0.1908.357.897 and media on a per-user basis; also, limits us- ported. sales.uk@lumension.com age to specific time frames / days. Tamper-proof Agent: Installs agents on every » Europe File Type Filtering: Controls file types that endpoint on the network; agents are protected +352.265.364.11 may be moved to and from removable devices against unauthorized removal – even by users sales-emea@lumension.com (such as USB sticks) and media (such as DVDs/ with administrative permissions.. Only Device CDs) on a per-user basis. Control Administrators may deactivate this pro- » Asia & Pacific tection. +65.6725.6415 Centralized Management / Administrators’ sales-apac@lumension.com Roles: Centrally defines and manages user, Flexible / Scalable Architecture: Provides or- user groups, computer and computer groups ganization-wide control and enforcement using access to authorized removable devices / me- scalable client-server architecture with a cen- dia on the network; by default, those devices / tral database that is optimized for performance. media and users not explicitly authorized are Supports virtualized server configurations. denied access. www.lumension.com Vulnerability management | endpoint Protection | Data Protection | reporting and Compliance LDC-DS-EN-28-07-09