Lumension Security Solutions


Published on

Lumension Security Vulnerability Management, Endpoint and Data Protection Brief.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Lumension Security Solutions

    1. 1. Lumension Security Solutions
    2. 2. Optimal Security Solutions Optimal Security Proactive Risk Management and Operational and Security Security & Compliance Reporting Endpoint Protection Vulnerability Management Data Protection Best Practices Open Standards Integrated Platform Flexible Architecture
    3. 3. Lumension Solutions <ul><li>Vulnerability Management </li></ul><ul><li>Endpoint Protection </li></ul><ul><li>Data Protection </li></ul><ul><li>Security & Compliance Reporting </li></ul>
    4. 4. Effectiveness - Risk Reduction and Threat Elimination Vulnerability Management Removes risk from technology Endpoint Protection Filters threats from technology IT Operations: <ul><ul><li>IT Security </li></ul></ul><ul><ul><li>The Endpoint </li></ul></ul>Reduces attackable “surface area” Stops attacks Optimal Security Optimised security Lower support burdens Increased user productivity Lower TCO
    5. 5. Vulnerability Management Solution
    6. 6. Lumension Security Vulnerability Management Suite <ul><li>Discover </li></ul><ul><ul><li>Discover all network assets </li></ul></ul><ul><li>Assess </li></ul><ul><ul><li>Vulnerability and configuration assessment </li></ul></ul><ul><ul><li>Network + agent-based scanners with integrated view </li></ul></ul><ul><li>Prioritise </li></ul><ul><ul><li>Prioritise threats and mitigation actions </li></ul></ul><ul><li>Remediate </li></ul><ul><ul><li>Deploy Security patches </li></ul></ul><ul><ul><li>Mitigate risk with custom remediations </li></ul></ul><ul><li>Report </li></ul><ul><ul><li>Numerous reporting options </li></ul></ul><ul><ul><li>Reporting across entire Enterprise Network </li></ul></ul>Lumension Security Vulnerability Management Suite is a process-driven solution:
    7. 7. In-Depth Discovery <ul><li>Provides visibility to the entire network environment to discover all assets, both managed and unmanaged </li></ul><ul><li>In-depth scans of heterogeneous networks to discover all computing assets </li></ul><ul><li>Flexible grouping and classification </li></ul><ul><li>Discover silent or hidden network nodes, even if not currently managed by agents </li></ul>
    8. 8. <ul><li>Assess against Lumension’s large pre-built vulnerability and configuration repositories as well as customized vulnerability policies. </li></ul><ul><li>Agent & agent-less assessment options provide complete enterprise visibility </li></ul><ul><li>Credentialed-based scanner performs deep analysis of endpoints to accurately discover & determine vulnerabilities without impacting production environments or network assets </li></ul>Thorough Assessment <ul><li>Assess OS, Application, and Security Configuration vulnerabilities that exist within the network environment to proactively identify and prioritise known issues before they can be exploited </li></ul>
    9. 9. Detailed Prioritisation <ul><li>Multiple views of vulnerabilities grouped by vulnerability specifics or by computing assets (machines). </li></ul><ul><li>Prioritise vulnerability assessment information by vulnerability severity and/or organisational impact. </li></ul>
    10. 10. Intelligent Patch & Remediation <ul><li>Agent-based patch & remediation tool simplifies the process of maintaining a secure environment by continuously monitoring, detecting and remediating policy-driven environments </li></ul><ul><li>Automatically and quickly deploys patches to an entire network across many different platforms (e.g. Windows, Linux, Unix, Mac) and across applications (e.g. Adobe, WinZip, Real Networks) </li></ul><ul><li>Lumension Vulnerability Management provides fully integrated agent-based remediation capabilities in heterogeneous environments. </li></ul>
    11. 11. Comprehensive Reporting <ul><li>Single and consolidated management console provides a holistic view of environmental risk </li></ul><ul><li>Composite Reports combine the discovery and assessment information from both network and agent-based scanners to provide a more complete view of the environment </li></ul><ul><li>Role-based administration provides tailored information to the appropriate audiences. </li></ul><ul><li>Full range of operational and management reports </li></ul>
    12. 12. Benefits <ul><li>Discover, assess, prioritise, remediate & report on the entire network environment from one solution. </li></ul><ul><li>Complete enterprise visibility and effective vulnerability assessment via network and agent-based scanners. </li></ul><ul><li>Single solution to patch and remediate a heterogeneous network with our scalable remediation tools and various deployment options. </li></ul><ul><li>Comprehensive and policy-based reporting capabilities for business analysis and compliance. </li></ul>
    13. 13. Endpoint Protection Solution
    14. 14. Lumension Security Endpoint Protection white grey black Trusted applications that serve a business purpose and are supported by the organisation Unwanted applications that are not condoned by the organisation. These can be explicitly added to the black or automatically if not in grey or white. <ul><li>Extended trust based on context: </li></ul><ul><li>Process </li></ul><ul><li>Publisher </li></ul><ul><li>Path </li></ul><ul><li>Person </li></ul>
    15. 15. Lumension Security Endpoint Protection Solution <ul><li>Malware and threat protection without signature updates or behavioral technologies </li></ul><ul><li>Authorises only trusted applications that serve a legitimate business need </li></ul><ul><li>Lowers helpdesk burden and operational TCO by enforcing supported software and eliminating system conflicts </li></ul><ul><li>Increases end-user productivity by preventing non-business applications from being installed </li></ul>
    16. 16. Data Protection Solution
    17. 17. Lumension Security Data Protection Solution Protects data from theft or loss <ul><li>Controls the flow of data to devices (inbound and outbound data including port access) </li></ul><ul><li>Encrypts data (moved onto removable devices) </li></ul><ul><li>Detailed forensics and auditing (of data moved to / from a device) </li></ul><ul><li>Enables Compliance (Data Protection Regulations and Standards) </li></ul>Device Control Integrated PGP Whole Disk Encryption
    18. 18. Security & Compliance Reporting
    19. 19. Security & Compliance Reporting <ul><li>Measure and Ensure Network Security </li></ul><ul><li>Demonstrate Compliance to Security Policies and Regulations </li></ul><ul><li>Use or Extend Over Two-Dozen Sample Reports </li></ul><ul><li>Easily Create and Share Custom Reports </li></ul><ul><li>Open Reporting Schema Works With Existing Reporting Tools </li></ul>Consolidated Analysis and Reporting of all Enterprise Vulnerability Management Information