Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Select and Implement a Next Generation Endpoint Protection Solution

1,340 views

Published on

Your Challenge

As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating.
Vendors use a lot of marketing jargon, buzzwords, and statistics to sell their solutions, making objective evaluation rather difficult.
The endpoint protection (EPP) market is overcrowded and fragmented, resulting in information overload and consequently, a difficult vendor assessment.
Disparate product solutions are being bundled into one-off solutions or suites, often resulting in less efficient solutions than the more niche players.
Imminent obsolescence is an issue. Previous EPP solutions have not adapted with the rapidly evolving threat landscape and are no longer relevant, resulting in breaches or vulnerabilities.


Critical Insight
Don’t let vendors and market reports define your endpoint protection needs. Identify the use cases and corresponding feature sets that best align with your risk profile before evaluating the vendor marketspace.
Your security controls are diminishing in value (if they haven’t already). Develop a strategy that accounts for the rapid evolution and imminent obsolescence of your endpoint controls. Plan for future needs when making purchasing decisions today.
Endpoint protection is a matter of defense in depth and risk modelling, there is no silver bullet protection and mitigation solution. As end-client-technology providers release regular product/software updates, security tools will become outdated. Multiyear endpoint protection commitments will leave you playing a constant game of catch up.

Impact and Result

The solution is a holistic internal security assessment that not only identifies, but satisfies, your desired endpoint protection feature set with the corresponding endpoint protection suite and a comprehensive implementation strategy.
Use this blueprint to walk through the steps of selecting and implementing an endpoint protection solution that best aligns with your organizational needs.

Published in: Technology
  • DOWNLOAD THAT BOOKS INTO AVAILABLE FORMAT (2019 Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download Full EPUB Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download Full doc Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download PDF EBOOK here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download EPUB Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download doc Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer that is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBooks .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story That Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money That the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths that Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • DOWNLOAD THAT BOOKS INTO AVAILABLE FORMAT (2019 Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download Full EPUB Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download Full doc Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download PDF EBOOK here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download EPUB Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... Download doc Ebook here { http://bit.ly/2m6jJ5M } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book that can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer that is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBooks .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, Cookbooks, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, Ebooks, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story That Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money That the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths that Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Select and Implement a Next Generation Endpoint Protection Solution

  1. 1. Info-Tech Research Group 1Info-Tech Research Group 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © 1997-2017 Info-Tech Research Group Inc. Select and Implement a Next Generation Endpoint Protection Solution Today’s security battles are fought at the endpoint. Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© 1997–2017 Info-Tech Research Group
  2. 2. Info-Tech Research Group 2Info-Tech Research Group 2 James McCloskey, Senior Director, Security, Risk & Compliance Info-Tech Research Group ANALYST PERSPECTIVE Server compute workloads continue to migrate from traditional on-premises delivery to cloud and hybrid models, and endpoint compute workloads continue to migrate from traditional, corporately owned form factors connected to a corporate network, to a wide mix of personal and corporate devices connecting to both corporate and foreign networks. Ready or not, ubiquitous computing is upon us. As a result, protecting endpoints (and through them, our critical systems and data) against evolving threats requires new solutions – but as a consumer of such solutions, the IT security professional needs ongoing support to navigate through the rapidly changing endpoint solution space and (often) self-serving vendor claims.
  3. 3. Info-Tech Research Group 3Info-Tech Research Group 3 This Research is Designed For: This Research Will Help You:This Research Is Designed For: This Research Will Help You: This Research Will Also Assist: This Research Will Help Them: Our understanding of the problem  Chief Information Officer (CIO)  Chief Information Security Officer (CISO)  Security / IT Management  Security Operations Director / SOC  Network Operations Director / NOC  Systems Administrator  Threat Intelligence Staff  Security Operations Staff  Security Incident Responders  Vulnerability Management Staff  Enhance your security program by selecting, implementing, and streamlining the most appropriate next generation endpoint protection suite.  Determine the most suitable sourcing decision(s) by identifying the use case and corresponding feature set that best aligns with your organizational landscape.  Increase situational awareness through continuous endpoint prevention, detection, analysis, and response techniques, enriching internal security events with external threat intelligence, and enhancing security controls.  Design a step-by-step NG-EPP implementation process.  Pursue continuous improvement; build a measurement program that actively evaluates program effectiveness.  Board / Chief Executive Officer  Information Owners (Business Directors/VP)  Security Governance & Risk Management  Human Resources  Legal & Public Relations  Execute educated endpoint protection purchasing decisions that cater to the organization’s needs and specific use case.  Understand the value and return on investment of endpoint protection offerings.  Increase visibility into the organization’s threat landscape to identify likely targets or identify exposed vulnerabilities.  Ensure the business is compliant with regularity, legal, and/or compliance requirements.
  4. 4. Info-Tech Research Group 4Info-Tech Research Group 4 Resolution Situation Complication Executive summary • Endpoint protection is an ever-consolidating market of security controls. Traditional approaches are failing to address modern protection challenges while new market entrants are providing more focused coverage. • Identifying organizational needs while accounting for the diverse array of vendor solutions is both time consuming and a drain on resources. • As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. • The endpoint protection (EPP) market is overcrowded and fragmented, resulting in information overload and consequently, a difficult vendor assessment. • Disparate product solutions are being bundled into one-off solutions or suites, often resulting in inefficient solutions than the more niche players. • Imminent obsolescence: previous EPP solutions have not adapted with the rapidly evolving threat landscape and are no longer relevant, resulting in breaches or vulnerabilities. • Vendors use a lot of marketing jargon, buzzwords, and statistics to sell their solutions, making objective evaluation rather difficult. • The solution is a holistic internal security assessment that not only identifies, but satisfies, your desired endpoint protection feature set with the corresponding endpoint protection suite and a comprehensive implementation strategy. • This blueprint will walk through the steps of selecting and implementing an endpoint protection solution that best aligns with your organizational needs. 1. Don’t let vendors and market reports define your endpoint protection needs. Identify the use cases and corresponding feature sets that best align with your risk profile before evaluating the vendor marketspace. 2. Your security controls are diminishing in value (if they haven’t already). Develop a strategy that accounts for the rapid evolution and imminent obsolescence of your endpoint controls. Plan for future needs when making purchasing decisions today. 3. Endpoint protection is a matter of defense in depth and risk modelling; there is no silver bullet protection and mitigation solution. As end-client-technology providers release regular product/software updates, security tools will become outdated. Multiyear endpoint protection commitments will leave you playing a constant game of catch up.
  5. 5. Info-Tech Research Group 5Info-Tech Research Group 5 Data breaches are resulting in major costs across industries $0 $100 $200 $300 $400 Public Hospitality Research Technology Media Retail Industrial Consumer Services Education Communications Transportation Energy Financial Pharmaceutical Health Per capita cost by industry classification of benchmarked companies Source: Cisco 2017 Security Capabilities Benchmark Study Average data breach costs per compromised record hit an all-time high of $217 (in 2015); $74 is direct cost (e.g. legal fees, technology investment) and $143 is indirect cost (e.g. abnormal customer churn). Source: 2015 Cost of Data Breach Study: United States, Ponemon Institute 58% Lost <20% 25% Lost 20–40% 9% Lost 40–60% 5% Lost 60–80% 4% Lost 80–100% % of business opportunity lost from a data breach % of customers lost from a data breach 61% Lost <20% 21% Lost 20–40% 8% Lost 40–60% 6% Lost 60–80% 4% Lost 80–100% % of systems impacted by a data breach 1% No Impact 19% 1–10% impacted 41% 11–30% impacted 24% 31–50% impacted 15% >50% impacted
  6. 6. Info-Tech Research Group 6Info-Tech Research Group 6 Signature-Based AV  .  . Heuristic AV  . Machine Learning  . Host Firewall (Stateful Inspection)  .  . Host IPS .  . Host IDS  . Kernel Monitoring  . Full-Disk Encryption  . File-Folder Encryption  . Removable Media Encryption  .  . Port & Device Control  .  . Endpoint DLP  .  . Patch Management  .  . System Hardening  . Application Whitelisting/Blacklisting (Static)  .  . URL Filtering  . Cross-Platform Integration  . Threat Intelligence Enrichment  . MSSP Support  .  . Digital Forensics  . Long-Term Data Retention  . Automated Remediation  . Cloud-Based Application Detonation  . Local Containerization  . Secure Web Browsing/Micro-Segmentation  . Central Portal Policy Management  .  . Active Directory Integration  .  . Mobile OS Support  .  . There’s a lot more to endpoint security than just anti-virus 44% admitted one or more endpoints had been compromised within the past 24 months 57% of incidents were detected via the endpoint The average employee uses at least 3 devices for day-to-day work. Source: Sans 2016 Endpoint Security Survey NG-EPP Next-gen products will become current-gen and, eventually, last-gen. Organizations must decide whether their next endpoint protection solution can transcend generations and adapt alongside the threat landscape. Features Traditional EPP/AV
  7. 7. Info-Tech Research Group 7Info-Tech Research Group 7 A vendor-driven EPP selection approach is unsustainable: DO NOT let vendors define your security needs As threats and subsequent defenses evolve, the more appropriate question is: “What is the right use case for my business?” Organizations consist of distributed endpoints that might be personally owned, unmanaged, and/or be connecting to unsecured networks on the regular, but still access corporate networks and assets. …the perimeter is simply too fluid to successfully manage using a traditional network security architecture. – Elliot Lewis, VP Security, Risk, and Compliance, Info-Tech Research Group Managed Asset on Corporate Network Managed Asset on VPN Managed Asset on Foreign Network Private Asset on Corporate Network Private Asset on VPN Private Asset on Foreign Network • VPN • CASB • Digital Forensics • MDM/EM • SSO/IAM • DLP • System Hardening • Data Encryption First, identify which operating models are relevant and from there assess the feature sets that best satisfy your organizational needs.
  8. 8. Info-Tech Research Group 8Info-Tech Research Group 8 Use this blueprint to streamline your endpoint protection selection and implementation process Launch the EPP Project & Collect Feature Requirements Phase 1 Select Your EPP Solution Phase 2 Not everyone’s endpoint protection needs are the same. Develop an endpoint protection strategy and identify the corresponding feature sets that best align with your organizational requirements. Plan Your EPP Implementation Phase 3 Risk reduction. NG-EPP reduces the margin for error through the consolidation of various network controls. Strategic Benefits Improved organizational situational awareness. Improve internal and external communication with top executives about organizational risks, threat actor TTPs, and security ROI. Organizational cost savings. Limit unnecessary spending by streamlining the endpoint protection selection and management process. Leverage Software Reviews to begin making data-driven sourcing decisions based on industry expert reviews. Understand your business’ integration environment. Define the technical, functional, and strategic requirements for a smooth endpoint protection deployment strategy.
  9. 9. Info-Tech Research Group 9Info-Tech Research Group 9  Increased resolution rate. Situational awareness provides data with context, allowing security operations teams to more effectively remediate incidents.  Increased device uptime as network-based security controls transition to the endpoint.  Intelligence-driven patch management. Threat intelligence provides actionable vulnerability and exploitation data to automatically patch critical vulnerabilities.  Contextualization of endpoint data. Digital forensics – accelerates the identification of root cause analysis.  Enhanced communication through the use of a central management portal. Benefits of a next generation endpoint protection solution Operational Benefits  Improved visibility into managed and unmanaged devices through active kernel monitoring and digital forensics.  Dynamic malware-based detection through the use of behavioral analysis and machine learning.  Application containment mechanisms for safe malware detonation and analysis.  Integration of network-based security controls within endpoint clients – host IDS, IPS, DLP, etc.  Automated remediation capabilities to restore infected endpoints to prior states.  Improved effectiveness of internal defense controls such as SIEM, NGFWs, IPS, IDS, SWGs, anti-malware, and anti-spam packages. Tactical Benefits Maximizing the value of your NG-EPP strategy depends on close integration with people, process, and technology.
  10. 10. Info-Tech Research Group 10Info-Tech Research Group 10 Consulting “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.” Guided Implementation “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” DIY Toolkit “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” Workshop “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” Diagnostics and consistent frameworks used throughout all four options Info-Tech offers various levels of support to best suit your needs
  11. 11. Info-Tech Research Group 11Info-Tech Research Group 11 Measured value for Guided Implementations Engaging in GIs offers valuable project advice and significant cost savings. GI Purpose Measured Value Phase 1: Create An EPP Strategy • Determine why you need a new endpoint protection solution • Understand Info-Tech’s use-case approach • Evaluate current endpoint protection feature sets and criteria Time, value, and resources saved using our industry expertise, best practices, and templates: Project Manager: 2 days x $800/day = $1,600 Phase 2: Select Your EPP Solution • Optimize your endpoint protection procurement process • Determine EPP vendor criteria • Evaluate the EPP marketspace • Design, submit, and evaluate vendor RFPs Time, value, and resources saved using our industry expertise, best practices, and templates: Project Manager: 3 days x $800/day = $2,400 Variable savings: Cost avoidance associated with right-sizing product selection. Phase 3: Implement and Manage Your EPP Solution • Identify the appropriate resourcing plan for your endpoint protection solution • Plan the implementation • Design, build, test, and roll out the solution • Develop a comprehensive measurement program Time, value, and resources saved using our industry expertise, best practices, and templates: Project Manager and SysAdmins: 2 days x $800/day = $1,600 Variable savings: Cost reduction associated with removing any existing EPP solutions. Total Savings $5,600 + any cost avoidance/cost reduction opportunities
  12. 12. Info-Tech Research Group 12Info-Tech Research Group 12 Info-Tech Research Group Helps IT Professionals To: Sign up for free trial membership to get practical solutions for your IT challenges  Quickly get up to speed with new technologies  Make the right technology purchasing decisions – fast  Deliver critical IT projects, on time and within budget  Manage business expectations  Justify IT spending and prove the value of IT  Train IT staff and effectively manage an IT department •“Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP

×