Stronger Security and IT Operational Excellence:How to Achieve Both from Your Endpoint Management and Security Suite<br />...
Mike Rothman<br />Analyst & President<br />Securosis LLC<br />http://securosis.com<br />
*Any* Computing<br />Connecting to critical information<br />At any time<br />From any where<br />On any device<br />
Defining the “Endpoint”<br />
Over the past few years, lots of stuff has been added to endpoint agents:<br />Anti-spyware<br />HIPS<br />Firewall<br />E...
Problem: Scale<br />Attacks aplenty<br />Millions of new malware samples<br />Automated attack kits<br />Financial motives...
Problem: Effectiveness<br />Detection rates on slippery downward slope<br />Today’s attacks are not predictable<br />Attac...
Problem: Silos<br />
Ah<br />No.<br />Are we more Secure?<br />
It’s not working.<br />So why are endpoint security suites still<br />a multi-billion dollar business?<br />
Oh crap! The Cloud is coming...<br />What happens when data can be both internal/external?<br />Perimeter? Buh Bye.<br />I...
The Answer?<br />Layered Defenses<br />Fundamentals<br />Management Leverage<br />
Operating Systems<br />Operating systems are getting more secure (relatively)<br />Windows 7, Mac OS X<br />Mobile OS lock...
Endpoint Security Fundamentals<br />Patch and Update<br />Secure Configurations<br />HIPS/file integrity monitoring<br />S...
The Continuum of Integration<br />
Visibility vs. Control<br />
Summary<br />Endpoint security is not dead, nor is it a panacea<br />Agent technologies evolving<br />Management silos hur...
Mike Rothman<br />Securosis LLC<br />mrothman@securosis.com<br />http://securosis.com<br />Twitter: @securityincite<br />
Paul ZimskiVP of Solution StrategyLumension<br />
Challenges of Endpoint Management<br />21<br />IT Operations<br />IT Security<br />Lack of integration across technologies...
Increasing Agent Bloat
Increasing and costly back-end Integration
Lack of visibility and collaboration with IT security
Need for better accuracy
User access rights (Local Admin)
Lack of Scalability
Silos and insufficient collaboration between IT and business operations* </li></ul>*Worldwide State of The Endpoint Report...
Consolidate Your Endpoint Security Technologies<br /><ul><li>Multiple Consoles
3-6 different management consoles on average
Agent Bloat
3-10 agents* installed per endpoint
Decreased network performance
Lack of Control
54% of IT security professionals cite managing the complexity of security as their #1 challenge
Decreasing visibility-disparate data
Upcoming SlideShare
Loading in …5
×

Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

1,113 views

Published on

How can you effectively and cost-efficiently manage and secure your endpoints in today’s evolving IT environment? By managing endpoints throughout your entire lifecycle. It’s not simply about adding new security layers – i.e. antivirus, patch management, configuration management, etc. – but how these capabilities work together without degrading endpoint performance and, subsequently, end-user and IT productivity.

In this Webcast, you will learn:

1. Strategies that enable IT operations and security to effectively break down the traditional silos to reduce IT risk and improve overall productivity;

2. How to centralize management and visibility of your entire endpoint environment – across physical and virtual machines, online and offline systems, and a variety of operating systems and applications;

3. How to ensure an effective, defense-in-depth security approach;

4. Key capabilities to look for in an endpoint management and security suite;

5. Cost benefits of consolidating best-of-breed endpoint operations and security technologies into one unified solution.

Featured Speakers
Mike Rothman - Analyst & President - Securosis
Paul Zimski - VP of Solution Strategy - Lumension
Salvatore Salamone - Executive Editor, Strategic Content - Ziff Davis Enterprise

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,113
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
50
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 49% of endpoint TCO is associated with security and operational management** Complex system managementDecreased endpoint performance and lack of scalability-Agent BloatCostly integration, and maintenance Limited visibility and collaboration
  • Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
  • “Over 90% of cyber attacks exploit known security flaws for which a remediation is available” GartnerAddress the Core Risk: (Patch &amp; Configuration Management)Application vulnerabilitiesConfiguration driftStop Unwanted/Untrusted Change (Application Control)Stop all unknown/untrusted applications from executingGain visibility over endpoint application environmentCombine behavioral analysis of AV and application white list policy together for most effective zero day defenseProtect Against Insider Risk (Device Control)Physical entry of malwareAccidental or malicious data lossDevice visibilityDeploy a Broad Defense (Anti-Virus)Known and fast spreading malwareEfficient malware removableReduce Endpoint Complexity (Endpoint Management and Security Suite)Reduce malware incidents and related costsReduce systems integration and maintenance costsGain visibility across IT operations and security functionsCentralize policy management and reportingSimplified systems managementSocial networking applications were detected in 95% of organizations. **78% of Web 2.0 applications support file transfer.**2/3 of applications have known vulnerabilities.**28% of applications were known to propagate malware.**
  • Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
  • Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
  • Reduced complexity via an agile single console-single agent-single server architecture that can manage thousands of endpoints across online and offline states. Delivers best-of-breed modularly licensed, product capabilitiesUnifies IT operational and security workflows to enable greater control visibility, and more effective policy managementSimplified and real time systems, agent, and policy management within a single consoleCentralized reporting and logging to increase accuracy, reduce compliance burden, and enhance visibility
  • Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

    1. 1. Stronger Security and IT Operational Excellence:How to Achieve Both from Your Endpoint Management and Security Suite<br />Hosted by<br />
    2. 2. Mike Rothman<br />Analyst & President<br />Securosis LLC<br />http://securosis.com<br />
    3. 3. *Any* Computing<br />Connecting to critical information<br />At any time<br />From any where<br />On any device<br />
    4. 4. Defining the “Endpoint”<br />
    5. 5. Over the past few years, lots of stuff has been added to endpoint agents:<br />Anti-spyware<br />HIPS<br />Firewall<br />Encryption<br />10 lbs of **** in a 2 lb. bag<br />Endpoint Agent Overload<br />
    6. 6. Problem: Scale<br />Attacks aplenty<br />Millions of new malware samples<br />Automated attack kits<br />Financial motives brings new attackers<br />The problem isn’t getting better<br />
    7. 7. Problem: Effectiveness<br />Detection rates on slippery downward slope<br />Today’s attacks are not predictable<br />Attacks target different exposures<br />Web browsers<br />Applications (XSS & CSRF)<br />
    8. 8. Problem: Silos<br />
    9. 9. Ah<br />No.<br />Are we more Secure?<br />
    10. 10. It’s not working.<br />So why are endpoint security suites still<br />a multi-billion dollar business?<br />
    11. 11.
    12. 12. Oh crap! The Cloud is coming...<br />What happens when data can be both internal/external?<br />Perimeter? Buh Bye.<br />Increases focus on the endpoint.<br />
    13. 13. The Answer?<br />Layered Defenses<br />Fundamentals<br />Management Leverage<br />
    14. 14. Operating Systems<br />Operating systems are getting more secure (relatively)<br />Windows 7, Mac OS X<br />Mobile OS lockdown and control (iOS vs. Android)<br />But it’s still a lot of code and there will be problems<br />Anti-Exploitation Techniques<br />Data Execution Prevention (DEP)<br />Address Space Layout Randomization (ASLR)<br />
    15. 15. Endpoint Security Fundamentals<br />Patch and Update<br />Secure Configurations<br />HIPS/file integrity monitoring<br />System lockdown (standard user, GPO, white listing)<br />
    16. 16. The Continuum of Integration<br />
    17. 17. Visibility vs. Control<br />
    18. 18. Summary<br />Endpoint security is not dead, nor is it a panacea<br />Agent technologies evolving<br />Management silos hurt efficiency and effectiveness<br />Defense in depth still critical<br />Pay attention to the fundamentals<br />
    19. 19. Mike Rothman<br />Securosis LLC<br />mrothman@securosis.com<br />http://securosis.com<br />Twitter: @securityincite<br />
    20. 20. Paul ZimskiVP of Solution StrategyLumension<br />
    21. 21. Challenges of Endpoint Management<br />21<br />IT Operations<br />IT Security<br />Lack of integration across technologies is the #1 IT security risk.*<br />Challenges<br />Challenges<br /><ul><li>Lack of Common Management Console
    22. 22. Increasing Agent Bloat
    23. 23. Increasing and costly back-end Integration
    24. 24. Lack of visibility and collaboration with IT security
    25. 25. Need for better accuracy
    26. 26. User access rights (Local Admin)
    27. 27. Lack of Scalability
    28. 28. Silos and insufficient collaboration between IT and business operations* </li></ul>*Worldwide State of The Endpoint Report 2009<br />
    29. 29. Consolidate Your Endpoint Security Technologies<br /><ul><li>Multiple Consoles
    30. 30. 3-6 different management consoles on average
    31. 31. Agent Bloat
    32. 32. 3-10 agents* installed per endpoint
    33. 33. Decreased network performance
    34. 34. Lack of Control
    35. 35. 54% of IT security professionals cite managing the complexity of security as their #1 challenge
    36. 36. Decreasing visibility-disparate data
    37. 37. Ad-hoc monitoring of security posture
    38. 38. 43% of existing access rights were either excessive or should have been retired
    39. 39. Increasing TCO of Point Technologies
    40. 40. Integration & Maintenance</li></ul>Lumension Global State of The Worldwide Endpoint 2009<br />22<br />
    41. 41. New Approach to Endpoint Management & Security<br />
    42. 42. Agile Architecture<br />Best of BreedSolution Capability<br />Modular Delivery<br />The Lumension Approach<br />24<br />
    43. 43. Unified Management Console<br /><ul><li>Role-based workflows
    44. 44. Consolidated data
    45. 45. Intuitive web interface
    46. 46. Central control & visibility
    47. 47. Operational & strategic reporting
    48. 48. Improved productivity</li></ul>2009 Integration<br />Endpoint Operations<br />Endpoint Security<br />Compliance<br />25<br />25<br />
    49. 49. Modular Agent – Pluggable Enterprise Service Bus<br />Single common agent delivers and manages many capabilities via pluggable services<br />Provides single, integrated communication mechanism between the agent and the server<br />Monitors and secures modules on the endpoint<br />Patch and Remediation<br />Event Queue<br />Application Control<br />Client Transport<br />COMM<br />Security<br />26<br />26<br />
    50. 50. Lumension® Endpoint Management and Security Suite<br />Single Endpoint Management solution on a unified platform<br />Ease of management<br />Feature extensibility via separately licensed modules<br />Integrated endpoint security workflows<br />Reduced management overhead<br />Integrated console<br />Centralized visibility and control<br />Single agent architecture<br />L.E.M.S.S. Platform<br />Antivirus<br />Application Control<br />Patch & Remediation<br />Power Management<br />n Module<br />27<br />27<br />
    51. 51. Effective and Operational IT Security<br />Effective <br />but not Efficient<br />Effective <br />AND Efficient<br />Many Consoles<br />IT Control Made Simple<br />Single<br />Console <br /><ul><li>Agile platform architecture
    52. 52. Leverage existing endpoint technology
    53. 53. Reduced integration and maintenance costs
    54. 54. Improved endpoint performance
    55. 55. More effective endpoint security</li></ul>Agile architecture<br />Disparate Architecture<br />Single Promotable Agent<br />Many<br />Agents<br />28<br />
    56. 56. Defense-in-Depth<br /><ul><li>Address the core IT risk with Patch & Configuration Management
    57. 57. Stop unwanted / un-trusted change with Application Control
    58. 58. Protect against insider risk with Device Control
    59. 59. Deploy a broad defensive perimeter with AntiVirus
    60. 60. Reduce endpoint complexity with a truly integrated Endpoint Management and Security Suite</li></ul>AntiVirus<br />Device Control<br />Device Control<br />Application Control<br />Application Control<br />Patch & Config.<br />Mgmt.<br />29<br />
    61. 61. Lumension Solution Strategy<br />Endpoint Management & Security<br />“By 2011, leading enterprise endpoint protection platform (EPP) and PC life cycle management (PCLM) vendors will offer mature integrated security and operations tools. IT organizations should understand the benefits of these tools and develop a strategy for adoption.”<br />Peter Firstbrook<br />Gartner Analyst 2009<br />Endpoint Operations<br />Endpoint <br />Security<br />Unified <br />Platform<br />30<br />
    62. 62. Lumension® Endpoint Management and Security Suite<br />Endpoint Operations Management<br />Lumension® AntiVirus<br />Lumension® Patch and Remediation<br />Endpoint Security<br />Endpoint Operations<br />Lumension® Application Control<br />Lumension® Configuration Mgmt.<br />Lumension® Device Control<br />Lumension® Power Management<br /><ul><li>Expanded visibility and control of endpoints - both online and offline
    63. 63. Heterogeneous O/S support
    64. 64. Linux (RHEL), Oracle Enterprise Linux, Microsoft, Mac
    65. 65. Largest 3rd party application vulnerability content support
    66. 66. Adobe, Microsoft, Apple and more
    67. 67. Power Management supports custom power policy definition and reporting
    68. 68. NIST-validated Configuration Management solution
    69. 69. Mandatory baseline import/export for efficient syndication of baseline polices</li></ul>31<br />
    70. 70. Lumension® Endpoint Management and Security Suite<br />Endpoint Security<br />Lumension® AntiVirus<br />Lumension® Patch and Remediation<br />Endpoint Security<br />Endpoint Operations<br />Lumension® Application Control<br />Lumension® Configuration Mgmt.<br />Lumension® Device Control<br />Lumension® Power Management<br /><ul><li>Granular policy-based whitelisting, blacklisting and device policy distribution
    71. 71. Comprehensive discovery of apps, online/offline machines and removable devices
    72. 72. Proactive protection against Zero-day threats
    73. 73. Effective malware removal to ensure cleaned system environments
    74. 74. Integrated workflow across multiple defense layers
    75. 75. Flexible Trust Engine for change mgmt. across processes, paths, users, vendors
    76. 76. Encryption to ensure secure data in the event of accidental or malicious data loss</li></ul>32<br />
    77. 77. Lumension® Endpoint Management and Security Suite<br />Total Endpoint Management<br />Lumension® AntiVirus<br />Lumension® Patch and Remediation<br />Endpoint Security<br />Endpoint Operations<br />Lumension® Application Control<br />Lumension® Configuration Mgmt.<br />Lumension® Device Control<br />Lumension® Power Management<br /><ul><li>Comprehensive solution suite that unifies IT operational and security functions
    78. 78. Delivers a more effective defense-in-depth endpoint security solution
    79. 79. Simplifies endpoint system and agent management through a single console
    80. 80. Centralizes policy management and reporting
    81. 81. Expands operational and security visibility
    82. 82. Reduces technology complexity and integration costs
    83. 83. Flexible and modularly licensed best-of-breed application modules
    84. 84. Scalable and agile single-agent, single-server platform architecture</li></ul>33<br />
    85. 85. Q&A<br />
    86. 86. Global Headquarters<br />8660 East Hartford Drive<br />Suite 300<br />Scottsdale, AZ 85255<br />1.888.725.7828<br />info@lumension.com<br />
    87. 87. Attendee Services<br /><ul><li>Download a copy of today’s presentation
    88. 88. Provide your feedback! Please complete our survey
    89. 89. View our calendar of upcoming events
    90. 90. A recorded version of this seminar will be available at www.eSeminarsLive.com</li></ul>Hosted by<br />

    ×