How can you effectively and cost-efficiently manage and secure your endpoints in today’s evolving IT environment? By managing endpoints throughout your entire lifecycle. It’s not simply about adding new security layers – i.e. antivirus, patch management, configuration management, etc. – but how these capabilities work together without degrading endpoint performance and, subsequently, end-user and IT productivity.
In this Webcast, you will learn:
1. Strategies that enable IT operations and security to effectively break down the traditional silos to reduce IT risk and improve overall productivity;
2. How to centralize management and visibility of your entire endpoint environment – across physical and virtual machines, online and offline systems, and a variety of operating systems and applications;
3. How to ensure an effective, defense-in-depth security approach;
4. Key capabilities to look for in an endpoint management and security suite;
5. Cost benefits of consolidating best-of-breed endpoint operations and security technologies into one unified solution.
Featured Speakers
Mike Rothman - Analyst & President - Securosis
Paul Zimski - VP of Solution Strategy - Lumension
Salvatore Salamone - Executive Editor, Strategic Content - Ziff Davis Enterprise
5. Over the past few years, lots of stuff has been added to endpoint agents: Anti-spyware HIPS Firewall Encryption 10 lbs of **** in a 2 lb. bag Endpoint Agent Overload
6. Problem: Scale Attacks aplenty Millions of new malware samples Automated attack kits Financial motives brings new attackers The problem isn’t getting better
7. Problem: Effectiveness Detection rates on slippery downward slope Today’s attacks are not predictable Attacks target different exposures Web browsers Applications (XSS & CSRF)
14. Operating Systems Operating systems are getting more secure (relatively) Windows 7, Mac OS X Mobile OS lockdown and control (iOS vs. Android) But it’s still a lot of code and there will be problems Anti-Exploitation Techniques Data Execution Prevention (DEP) Address Space Layout Randomization (ASLR)
15. Endpoint Security Fundamentals Patch and Update Secure Configurations HIPS/file integrity monitoring System lockdown (standard user, GPO, white listing)
18. Summary Endpoint security is not dead, nor is it a panacea Agent technologies evolving Management silos hurt efficiency and effectiveness Defense in depth still critical Pay attention to the fundamentals
19. Mike Rothman Securosis LLC mrothman@securosis.com http://securosis.com Twitter: @securityincite
49. Modular Agent – Pluggable Enterprise Service Bus Single common agent delivers and manages many capabilities via pluggable services Provides single, integrated communication mechanism between the agent and the server Monitors and secures modules on the endpoint Patch and Remediation Event Queue Application Control Client Transport COMM Security 26 26
50. Lumension® Endpoint Management and Security Suite Single Endpoint Management solution on a unified platform Ease of management Feature extensibility via separately licensed modules Integrated endpoint security workflows Reduced management overhead Integrated console Centralized visibility and control Single agent architecture L.E.M.S.S. Platform Antivirus Application Control Patch & Remediation Power Management n Module 27 27
60. Reduce endpoint complexity with a truly integrated Endpoint Management and Security SuiteAntiVirus Device Control Device Control Application Control Application Control Patch & Config. Mgmt. 29
61. Lumension Solution Strategy Endpoint Management & Security “By 2011, leading enterprise endpoint protection platform (EPP) and PC life cycle management (PCLM) vendors will offer mature integrated security and operations tools. IT organizations should understand the benefits of these tools and develop a strategy for adoption.” Peter Firstbrook Gartner Analyst 2009 Endpoint Operations Endpoint Security Unified Platform 30
90. A recorded version of this seminar will be available at www.eSeminarsLive.comHosted by
Editor's Notes
49% of endpoint TCO is associated with security and operational management** Complex system managementDecreased endpoint performance and lack of scalability-Agent BloatCostly integration, and maintenance Limited visibility and collaboration
Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
“Over 90% of cyber attacks exploit known security flaws for which a remediation is available” GartnerAddress the Core Risk: (Patch & Configuration Management)Application vulnerabilitiesConfiguration driftStop Unwanted/Untrusted Change (Application Control)Stop all unknown/untrusted applications from executingGain visibility over endpoint application environmentCombine behavioral analysis of AV and application white list policy together for most effective zero day defenseProtect Against Insider Risk (Device Control)Physical entry of malwareAccidental or malicious data lossDevice visibilityDeploy a Broad Defense (Anti-Virus)Known and fast spreading malwareEfficient malware removableReduce Endpoint Complexity (Endpoint Management and Security Suite)Reduce malware incidents and related costsReduce systems integration and maintenance costsGain visibility across IT operations and security functionsCentralize policy management and reportingSimplified systems managementSocial networking applications were detected in 95% of organizations. **78% of Web 2.0 applications support file transfer.**2/3 of applications have known vulnerabilities.**28% of applications were known to propagate malware.**
Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
Secure and simple were two of the design goals of the Lumension Endpoint management platform. In this platform we have implemented a scalable, agile architecture, best of breed solution capabilities, with modular solution delivery.Let me briefly walk you through this innovative platform.
Reduced complexity via an agile single console-single agent-single server architecture that can manage thousands of endpoints across online and offline states. Delivers best-of-breed modularly licensed, product capabilitiesUnifies IT operational and security workflows to enable greater control visibility, and more effective policy managementSimplified and real time systems, agent, and policy management within a single consoleCentralized reporting and logging to increase accuracy, reduce compliance burden, and enhance visibility