SlideShare a Scribd company logo
WEBINAR
5 WAYS TO TIGHTEN SECURITY WITH
ENDPOINT MANAGEMENT
Expert Panel
Jason Forsgren
Product Manager
Unified Endpoint Management
Eran Livne
Principal Product Manager
Security
FULLY PREPARED TO SUPPORT ALL
MODERN ENDPOINT MANAGEMENT
REQUIREMENTS
LAPTOP PCMOBILE DEVICE
35%70%
40%
USE INSECURE
METHODS OF SHARING
COMPANY DATA
PERSONALLY OWN
THE DEVICES THEY
WORK WITH
50%
BUSINESS TASKS ARE
PERFORMED OUTSIDE
PHYSICAL WORKPLACE
5%
© 2017 Enterprise Management Associates, Inc.
What are the biggest challenges of
supporting end user productivity in
your organization?
48%
Ensuring Data
SECURITY
48%
0% 10% 20% 30% 40% 50% 60%
Metering software licenses
Tracking assets and their use
Achieving compliance requirements
Reducing the cost of software
Remotely accessing/supporting user devices
Rapidly patching all supported endpoints
Creating a consistent user experience across multiple device
types
Working with multiple independent management solutions
Delivering common apps to a broad range of device types
Supporting multi-device architectures
Reducing the cost of IT management
Ensuring data security
© 2017 Enterprise Management Associates, Inc.
Which of the following security
breaches occurred in the
last 12 months in your organization?
32%
13%
14%
14%
29%
32%
40%
50%
0% 10% 20% 30% 40% 50% 60%
None of the above
Internal company network security was breached
Business data was transferred outside a company network
A user device was rooted or jailbroken
A user device was stolen
A user device was lost
A user downloaded a "trojaned" or malicious application
A user device was infected with a virus
© 2017 Enterprise Management Associates, Inc.
Only Security Only IT
Security
Alerts
Privilege
Management
Server OS
Patching
Application
Whitelisting
Setting IT Access
Control Panels
Both
1 2 3 4
Inventory
Authorized /
Unauthorized
Devices
Inventory
Authorized /
Unauthorized
Software
Secure
Configurations
for Hardware
and Software
Continuous
Vulnerability
Assessment and
Remediation
5
Controlled Use
of Administrative
Privileges
“First 5 CIS Controls provide
an effective defense
against ~85% of cyber attacks”
Center for Internet Security (CIS)
I NEED TO… BENEFITS
…track devices in real time Monitor hardware and software usage over time
…determine what devices are
connected to my
network and when
Discover wireless access points to identify security
vulnerabilities
Inventory of authorized and unauthorized devices
1 2 3 4 5
You can’t manage, what you don’t know. Without an
understanding of what devices are connected, they cannot be
defended
Approximately what percentages of
users in your organization regularly
use each of the following devices?
(Average)
50%
Use both
PC & Mobile Device
Inventory of authorized and unauthorized software
1 2 3 4 5
…compile a comprehensive
hardware and software
Inventory across all OS
Discover all devices. Know what you have, where it is,
and how it’s used on all operating system types
I NEED TO… BENEFITS
…track from a single location
Software inventory system tied to the hardware asset
inventory so all devices and associated software is
tracked from a single location
…deploy application whitelisting Limit the ability to run applications to only those which
are explicitly approved
What percentages of users in your
organization regularly use each of the
following devices?
32%
24%
20%
4%
12%
5%3%
Laptops
Windows 10
Windows 7
Windows 8
Windows XP
macOS
Chromebooks
Linux
36%
25%
24%
3%
8%
4%
Desktops
Windows 10
Windows 7
Windows 8
Windows XP
macOS
Linux
© 2017 Enterprise Management Associates, Inc.
44%
43%
7%
2%4%
Smartphone
Apple iOS
Android
Windows 10
Mobile
Windows Phone
7/8
BlackBerry
37%
25%
13%
12%
8%
5%
Tablet
Apple iOS
Android
Windows 10
Mobile
Windows
Pro 7
Windows
Pro 8
How critical is support for Apple
devices to the success of your
business today, and how critical is it
expected to be in the future?(Organizations supporting Apple devices, only)
10%
7%
6%
6%
30%
31%
27%
27%
36%
36%
35%
26%
24%
26%
32%
41%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
current
6 months
12 months
2 years
not at all critical somewhat critical critical very critical
© 2017 Enterprise Management Associates, Inc.
Which of the following types of
management platforms does your
organization currently use and expect
to use in the future for PC and mobile
device management?
27%
41%
57%
31%
33%
22%
21%
9%
7%
17%
11%
4%
5%
7%
10%
0% 20% 40% 60% 80% 100%
Currently use
Within the next year
Within the next 3 years
single unified management platform independent management platforms
PC management platform only mobile management platform only
None
Which of the following best describes
your organization’s primary driver(s)
for adopting a unified endpoint
management solution? (UEM adopters only)
13%
13%
16%
16%
19%
22%
31%
34%
41%
41%
47%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
Simplify application delivery
Consolidate user profiles
Reduce management costs
Improve workforce morale/rentention
Achieve compliance requirements
Facilitate data loss prevention
Improve user experiences
Increase workforce productivity
Simplify device management
Reduce adminsitration complexity
Centralize management of security policies
© 2017 Enterprise Management Associates, Inc.
I NEED TO… BENEFITS
…build a secure image
Build a secure image to build all new systems in the
enterprise. Any existing system that becomes
compromised should be re-imaged with the secure
build.
…use tools compliant with SCAP
Use tools compliant with the Security Content
Automation Protocol (SCAP) in order to streamline
reporting and integration
Secure Configurations for Hardware and Software
1 2 3 4 5
Secure configuration for hardware and software on mobile
devices, laptops, workstations, and servers
I NEED TO… BENEFITS
…patch operating systems
Deploy automated patch management tools for
operating system on all systems, even those that are
properly air-gapped
…patch third-party application
vulnerabilities
Automatic, ongoing, and proactive installation of
updates to address software vulnerabilities
Continuous Vulnerability Assessment and Remediation
1 2 3 4 5
Deploy automated patch management tools and software
update tools
20-36%
Use manual / partly
automated patch
process
During an average week, how much
administrator time is spent on each
of the following tasks?
25%
23%
22%
18%
20%
17%
10%
7%
8%
42%
30%
35%
41%
36%
33%
27%
28%
23%
29%
41%
34%
31%
33%
32%
41%
41%
38%
5%
5%
9%
10%
11%
15%
16%
22%
24%
2%
1%
1%
1%
4%
6%
3%
8%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Installing/configuring a new PC
Installing/configuring a new mobile device
Managing user policies/profiles
Auditing IT Assets
Patching/updating
Distributing/publishing new software
Troubleshooting user desktop problems
Troubleshooting user application problems
Ensuring data security
little or no time some time average amount of time significant amount of time majority of time
© 2017 Enterprise Management Associates, Inc.
I NEED TO… BENEFITS
…remove unnecessary system
rights or permissions
Avoid local system or even domain administrator rights
which might lead to misuse
Controlled Use of Administrative Privileges
1 2 3 4 5
Ensure employees have the system rights, privileges, and
permissions they need to do their job – no more and no less
than necessary
1 2 3 4
Inventory
Authorized /
Unauthorized
Devices
Inventory
Authorized /
Unauthorized
Software
Secure
Configurations
for Hardware
and Software
Continuous
Vulnerability
Assessment and
Remediation
5
Controlled Use
of Administrative
Privileges
5 Ways to Tighten Security with Endpoint Management
Thank You
www.ivanti.com

More Related Content

What's hot

Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
jmariani14
 
Implementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDMImplementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDM
Quick Heal Technologies Ltd.
 
Everything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security ControlsEverything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security Controls
Ivanti
 
SanerNow Vulnerability Management
SanerNow Vulnerability ManagementSanerNow Vulnerability Management
SanerNow Vulnerability Management
SecPod Technologies
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
Tieu Luu
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public SectorSolarWinds
 
North America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network ComplexityNorth America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network Complexity
SolarWinds
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
Resolver Inc.
 
DevOps Indonesia #14 - Monitoring Principles
DevOps Indonesia #14 - Monitoring PrinciplesDevOps Indonesia #14 - Monitoring Principles
DevOps Indonesia #14 - Monitoring Principles
DevOps Indonesia
 
Introduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects AnalysisIntroduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects Analysis
Ann Marie Neufelder
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability ManagementVicky Ames
 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability Management
Chris Furton
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
Tripwire
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
SolarWinds
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Enterprise Management Associates
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityEnclaveSecurity
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
jmariani14
 
Software fmea for medical devices
Software fmea for medical devicesSoftware fmea for medical devices
Software fmea for medical devices
OnlineCompliance Panel
 

What's hot (20)

Results deck pc refresh
Results deck pc refreshResults deck pc refresh
Results deck pc refresh
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
 
Implementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDMImplementing next generation mobile app strategies with Seqrite MDM
Implementing next generation mobile app strategies with Seqrite MDM
 
Everything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security ControlsEverything You Need To Know About Ivanti Security Controls
Everything You Need To Know About Ivanti Security Controls
 
SanerNow Vulnerability Management
SanerNow Vulnerability ManagementSanerNow Vulnerability Management
SanerNow Vulnerability Management
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
 
North America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network ComplexityNorth America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network Complexity
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
DevOps Indonesia #14 - Monitoring Principles
DevOps Indonesia #14 - Monitoring PrinciplesDevOps Indonesia #14 - Monitoring Principles
DevOps Indonesia #14 - Monitoring Principles
 
Introduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects AnalysisIntroduction to Software Failure Modes Effects Analysis
Introduction to Software Failure Modes Effects Analysis
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Configuration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability ManagementConfiguration Management: a Critical Component to Vulnerability Management
Configuration Management: a Critical Component to Vulnerability Management
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Software fmea for medical devices
Software fmea for medical devicesSoftware fmea for medical devices
Software fmea for medical devices
 

Similar to 5 Ways to Tighten Security with Endpoint Management

Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous IntegrationExperitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA Audit
David Sweigert
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DNUG e.V.
 
Mobile Testing in the Cloud
Mobile Testing in the CloudMobile Testing in the Cloud
Mobile Testing in the Cloud
Keynote Mobile Testing
 
The real cost of it franken monitoring
The real cost of it franken monitoringThe real cost of it franken monitoring
The real cost of it franken monitoring
AppDynamics
 
Virtual Desktop Success in Healthcare
Virtual Desktop Success in HealthcareVirtual Desktop Success in Healthcare
Virtual Desktop Success in Healthcare
eG Innovations
 
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
DNUG e.V.
 
Microsoft and DevOps
Microsoft and DevOpsMicrosoft and DevOps
Microsoft and DevOpsJames Tramel
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
Lora O'Haver
 
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
AnnaBtki
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
sunnay
 
Webinar: Gaining Control and Visibility of Your Virtualized Infrastructure
Webinar: Gaining Control and Visibility of Your Virtualized InfrastructureWebinar: Gaining Control and Visibility of Your Virtualized Infrastructure
Webinar: Gaining Control and Visibility of Your Virtualized Infrastructure
Pepperweed Consulting
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
SolarWinds
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalOscar Williams
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
Rogue Wave Software
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
i_Mobile Testing Service Desk_Own
i_Mobile Testing Service Desk_Owni_Mobile Testing Service Desk_Own
i_Mobile Testing Service Desk_OwnGopi Raghavendra
 

Similar to 5 Ways to Tighten Security with Endpoint Management (20)

2016_Brochure_Book
2016_Brochure_Book2016_Brochure_Book
2016_Brochure_Book
 
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous IntegrationExperitest-Infosys Co-Webinar on Mobile Continuous Integration
Experitest-Infosys Co-Webinar on Mobile Continuous Integration
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA Audit
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Mobile Testing in the Cloud
Mobile Testing in the CloudMobile Testing in the Cloud
Mobile Testing in the Cloud
 
The real cost of it franken monitoring
The real cost of it franken monitoringThe real cost of it franken monitoring
The real cost of it franken monitoring
 
Virtual Desktop Success in Healthcare
Virtual Desktop Success in HealthcareVirtual Desktop Success in Healthcare
Virtual Desktop Success in Healthcare
 
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdfHCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
HCL BigFix - The Endpoint Management Platform - DNUG Stammtisch Hamburg.pdf
 
Microsoft and DevOps
Microsoft and DevOpsMicrosoft and DevOps
Microsoft and DevOps
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
 
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
How do YOU compare to others in Mobile DevOps Performance, Productivity, and ...
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Webinar: Gaining Control and Visibility of Your Virtualized Infrastructure
Webinar: Gaining Control and Visibility of Your Virtualized InfrastructureWebinar: Gaining Control and Visibility of Your Virtualized Infrastructure
Webinar: Gaining Control and Visibility of Your Virtualized Infrastructure
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
i_Mobile Testing Service Desk_Own
i_Mobile Testing Service Desk_Owni_Mobile Testing Service Desk_Own
i_Mobile Testing Service Desk_Own
 

More from Ivanti

Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
Ivanti
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
Ivanti
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
Ivanti
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
Ivanti
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
Ivanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
Ivanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
Ivanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
Ivanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
Ivanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
Ivanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
Ivanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
Ivanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
Ivanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
Ivanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
Ivanti
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
Ivanti
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
Ivanti
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
Ivanti
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
Ivanti
 

More from Ivanti (20)

Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

5 Ways to Tighten Security with Endpoint Management

  • 1. WEBINAR 5 WAYS TO TIGHTEN SECURITY WITH ENDPOINT MANAGEMENT
  • 2. Expert Panel Jason Forsgren Product Manager Unified Endpoint Management Eran Livne Principal Product Manager Security
  • 3. FULLY PREPARED TO SUPPORT ALL MODERN ENDPOINT MANAGEMENT REQUIREMENTS LAPTOP PCMOBILE DEVICE 35%70% 40% USE INSECURE METHODS OF SHARING COMPANY DATA PERSONALLY OWN THE DEVICES THEY WORK WITH 50% BUSINESS TASKS ARE PERFORMED OUTSIDE PHYSICAL WORKPLACE 5% © 2017 Enterprise Management Associates, Inc.
  • 4.
  • 5. What are the biggest challenges of supporting end user productivity in your organization?
  • 7. 48% 0% 10% 20% 30% 40% 50% 60% Metering software licenses Tracking assets and their use Achieving compliance requirements Reducing the cost of software Remotely accessing/supporting user devices Rapidly patching all supported endpoints Creating a consistent user experience across multiple device types Working with multiple independent management solutions Delivering common apps to a broad range of device types Supporting multi-device architectures Reducing the cost of IT management Ensuring data security © 2017 Enterprise Management Associates, Inc.
  • 8. Which of the following security breaches occurred in the last 12 months in your organization?
  • 9. 32% 13% 14% 14% 29% 32% 40% 50% 0% 10% 20% 30% 40% 50% 60% None of the above Internal company network security was breached Business data was transferred outside a company network A user device was rooted or jailbroken A user device was stolen A user device was lost A user downloaded a "trojaned" or malicious application A user device was infected with a virus © 2017 Enterprise Management Associates, Inc.
  • 10.
  • 11. Only Security Only IT Security Alerts Privilege Management Server OS Patching Application Whitelisting Setting IT Access Control Panels Both
  • 12. 1 2 3 4 Inventory Authorized / Unauthorized Devices Inventory Authorized / Unauthorized Software Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation 5 Controlled Use of Administrative Privileges
  • 13. “First 5 CIS Controls provide an effective defense against ~85% of cyber attacks” Center for Internet Security (CIS)
  • 14. I NEED TO… BENEFITS …track devices in real time Monitor hardware and software usage over time …determine what devices are connected to my network and when Discover wireless access points to identify security vulnerabilities Inventory of authorized and unauthorized devices 1 2 3 4 5 You can’t manage, what you don’t know. Without an understanding of what devices are connected, they cannot be defended
  • 15. Approximately what percentages of users in your organization regularly use each of the following devices? (Average)
  • 16. 50% Use both PC & Mobile Device
  • 17. Inventory of authorized and unauthorized software 1 2 3 4 5 …compile a comprehensive hardware and software Inventory across all OS Discover all devices. Know what you have, where it is, and how it’s used on all operating system types I NEED TO… BENEFITS …track from a single location Software inventory system tied to the hardware asset inventory so all devices and associated software is tracked from a single location …deploy application whitelisting Limit the ability to run applications to only those which are explicitly approved
  • 18. What percentages of users in your organization regularly use each of the following devices?
  • 19. 32% 24% 20% 4% 12% 5%3% Laptops Windows 10 Windows 7 Windows 8 Windows XP macOS Chromebooks Linux 36% 25% 24% 3% 8% 4% Desktops Windows 10 Windows 7 Windows 8 Windows XP macOS Linux © 2017 Enterprise Management Associates, Inc. 44% 43% 7% 2%4% Smartphone Apple iOS Android Windows 10 Mobile Windows Phone 7/8 BlackBerry 37% 25% 13% 12% 8% 5% Tablet Apple iOS Android Windows 10 Mobile Windows Pro 7 Windows Pro 8
  • 20. How critical is support for Apple devices to the success of your business today, and how critical is it expected to be in the future?(Organizations supporting Apple devices, only)
  • 21. 10% 7% 6% 6% 30% 31% 27% 27% 36% 36% 35% 26% 24% 26% 32% 41% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% current 6 months 12 months 2 years not at all critical somewhat critical critical very critical © 2017 Enterprise Management Associates, Inc.
  • 22. Which of the following types of management platforms does your organization currently use and expect to use in the future for PC and mobile device management?
  • 23. 27% 41% 57% 31% 33% 22% 21% 9% 7% 17% 11% 4% 5% 7% 10% 0% 20% 40% 60% 80% 100% Currently use Within the next year Within the next 3 years single unified management platform independent management platforms PC management platform only mobile management platform only None
  • 24. Which of the following best describes your organization’s primary driver(s) for adopting a unified endpoint management solution? (UEM adopters only)
  • 25. 13% 13% 16% 16% 19% 22% 31% 34% 41% 41% 47% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Simplify application delivery Consolidate user profiles Reduce management costs Improve workforce morale/rentention Achieve compliance requirements Facilitate data loss prevention Improve user experiences Increase workforce productivity Simplify device management Reduce adminsitration complexity Centralize management of security policies © 2017 Enterprise Management Associates, Inc.
  • 26. I NEED TO… BENEFITS …build a secure image Build a secure image to build all new systems in the enterprise. Any existing system that becomes compromised should be re-imaged with the secure build. …use tools compliant with SCAP Use tools compliant with the Security Content Automation Protocol (SCAP) in order to streamline reporting and integration Secure Configurations for Hardware and Software 1 2 3 4 5 Secure configuration for hardware and software on mobile devices, laptops, workstations, and servers
  • 27.
  • 28. I NEED TO… BENEFITS …patch operating systems Deploy automated patch management tools for operating system on all systems, even those that are properly air-gapped …patch third-party application vulnerabilities Automatic, ongoing, and proactive installation of updates to address software vulnerabilities Continuous Vulnerability Assessment and Remediation 1 2 3 4 5 Deploy automated patch management tools and software update tools
  • 29. 20-36% Use manual / partly automated patch process
  • 30. During an average week, how much administrator time is spent on each of the following tasks?
  • 31. 25% 23% 22% 18% 20% 17% 10% 7% 8% 42% 30% 35% 41% 36% 33% 27% 28% 23% 29% 41% 34% 31% 33% 32% 41% 41% 38% 5% 5% 9% 10% 11% 15% 16% 22% 24% 2% 1% 1% 1% 4% 6% 3% 8% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Installing/configuring a new PC Installing/configuring a new mobile device Managing user policies/profiles Auditing IT Assets Patching/updating Distributing/publishing new software Troubleshooting user desktop problems Troubleshooting user application problems Ensuring data security little or no time some time average amount of time significant amount of time majority of time © 2017 Enterprise Management Associates, Inc.
  • 32. I NEED TO… BENEFITS …remove unnecessary system rights or permissions Avoid local system or even domain administrator rights which might lead to misuse Controlled Use of Administrative Privileges 1 2 3 4 5 Ensure employees have the system rights, privileges, and permissions they need to do their job – no more and no less than necessary
  • 33. 1 2 3 4 Inventory Authorized / Unauthorized Devices Inventory Authorized / Unauthorized Software Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation 5 Controlled Use of Administrative Privileges 5 Ways to Tighten Security with Endpoint Management

Editor's Notes

  1. Let’s dive into the research highlights 70 percent of mobile device users and 35 percent of laptop PC users report they personally own the devices they use to perform their jobs 40 percent of surveyed end users report they regularly use insecure methods for sharing company data On average, 50 percent of all business tasks are performed outside the physical workplace Only 5 percent of surveyed organizations indicate they are fully prepared to support all modern endpoint management requirements 
  2. The information we are reviewing today Research conducted by EMA on UEM surveying 100 respondents IT Directors and above Digital Workspaces Survey surveying 200 End users and 100 IT Managers Best Practices from the Center of Internet Security
  3. What are the biggest challenges of supporting end user productivity in your organization? A typical IT support organization must today support a minimum of four different operating environments, each with unique configurations, applications, services, and security protocols. the need to support multi-device architectures ranks among the top three challenges in supporting user productivity. the other two leading challenges (ensuring data security and reducing IT management costs) are directly related to multi-device support requirements. Q: why do you think ensuring data security increases in direct proportion to multi-device support requirements? Achieving security is difficult because each device architecture has its own set of constantly-changing vulnerabilities. Protecting business applications and data requires monitoring, authentication, encryption, resource isolation, and patching solutions all tailored to meet the exacting requirements of the endpoint devices from which they are being accessed. Similarly, the cost of IT management increases proportional to the number of device architectures in the support stack, as each requires dedicated tools and administrators specifically trained on their use.
  4. Question in report: “Which of the following security breaches occurred in the last 12 months in your organization? Security was repeatedly noted as a primary focus for IT managers across EMA’s survey results. In addition to being the most challenging to support, security was identified as the most time-consuming, the most difficult, and the most costly administration practice. Even with all this attention, organizations continue to experience significant breaches in endpoint security. More than half of all IT managers surveyed by EMA indicated they had to deal with a malware event (e.g., a virus infection or Trojaned application) in just the last year. Also, 45% reported a device was lost or stolen, which may have placed the company at risk if those devices contained any sensitive data or access to business services. In total, 68% of respondents indicated a security breach occurred in the last year, and these are just the ones they knew about. Far more insidious are security breaches that occur and are not detected by organizations simply because they lack the essential monitoring tools to enable risk management.
  5. Security wants everything locked-down and IT is user-oriented (freedom, ease of use). Competing philosophies. Operational Security – dictated by security, implemented by IT guys
  6. CIS is an example of a bridge of IT and security (requirements are security but highly operational)….good example to start “The CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today's most pervasive and dangerous attacks. A principal benefit of the Controls is that they prioritize and focus a smaller number of actions with high pay-off results … They were created by the people who know how attacks work - NSA Red and Blue teams, the US Department of Energy nuclear energy labs, law enforcement organizations and some of the nation's top forensics and incident response organizations.” https://www.sans.org/critical-security-controls
  7. The first 5 CIS Controls are often referred to as providing cybersecurity "hygiene," and studies show that implementation of the first 5 CIS Controls provides an effective defense against the most common cyber attacks (~85% of attacks). https://www.cisecurity.org/controls/
  8. This Control requires both technical and procedural actions, united in a process that accounts for and manages the inventory of hardware and all associated information throughout its life cycle” CIS Control 1 Inventory of Authorized & Unauthorized Devices This CIS Control helps organizations define a baseline of what must be defended. Without an understanding of what devices and data are connected, they cannot be defended. The inventory process should be as comprehensive as possible, and scanners (both active and passive) that can detect devices are the place to start. After an organization has accurately inventoried their systems, the next step is to prevent unauthorized devices from joining a network—this is where implementation of network level authentication excels. The initial goal of CIS Control 1 is not to prevent attackers from joining the network, as much as it is to understand what is on the network so it can be defended
  9. the average business professional regularly employs at least 2 computing devices—including desktops, laptops, tablets, and smartphones—to perform job tasks. Roughly half of all workers utilize both a PC and a mobile device in the course of a typical day at the office.
  10. CIS Control 2 Inventory of Authorized & Unauthorized Software The purpose of this CIS Control is to ensure that only authorized software is allowed to run on an organization’s systems. While an inventory of software is important, application whitelisting is a crucial part of this process, as it limits the ability to run applications to only those which are explicitly approved. While not a silver bullet for defense, this CIS Control is often considered one of the most effective at preventing and detecting cyberattacks. Implementing CIS Control 2 often requires organizations to reconsider their policies and culture—no longer will users be able to install software whenever and wherever they like. But this CIS Control, already successfully implemented by numerous organizations, will likely provide immediate returns to an organization attempting to prevent and detect cyber attacks. Deploy software inventory tools throughout the organization covering each of the operating system types in use.” “The software inventory systems must be tied into the hardware asset inventory so all devices and associated software are tracked from a single location” “Deploy application whitelisting…”
  11. Approximately what percentages of users in your organization regularly use each of the following devices? (PCs by platform)
  12. Approximately what percentages of users in your organization regularly use each of the following devices? We live in a multi-device world. According to EMA primary research, the average business professional regularly employs at least 2 computing devices—including desktops, laptops, tablets, and smartphones—to perform job tasks. Roughly half of all workers utilize both a PC and a mobile device in the course of a typical day at the office. While desktop and laptop PCs continue to be the primary resources for performing job tasks, increased requirements for supporting workforce mobility has led to the broad adoption and use of mobile devices as well. Q: what is your take on that and what does this mean from an endpoint and security perspective? Roughly half of all business tasks are now performed outside a physical workplace and beyond the control of secured networks. All of these factors conspire together to radically increase the burden of endpoint management requirements on IT support professionals. Less than a decade ago, organizations principally standardized endpoint environments on a single platform: Windows. Since then, the extensive adoption and use of mobile devices has not only exponentially increased the number of physical endpoints that need to be supported; it also broadened the number of operating systems that must be secured and managed. While Apple iOS and Android devices have consistently dominated the mobile market, Microsoft Windows has recently gained significant growth in the enterprise tablet market. Q: How do you see the impact of Windows 10 on organizations, … Much of this success can be attributed the introduction of Windows 10, which was architected to unify the operating system across all endpoint devices, allowing common applications to be used on different devices without any rebuilding or recompiling. EMA market trending analysis indicates Windows 10 tablet adoption is directly stealing market share from Android devices and is frequently employed by organizations that are purchasing tablets for their workers.
  13. Approximately what percentages of users in your organization regularly use each of the following devices? (PCs by platform)
  14. How critical is support for Apple devices to the success of your business today, and how critical is it expected to be in the future? (Organizations supporting Apple devices, only) While Windows 10 adoption has also been very aggressive in the PC market, the enterprise use of Macs has also increased (doubling since 2015), and the introduction of Chromebooks to many workplaces has only served to further increase endpoint heterogeneity. As organizations increasingly adopt Apple devices to accommodate user preferences and evolving business requirements, the importance placed on support for Apple devices is growing proportionally. 24% of survey respondents from organizations that manage Apple devices indicated support for MacOS and iOS platforms was “very critical” to their business success. However, respondents also indicated that that number can be expected to rise to 41% within the next two years. Comparing MacOS adoption rates with EMA research results from one year prior indicates the business use of Apple laptops and desktops has increased by roughly 40% in that timeframe. Additionally, iPhones and iPads continue to dominate the enterprise mobile management market. There is no indication that these trends are slowing down, so organization are increasing being pressured to provide more extensible support for Apple devices Q: What impact will this rise in Apple devices have on organizations and what should they take into consideration to better support, manage and secure their heterogeneous environments? This implies an expanding IT management challenge is evolving since organizations supporting Apple devices reported a greater-than-average difficulty in performing related management practices. This is indicative of the fact that MacOS and iOS platforms require specialized support resources that are not commonly included in management solutions that were principally designed to support Windows architectures.
  15. CIS Control 3 Secure Configurations for Hardware & Software on Mobile Devices, Laptops, Workstations, & Servers By default, most systems are configured for ease-of-use and not necessarily security. In order to meet CIS Control 3, organizations need to reconfigure systems to a secure standard. Many organizations already have the technology necessary to securely configure systems at scale, such as Microsoft® Active Directory Group Policy Objects and Unix Puppet or Chef. By utilizing configuration standards such as the CIS Benchmarks, most organizations can successfully implement this CIS Control. The consensus-driven CIS Benchmarks are freely available for most operating systems, middleware and software applications, and network devices. ”…building a secure image that is used to build all new systems that are deployed in the enterprise. Any existing system that becomes compromised should be re-imaged with the secure build” “…use tools compliant with the Security Content Automation Protocol (SCAP) in order to streamline reporting and integration.”
  16. Https://www.sans.org/reading-room/whitepapers/analyst/2017-threat-landscape-survey-users-front-line-37910
  17. CIS Control 4 Continuous Vulnerability Assessment & Remediation The goal of this CIS Control is to understand and remove technical weaknesses that exist in an organization’s information systems. Successful organizations implement patch management systems that cover both operating system and third-party application vulnerabilities. This allows for the automatic, ongoing, and proactive installation of updates to address software vulnerabilities. In addition to patch management systems, organizations must implement a commercial vulnerability management system to give themselves the ability to detect and remediate exploitable software weaknesses. “Deploy automated patch management tools and software update tools for operating system and software/applications on all systems ... Patches should be applied to all systems, even systems that are properly air gapped.”
  18. There can be no question that IT administrators are excessively busy supporting the constant barrage of end-user requests and business requirements. Among the many management practices, security accounts for the most administration time, with one-third of survey respondents indicating security tasks take a significant amount or the majority of administrator time to complete. should invest in a more robust monitoring, authentication, and risk mitigation platform to simplify support requirements and improve operational cost-effectiveness. Additionally, real-time response to security threats is essential to reducing or eliminating breach events. The longer it takes to identify potential risks and remediate security threats, the more likely it is that an attack will be successful.
  19. Eran: what are the security implications Jason: what are the challenges of running a machine without admin rights CIS Control 5 Controlled Use of Administrative Privileges This CIS Control ensures that workforce members have only the system rights, privileges, and permissions that they need in order to do their job—no more and no less than necessary. Unfortunately, for the sake of speed and convenience, many organizations allow staff to have local system or even domain administrator rights which are too generous and open the door for abuse, accidental or otherwise. The simple answer for CIS Control 5 is to remove unnecessary system rights or permissions. For larger organizations struggling with this task at scale, privilege management vendors can provide endpoint solutions to help lessen the administrative burden.
  20. Summary Tie into UEM Jason: discover – provide insight – take action with UEM solutions “The CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today's most pervasive and dangerous attacks. A principal benefit of the Controls is that they prioritize and focus a smaller number of actions with high pay-off results … They were created by the people who know how attacks work - NSA Red and Blue teams, the US Department of Energy nuclear energy labs, law enforcement organizations and some of the nation's top forensics and incident response organizations.” https://www.sans.org/critical-security-controls