MAY 18, 2023
Ivanti Security Controls
Copyright © 2023 Ivanti. All rights reserved.
BOD 22-01
Reducing the Significant
Risk of Known Exploited
Vulnerabilities
Copyright © 2023 Ivanti. All rights reserved.
Prioritize vulnerabilities based
on risk. Test, schedule, and
deploy patches in an
automated fashion. Apply Risk
Based Vulnerability
Management practices
Continuously deploy
patches, reducing mean time
to patch for Windows, Linux,
MacOS, and Mobile on
physical, virtual, and cloud-
based infrastructure
Verify patches are installed,
configured, and validated
with agent or agentless
technologies. Central
dashboard on patch status
for all endpoints and SLAs
Through automation,
continuously validate and
monitor the patches are in
place on all endpoints
Discover all endpoints and
software assets along with
their version and vulnerability
information. Display system
security health and risk
scoring.
Continuous Patch
Management for Enterprise
Applications
Helps Agencies meet NIST SP 800-40 Rev. 4 -
Enterprise Patch Guidance
Software Vulnerability
Management Life Cycle
Risk Response
Execution
Deploy the Patch
Verify the Patch Monitor the Deployed
Patches
Inventory Your
Software and Assets
https://csrc.nist.gov/publications/detail/sp/800-40/rev-4/final
Copyright © 2023 Ivanti. All rights reserved.
Ransomware attacks
are increasing in
frequency and
severity every year.
The impact on companies is devastating.
Copyright © 2023 Ivanti. All rights reserved.
Ransomware costs*
Detection and
escalation
Notification Lost business Post breach
response
* Source: IBM Security, “2021 Cost of a Data Breach Report”
$4.62M Average total cost of a ransomware breach – excluding the cost of the ransom
Copyright © 2023 Ivanti. All rights reserved.
The situation is getting worse
No deterrents (25,000
ransomware attacks, <20 arrests)*
Ransomware as a
Service (RaaS)**
CVEs quadrupled** Attackers targeting midmarket*
* Source: Coveware, “Ransomware attackers down shift to 'Mid-Game' hunting in Q3 2021” ** RiskSense, CSW, “Ransomware Through the Lens of Threat and Vulnerability Management”
Copyright © 2023 Ivanti. All rights reserved.
71%
71% of IT and security professionals find
patching to be overly complex and time-
consuming.*
Patching is key –
but not always easy
OF IT & SECURITY
PROFESSIONALS
* Source: Ivanti, “Patch Management Challenges: Survey Results and Insights as Organizations move to Everywhere Workplace”
Copyright © 2023 Ivanti. All rights reserved.
Ivanti Security Controls
Secure
Ivanti Security
Controls
Simplifies security with unified
and automated prevention,
detection, and response
techniques that target your
biggest attack vectors.
Strengths
Patch your virtual
servers – Discover,
inventory, and patch
physical servers, VMs,
and templates,
regardless of power
state or if they are on or
offline.
Patch your Windows and Linux
machines – Detect and
remediate OS and third-party
app vulnerabilities on systems
running Windows, Red Hat
Linux, and CentOS.
Agentless scanning for
rapid startup and zero
footprint.
Manage off-network
devices.
Use Case
• Mix of workstations and servers to patch, mix of online and offline workstations and servers
• Agentless technology supports assessment and deployment to workstations and servers connected to your network while
minimizing the impact on both your team and system workloads
• Agent policies provide a higher degree of accuracy in environments where devices are not continuously connected to the
network
• Air-Gap Network Support for classified environments
• Common Industries: Federal / Banking / Finance / Insurance, Business Service, Manufacturing / Warehousing
Integrate & automate with
other products.
Copyright © 2023 Ivanti. All rights reserved.
Ivanti Security Controls (ISEC) Architecture
Copyright © 2023 Ivanti. All rights reserved.
Extensive Catalog Advanced Capability Cross Platform
Functionality
Vulnerability
Intelligence
Ivanti offers one of the
largest catalog of patches
on the market today.
• Microsoft
• Mac
• Linux
• 3rd party
• Custom Definitions
Ivanti patch solutions
offer unmatched
advanced functionality
• Impact Analysis
• Granular reboots
• Custom Patches
• User Feedback
• Automation
• Compliance
• Seamless patching of
edge devices
• 360° view of your
organizations patch
posture
Ivanti patch solutions
allow for patching cross
platform from a single
solution (on-prem and
Cloud based)
• Windows
• MAC
• Linux
Ivanti Risk-Based
Vulnerability Management
(RBVM)
• Infrastructure,
application, bug-bounty,
and pen testing
vulnerability findings
brought together into a
centralized view
• Insight into what
vulnerabilities are RCE,
Weaponized, and trending
• Vulnerability Risk Rating
(VRR)
Competitive Advantages
Copyright © 2023 Ivanti. All rights reserved.
We make the Everywhere Workplace possible.

Ivanti Security Controls.pptx

  • 1.
    MAY 18, 2023 IvantiSecurity Controls
  • 2.
    Copyright © 2023Ivanti. All rights reserved. BOD 22-01 Reducing the Significant Risk of Known Exploited Vulnerabilities
  • 3.
    Copyright © 2023Ivanti. All rights reserved. Prioritize vulnerabilities based on risk. Test, schedule, and deploy patches in an automated fashion. Apply Risk Based Vulnerability Management practices Continuously deploy patches, reducing mean time to patch for Windows, Linux, MacOS, and Mobile on physical, virtual, and cloud- based infrastructure Verify patches are installed, configured, and validated with agent or agentless technologies. Central dashboard on patch status for all endpoints and SLAs Through automation, continuously validate and monitor the patches are in place on all endpoints Discover all endpoints and software assets along with their version and vulnerability information. Display system security health and risk scoring. Continuous Patch Management for Enterprise Applications Helps Agencies meet NIST SP 800-40 Rev. 4 - Enterprise Patch Guidance Software Vulnerability Management Life Cycle Risk Response Execution Deploy the Patch Verify the Patch Monitor the Deployed Patches Inventory Your Software and Assets https://csrc.nist.gov/publications/detail/sp/800-40/rev-4/final
  • 4.
    Copyright © 2023Ivanti. All rights reserved. Ransomware attacks are increasing in frequency and severity every year. The impact on companies is devastating.
  • 5.
    Copyright © 2023Ivanti. All rights reserved. Ransomware costs* Detection and escalation Notification Lost business Post breach response * Source: IBM Security, “2021 Cost of a Data Breach Report” $4.62M Average total cost of a ransomware breach – excluding the cost of the ransom
  • 6.
    Copyright © 2023Ivanti. All rights reserved. The situation is getting worse No deterrents (25,000 ransomware attacks, <20 arrests)* Ransomware as a Service (RaaS)** CVEs quadrupled** Attackers targeting midmarket* * Source: Coveware, “Ransomware attackers down shift to 'Mid-Game' hunting in Q3 2021” ** RiskSense, CSW, “Ransomware Through the Lens of Threat and Vulnerability Management”
  • 7.
    Copyright © 2023Ivanti. All rights reserved. 71% 71% of IT and security professionals find patching to be overly complex and time- consuming.* Patching is key – but not always easy OF IT & SECURITY PROFESSIONALS * Source: Ivanti, “Patch Management Challenges: Survey Results and Insights as Organizations move to Everywhere Workplace”
  • 8.
    Copyright © 2023Ivanti. All rights reserved. Ivanti Security Controls Secure Ivanti Security Controls Simplifies security with unified and automated prevention, detection, and response techniques that target your biggest attack vectors. Strengths Patch your virtual servers – Discover, inventory, and patch physical servers, VMs, and templates, regardless of power state or if they are on or offline. Patch your Windows and Linux machines – Detect and remediate OS and third-party app vulnerabilities on systems running Windows, Red Hat Linux, and CentOS. Agentless scanning for rapid startup and zero footprint. Manage off-network devices. Use Case • Mix of workstations and servers to patch, mix of online and offline workstations and servers • Agentless technology supports assessment and deployment to workstations and servers connected to your network while minimizing the impact on both your team and system workloads • Agent policies provide a higher degree of accuracy in environments where devices are not continuously connected to the network • Air-Gap Network Support for classified environments • Common Industries: Federal / Banking / Finance / Insurance, Business Service, Manufacturing / Warehousing Integrate & automate with other products.
  • 9.
    Copyright © 2023Ivanti. All rights reserved. Ivanti Security Controls (ISEC) Architecture
  • 10.
    Copyright © 2023Ivanti. All rights reserved. Extensive Catalog Advanced Capability Cross Platform Functionality Vulnerability Intelligence Ivanti offers one of the largest catalog of patches on the market today. • Microsoft • Mac • Linux • 3rd party • Custom Definitions Ivanti patch solutions offer unmatched advanced functionality • Impact Analysis • Granular reboots • Custom Patches • User Feedback • Automation • Compliance • Seamless patching of edge devices • 360° view of your organizations patch posture Ivanti patch solutions allow for patching cross platform from a single solution (on-prem and Cloud based) • Windows • MAC • Linux Ivanti Risk-Based Vulnerability Management (RBVM) • Infrastructure, application, bug-bounty, and pen testing vulnerability findings brought together into a centralized view • Insight into what vulnerabilities are RCE, Weaponized, and trending • Vulnerability Risk Rating (VRR) Competitive Advantages
  • 11.
    Copyright © 2023Ivanti. All rights reserved. We make the Everywhere Workplace possible.

Editor's Notes

  • #2 Welcome… Let’s talk about the rapidly changing business environment…
  • #3 15 days to patch critical vulnerabilities The need for risk-based patch management has even been substantiated by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). On November 3, 2021, CISA issued Binding Operational Directive (BOD) 22-01, “Reducing the Significant Risk of Known Exploited Vulnerabilities”, to drive urgent and prioritized remediation of vulnerabilities that are being actively exploited by adversaries. The Directive establishes a CISA-managed catalog of known exploited vulnerabilities and requires federal civilian agencies to remediate such vulnerabilities within specific timeframes. With this Directive, CISA is imposing the first government-wide requirements to remediate vulnerabilities affecting both internet-facing and non-internet facing assets. While this Directive technically applies only to federal civilian agencies, CISA strongly recommends that private businesses and state, local, tribal and territorial (SLTT) governments prioritize mitigation of vulnerabilities listed in its public catalog.
  • #4 Enterprise patch management is the process of identifying, prioritizing, acquiring, installing, and verifying the installation of patches, updates, and upgrades throughout an organization. Patching is more important than ever because of the increasing reliance on technology, but there is often a divide between business/mission owners and security/technology management about the value of patching.
  • #5 Ransomware attacks are increasing in frequency and severity every year. The impact to companies is devastating.
  • #6 Ransomware attacks typically lead to lost business for companies as they tend to cause increased system downtime, diminished reputation, customer turnover and other adverse side effects. On top of that, there are also costs associated with detecting and escalating a ransomware breach, notifying data subjects, data protection regulators and other third parties, and post-breach response activities, such as paying out compensation for victims and regulatory fines. When combined, these costs average a total of $4.62 million per ransomware breach – and that’s excluding the cost of the ransom.
  • #7 Unfortunately, the situation is likely to get worse before it gets better. In 2020, less than 20 arrests were made globally in connection with ransomware attacks despite the fact there were an estimated 25,000 attacks of impact in the same year – a ratio that is hardly a deterrent for would-be ransomware actors. In addition, the barriers to entry to becoming a ransomware actor are eroding as well. Ransomware as a service (RaaS) enables just about anyone to get in on the action – no security knowledge or coding expertise required. To top it all off, the number of Common Vulnerabilities and Exposures (CVEs) into networks nearly quadrupled in 2020 alone, and ransomware attackers are increasingly targeting midmarket companies to avoid the media attention that comes with attacking large enterprises. It seems no one is safe and there’s nowhere to hide.
  • #8 Until ransomware attacks and other data breaches are a thing of the past – a day that may never come based on their current trajectory – organizations must take steps to protect against them. Patching to fix CVEs is one of the best things an organization can do to counter ransomware attacks. Unfortunately, 71% of IT and security professionals find patching to be overly complex and time-consuming.
  • #12 Thank you!