Presentation of new endpoint security management platform from Lumension. Done by Andris Soroka in Warsaw, in headtechnology Poland event Headlight2012.
Next generation SIEM 2012 (global #1 Q1Labs)Andris Soroka
Data Security Solutions made a presentation about new #1 technology by Gartner in SIEM market in the world at headtechnology Baltics annual IT Security conference "Headlight2012" (22nd of May, Riga, Latvia) regarding innovations in IT Security market.
SmartRM is a viral social networking service for sharing confidential content with friends or colleagues in a protected way. The SmartRM software converts PDF documents, videos or audio tracks into encrypted MPEG-21 files that can be shared with anyone you like: only the enabled contacts can read, view, listen, print the content, at the conditions that have been specified. With SmartRM you can know when and how many times your contacts have accessed your files, as well as grant or remove permissions dynamically.
SmartRM services are for all: individuals, professionals and developers. Our basic services are free, and exciting premium features can be purchased with a flexible pricing model.
Free download from http://www.smartrm.com
Next generation SIEM 2012 (global #1 Q1Labs)Andris Soroka
Data Security Solutions made a presentation about new #1 technology by Gartner in SIEM market in the world at headtechnology Baltics annual IT Security conference "Headlight2012" (22nd of May, Riga, Latvia) regarding innovations in IT Security market.
SmartRM is a viral social networking service for sharing confidential content with friends or colleagues in a protected way. The SmartRM software converts PDF documents, videos or audio tracks into encrypted MPEG-21 files that can be shared with anyone you like: only the enabled contacts can read, view, listen, print the content, at the conditions that have been specified. With SmartRM you can know when and how many times your contacts have accessed your files, as well as grant or remove permissions dynamically.
SmartRM services are for all: individuals, professionals and developers. Our basic services are free, and exciting premium features can be purchased with a flexible pricing model.
Free download from http://www.smartrm.com
A superset of the slides I presented on voice biometrics at SxSW Interactive. The session (in conjunction with CSIdentity was to raise awareness VB as a physical and behavioral biometric.
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
At Mobile World Congress 2012, Symantec announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection.
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
The preliminary results are in - hear what more than 1,000 members of the Linkedin Infosec Community have to say about BYOD and mobile security challenges including what they are doing to combat mobile device risk and what solutions and security practices really work.
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Novell
In this session we'll preview the upcoming release of Novell ZENworks Endpoint Security Management—which has been integrated into the Novell ZENworks Control Center. This means that administrators will be able to deploy the security agent and define security policies from the same console used for configuration, asset and patch management. These security policies are then assigned to users or devices and adjustable by location. Policies include data encryption, storage control, USB control, communications hardware controls, application control, host-based firewall, wireless controls and VPN enforcement.
2015 Endpoint and Mobile Security Buyers GuideLumension
Mike Rothman, Analyst and President of Securosis, as he dives into an interactive discussion around endpoint security management in 2015.
• Protecting Endpoints: How the attack surface has changed, and the impact to your defense strategy
• Anti-Malware: The best ways to deal with today’s malware and effectively protect your endpoints from attack
• Endpoint Hygiene: Why you can’t forget the importance of ensuring solid management of your endpoint devices
• BYOD and Mobility: The extent that corporate data on smart mobile devices impacts your organization
• The Most Important Buying Considerations in 2015
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
Security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about:
• System security
• Encryption and data protection
• App Security
• Device controls
Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information.
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
Today, everything has to be patched. From desktop and laptop to server and every operating system in between. With compliance, what we have to pay attention to is what’s actually out there on our network – not just what you wish were there.
Servers (Windows, UNIX and Linux)Even Windows-centric environments have at least a few UNIX or Linux servers that need to be secure and patched. Linux and UNIX servers often fulfill critical functions with few and short maintenance windows. These can be a real pain point for admins who specialize in Windows or are managed by an entirely different admin.
Desktops (Windows and Macs)Maybe you are responsible for desktops instead of servers. Again it’s not just a Windows story any more. More and more people are opting for Macs instead of Windows. Watch the vulnerability lists and you’ll see that Macs need patching too.
The kicker though is the 80/20 rule. If at least 80% of the computers on your network are Windows and the remaining 20% are everything else – it’s a safe bet, given the maturity and ease of WSUS, that 20% of your patching effort goes to Windows but 80% of your effort is consumed with patching all the different flavors of UNIX, Linux and your Mac computers. We need one system to manage all our patches and one pane of glass to prove compliance from data center to desktop.
Believe it or not System Center 2012 R2 provides the infrastructure to do just that – it just needs a little help. Last time we showed you how you can patch 3rd party apps on Windows through System Center Update Manager. This time we’ll show you how you can patch non-Windows systems using the new System Center clients for UNIX, Linux and Mac.
A superset of the slides I presented on voice biometrics at SxSW Interactive. The session (in conjunction with CSIdentity was to raise awareness VB as a physical and behavioral biometric.
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
At Mobile World Congress 2012, Symantec announced significant advances in core areas of its enterprise mobility strategy across Android, iOS and Windows Phone 7 platforms. These advances help customers secure mobile data and enable business productivity across both corporate managed and personally owned unmanaged devices by providing cross-platform, multi-application protection.
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
The preliminary results are in - hear what more than 1,000 members of the Linkedin Infosec Community have to say about BYOD and mobile security challenges including what they are doing to combat mobile device risk and what solutions and security practices really work.
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Novell
In this session we'll preview the upcoming release of Novell ZENworks Endpoint Security Management—which has been integrated into the Novell ZENworks Control Center. This means that administrators will be able to deploy the security agent and define security policies from the same console used for configuration, asset and patch management. These security policies are then assigned to users or devices and adjustable by location. Policies include data encryption, storage control, USB control, communications hardware controls, application control, host-based firewall, wireless controls and VPN enforcement.
2015 Endpoint and Mobile Security Buyers GuideLumension
Mike Rothman, Analyst and President of Securosis, as he dives into an interactive discussion around endpoint security management in 2015.
• Protecting Endpoints: How the attack surface has changed, and the impact to your defense strategy
• Anti-Malware: The best ways to deal with today’s malware and effectively protect your endpoints from attack
• Endpoint Hygiene: Why you can’t forget the importance of ensuring solid management of your endpoint devices
• BYOD and Mobility: The extent that corporate data on smart mobile devices impacts your organization
• The Most Important Buying Considerations in 2015
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
Security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about:
• System security
• Encryption and data protection
• App Security
• Device controls
Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information.
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
Today, everything has to be patched. From desktop and laptop to server and every operating system in between. With compliance, what we have to pay attention to is what’s actually out there on our network – not just what you wish were there.
Servers (Windows, UNIX and Linux)Even Windows-centric environments have at least a few UNIX or Linux servers that need to be secure and patched. Linux and UNIX servers often fulfill critical functions with few and short maintenance windows. These can be a real pain point for admins who specialize in Windows or are managed by an entirely different admin.
Desktops (Windows and Macs)Maybe you are responsible for desktops instead of servers. Again it’s not just a Windows story any more. More and more people are opting for Macs instead of Windows. Watch the vulnerability lists and you’ll see that Macs need patching too.
The kicker though is the 80/20 rule. If at least 80% of the computers on your network are Windows and the remaining 20% are everything else – it’s a safe bet, given the maturity and ease of WSUS, that 20% of your patching effort goes to Windows but 80% of your effort is consumed with patching all the different flavors of UNIX, Linux and your Mac computers. We need one system to manage all our patches and one pane of glass to prove compliance from data center to desktop.
Believe it or not System Center 2012 R2 provides the infrastructure to do just that – it just needs a little help. Last time we showed you how you can patch 3rd party apps on Windows through System Center Update Manager. This time we’ll show you how you can patch non-Windows systems using the new System Center clients for UNIX, Linux and Mac.
The Zero Trust Model of Information Security Tripwire
In today’s IT threat landscape, the attacker might just as easily be over the cubicle wall as in another country. In the past, organizations have been content to use a trust and verify approach to information security, but that’s not working as threats from malicious insiders represent the most risk to organizations. Listen in as John Kindervag, Forrester Senior Analyst, explains why it’s not working and what you can do to address this IT security shortcoming.
In this webcast, you’ll hear:
Examples of major data breaches that originated from within the organization
Why it’s cheaper to invest in proactive breach prevention—even when the organization hasn’t been breached
What’s broken about the traditional trust and verify model of information security
About a new model for information security that works—the zero-trust model
Immediate and long-term activities to move organizations from the "trust and verify" model to the "verify and never trust" model
Rainer Baeder. Sudėtingos tikslinės ir ilgai išliekančios grėsmėsTEO LT, AB
Kaip nuo jų apsisaugoti? Kaip susijusios kompiuterių apsaugos sistemos ir vartotojų reputacija?
Pranešimo autorius – Rainer Baeder. Įmonės „Fortinet“ sprendimų konsultacijų centro vadovas (Vokietija).
Pranešimas skaitytas konferencijoje – INFORMACINIŲ SISTEMŲ SAUGUMAS, vykusioje 2013 m. balandžio 11d., skirtoje valstybės institucijų ir valstybinės reikšmės organizacijoms.
Centros de contacto: las demandas y requerimientos del mercadoMundo Contact
Conferencia impartida durante el Congreso CRM + Social Media + Centros de Contato México 2011 organizado por Mundo Contact a cargo de Rafael Chaparro, Account Manager de Huawei
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Andris Soroka
Jaunā Eiropas Savienības personas datu aizsardzības regula teju ikvienā uzņēmumā kļūst par arvien apspriestāku jautājumu, jo tās spēkā stāšanās termiņš (2018.gada 25.maijs) strauji tuvojas. Tādēļ jau ceturto gadu pēc kārtas, sadarbojoties ar “Latvijas Sertificēto Personas Datu Aizsardzības Speciālistu Asociāciju”, viens no vadošajiem kiberdrosības uzņēmumiem Baltijā “Data Security Solutions” 26.aprīlī rīko Latvijas lielāko personas datu aizsardzības regulas pasākumu (EU GDPR - General Data Protection Regulation) “Digitālā Ēra 2017”, kurā vadošie speciālisti no privātā un valsts sektora dalīsies pieredzē un zināšanās, aplūkojot jaunākos un inovatīvākos risinājumus, kā arī jaunākās tirgus tendences un regulatīvās normas kā Latvijā, tā visā Eiropas Savienībā. Vairāk: https://digitalaera.dss.lv/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. Lumension’s business card
• Offices Worldwide + Strong Partner Base (500+)
• More than 6000 customers in 70 countries
• More than 14 million endpoints protected
• Award-Winning Innovator
3. Lumension History
Market Share Leader: Patch Management, Enterprise Risk Management, Device Control
First cross-platform First credentialed First to introduce First Patent pending First
and application patch based vulnerability whitelisting / patented Risk Intelligence Intelligent
management solution scanner file “shadowing” Engine Whitelisting
technology
1991 2007 2009 2010
3
4. Portfolio – ANNO 1991
Endpoint Vulnerability Endpoint Data Compliance and
Operations Management Protection Protection IT Risk Management
Power Management Vulnerability Assessment AntiVirus/Malware Device Control Compliance-Control
Mapping
License Monitoring Patching and Remediation Malware Remediation Data Encryption
Continuous Monitoring
Application Deployment Security Configuration Application Control- Whole Disk Encryption
Management Intelligent White-lisiting Control Harmonization
Asset Identification and Content Filtering
Inventory X-Platform Content Application Identity & IT Risk Assessment
Support Assurance Data Discovery
Contract Management Deficiency Remediation
Mobile Devices
Management
5. Agenda
»Traditional Endpoint Security – threats, drivers
»Evolutions and shifts in Endpoint Security
Recent/Upcoming Product Releases
Bryan Fish, Dee Liebenstein, Chris Chevalier and Rich Hoffecker
»Lumension LEMSS – the innovative platform
» Device Control
» Application Control
» Antivirus
» Whole Disk Encryption
» Mobile Device Management
» Risk & Compliance
» Patch & Remediation and more
7. Today’s business environment
» IT continues taking the lead in business (ERP,
CRM, document management, digital
prototyping etc.)
» Development of e-World continues (B2B,
B2C, e-Services, e-Government, e-Health,
social networking, Web 2.0, unified
communications etc.)
» Consumerization, virtualization, clouds,
mobility and borderless enterprise is a reality
» Cyber culture grows faster than cyber security
(as well – not all countries have compliance,
directives or penalties)
13. 2011 – year of targeted attacks
Attack Type Bethesda
Software
SQL Injection
URL Tampering Northrop Italy
Grumman IMF PM
Fox News Site
Spear Phishing X-Factor
3rd Party SW Citigroup
Spanish Nat. Sega
DDoS Police
Secure ID Gmail Booz
Accounts
Epsilon PBS Allen
Hamilton
Unknown
Vanguard
Sony PBS SOCA Defense
Monsanto
Malaysian
Gov. Site Peru
HB Gary RSA Lockheed
Special
Police
Martin
Nintendo
Brazil
Gov.
L3 SK
Communications Sony BMG Communications
Size of circle estimates relative Greece Turkish
Government
Korea
impact of breach AZ Police
US Senate NATO
Feb Mar April May June July Aug
IBM Security X-Force® 2011 Midyear Trend and Risk Report September 2011
14. Security Today
General Categories
• Financially Motivated
» Bank Accts, Passwords, etc.
» Identity Theft
» Insiders
• Intellectual Property Theft
• Hacktivists
» IP / Customer data
» Denial of Service
» Reputational Damage
16. Results of threats
We end up with -
• There are Internet shops full of credit
card, bank account, privacy, business
and other confidential data
• Also there are available services to rent
a botnet, malicious code and attack
anyone
• Video trainings and eLearning available
in social media, such as YouTube
• «Black market community» (forums,
blogs, interest groups, conferences etc.)
• Lost business & reputation
17. Crybercrime works..
Final Facts
• General loss of year 2011
» 2011 – 431 billion people affected, with more
than 114 billion USD directly and another 274
billion USD related to direct loss
» (Source: Symantec, Dec 2011)
Cybercrime costs the world
significantly more than the global
black market of marijuana, cocaine
and heroin combined (~$228 billion
world wide)
20. Endpoint Security Today – most important
Reality check
• Weakest link - endpoint
» 70% of incidents are caused on
the endpoint
» >2 million unique malware
samples every day
» On average lifetime of a malware
is less than 24 hours
» Traditional defense is not enough
» At least 50 new vulnerabilities
found and reported daily
21. Endpoint Security Today
Traditional Defenses …
• Antivirus
• Patching Microsoft OS and Apps
• Firewalls
• Strong Passwords
• End-User Education Programs
… Don’t Always Work:
If They Did, We Wouldn’t Have
IT Security Breaches!
22. Most Common Threats - N1
• Hard to dispute the fact that patching
an underlying software flaw in most
cases is the best defense
• In the current environment 72% of
vulnerabilities have a patch
available within 24 hours of
disclosure
• In the current environment 77% of
vulnerabilities have a patch
available within 30 days of
disclosure
• Microsoft data indicates that in the first
half of 2011 Zero Day attacks
amounted to less the 1% of the attack
surface
Patch or get hacked the Source http://www.zdnet.com/blog/security/report-third-
choice is yours…
party-programs-rather-than-microsoft-programs-
responsible-for-most-vulnerabilities/10383?tag=nl.e539
22
23. Most Common Threats – N2
• Vulnerable software is not just a
Microsoft problem…
• Third party software historically has
had more unpatched vulnerabilities
then Microsoft
• Java is your number one issue today
followed by Adobe – the leader for the
past couple of years
Source http://www.zdnet.com/blog/security/report-third-party-programs-rather-than-microsoft-
programs-responsible-for-most-vulnerabilities/10383?tag=nl.e539
Bottom line is WSUS is
not going to save you !
Source: http://www.zdnet.com/blog/security/37-percent-of-users-browsing-the-web-with-
insecure-java-versions/9541?tag=content;siu-container
23
24. Most Common Threats – N3
• Hackers are always going to take
advantage of areas that simply are not
properly handled by defenders
• Looking at the chart on the right is
there any question why Java, Adobe
and QuickTime are favored by the Bad
Guys
• In case you missed it the chart is
showing the “Most Outdated Web
Browser Plugins”
What did you really Source: http://www.zscaler.com/state-of-web-q3-2011.html
think was going to
happen?
24
25. Most Common Threats – N4
• It is important to remember that
taking advantage of a vulnerability is
not really the “End Game” for a bad
guy
• The Vulnerability only
represents a “Delivery
Mechanism”
• The “End Game” is actually to
allow them to Execute Malicious
Code in your environment
• Why are we focusing on the delivery
method not the end game
• Duh - because everyone else is
• Hackers will always beat us in the
delivery mechanism “Arms Race”
• Get ahead of the problem by
focusing on the End Game
25
26. Summary of Endpoint threats
Where Traditional Defenses Fall
Short
• Risk from Un-patched 3rd Party Apps
• Controlling Local Admins Gone Wild
• Preventing Zero-Day Attacks and
Targeted Malware
• End-User Education Isn’t Keeping Up
• Actionable Reporting and Security
Measurement
27. Changes of the traditional Endpoint Security
The Past, The Present and The Future
28. Quotes from AV vendors
Basic security protection “You can’t just rely on
is not good enough,” antivirus software – and
Rowan Trollope Senior we’re an antivirus
Vice President, Symantec company” George Kurtz,
Worldwide CTO, McAfee
[Standard] antivirus is not "[signatures are] completely
effective anymore... Raimund ineffective as the only layer [of
Genes, CTO Trend Micro Inc endpoint security]… Nikolay
Grebennikov, CTO, Kaspersky
30. Endpoint Security Today
Point products tax IT resources with additional administration burden, custom
integration & maintenance limited user productivity across multiple
management consoles
Vulnerability Patch Systems AntiVirus Data Compliance
Assessment Management Management Malware Protection
45% of IT operations
professionals work
across 3-5 different
software consoles
while managing
security & operational
functions.*
Colleen Pat Rich
IT Ops Manager CIO IT Security Manager
*Worldwide State of The Endpoint Report 2009
31. Endpoint Security requirements
» Antivirus / Anti-malware
» HIPS / File Integrity monitoring
» Firewall / VPN
» Encryption (whole disk, devices)
» Device Control
» Application Control / System Lockdown
» Vulnerability management, patch and
update management
» Configuration management
» NAC / Visibility
» Mobile Device Management
32. Lumension Endpoint Management Security
Suite 2012
Introducing: Application Intelligent Whitelisting
Single
Agile n-tier pluggable Single Promotable
Console
architecture Agent
33. LEMSS 2012 – one agent platform
L.E.M.S.S.: Patch and Remediation & Config
L.E.M.S.S.: Mobile Device Management
L.E.M.S.S.: Wake on LAN & Power Mgmt.
L.E.M.S.S.: Whole Disk Encryption
L.E.M.S.S.: Device Control
L.E.M.S.S.: App Control & Antivirus
L.E.M.S.S.: Risk & Compliance Management
34. Lumension Intelligent Application Whitelisting
Unifies workflows and technologies to deliver enhanced capabilities in the
management of endpoint operations, security and compliance
Endpoint Operations Intelligent Endpoint Security
Whitelisting
Asset Patch
Device Control
Management Management
Application Control
Software Configuration Trusted
DLP
Management Management Change
AntiVirus/Spyware
Power Compliance/
Content Wizard
Management Firewall Risk Mgt.
Management
Whole Disk
Reporting / Alerting / Logging Mobile Device Encryption
Management
» Remove whitelisting market
adoption barriers
36. Clean IT
» Role of AntiVirus » Features of AntiVirus
» Remove malware prior to lockdown » Sandbox
» Scan for malware not identified at » Antispyware / Antivirus
time of lockdown
» DNA matching
» Scan when making changes
» Exploit detection
• Defense in depth
» AntiVirus no longer the primary
defence mechanism
» Less of a reactionary role
L.E.M.S.S.: Antivirus
37. LEMSS: AV Key Features
Highlights Complete Listing
• Antivirus
» AV Signatures and Scan Engine • Antispyware
Updates • DNA Matching (partial signature matching)
» Policy Scans • SandBox (behavorial analysis)
• Recurring Scan Policy • Exploit Detection (hidden malware)
• AV Signature and Scan Engine Downloads
• Real Time Monitoring
(LAN and Internet)
• Scan Now • Recurring Scan Policy
» Alerts & Notifications • Real-time Monitoring Policy
• Centralized Alerts Page • Scan Now
• Dashboard Widgets • Alerts (Status)
• Email Notification
• Email Notifications
• Dashboard Widets
• Reports
• Reports
» Agent Control Panel • LEMSS Integration (single agent)
• Agent Control Panel
37
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
38. Lock IT
» Role of Application Control » Features of Application Control
» Fast and easy policy definition » Kernel level solution
» Unique whitelist for every endpoint » ~ 10 years in development
» No disruption to productivity » Exploit detection
» Stops any executable after locking it
» Granularity of control
» Integration with Patch & Remediation
module for automated and first in
market - “Intelligent Application
Whitelisting”
L.E.M.S.S.: Application Control
39. How Application Control Security Works
AntiVirus Application Control
Malware Signatures Hash of Approved Application
30 Million and growing @ 2 Million / Month As defined by IT Security
DLoader.AMHZW Exploit_Gen.HOW Word.exe Excel.exe Winnet.dll Mozilla.exe
Hacktool.KDY INF/AutoRun.HK JS/BomOrkut.A
JS/Exploit.GX JS/FakeCodec.B JS/Iframe.BZ
JS/Redirector.AH KillAV.MPK LNK/CplLnk.K
Run as a Service Run in the Kernel
CPU Usage: CPU Usage: Low
Intensive
Proactive
Reactive
Effective for:
Ineffective on: Zero day,
Zero Day, Polymorphic
Polymorphic
95% 13%
40. Trust IT
» Role of Patch & Remediation » Features of Patch & Remediation
» Software and Patch » 20 years market leadership
deployment systems
» Patented patch fingerprint
» Automated discovery and technology
assessment of assets
» Largest coverage of OS’s and Apps
» Trusted change manager
» Automatically update of local
whitelist
» No disruption to productivity
» Single solution for
heterogeneous environment
L.E.M.S.S.: Patch And Remediation
41. Lumension Application Support Updates
• Apple (128) Adobe Reader
» QuickTime Adobe Shockwave Player
» iTunes
Adobe Flash Player
» Safari
» iLife Suite Adobe Acrobat Pro
Adobe Photoshop
• Mozilla Firefox Content (818) Adobe InDesign
» Firefox
Adobe Air
• RealNetworks (10)
» RealPlayer
More than any
• Sun Microsystems (486)
» Java JRE other patch
vendor!
• WinZip (2)
» WinZip
41
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
42. More than just Windows patching….
• Microsoft Windows
• Apple Mac OS X, v.10.3–10.6, x86
(Intel)/PowerPC
• HP-UX, v. 11.11–11.31, 64 bit PA-RISC
• IBM AIX, v. 5.1–5.3, PowerPC
• Sun Solaris, v. 9–10, SPARC, x86/x86_64
• Linux Platforms:
» Red Hat Enterprise Linux
• RHEL 3, 4, and 5, x86 and x86_64
» CentOS
• CentOS 4 and 5, x86 and x86_64
» Oracle Enterprise Linux
• Oracle Enterprise Linux 4 and 5, x86 and x86_64
» SUSE Linux Enterprise
• SLES/SLED 9, 10, and 11, x86 and x86_64
42
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
43. And more than just patching…
Systems Management:
» Inventory:
» Software
» Hardware
» Services
» Software Distribution
» Remote Desktop
» Power Management
» Policy Setting / Enforcement
» Wake on LAN
» Report on Savings ($$)
» Configuration setting /
enforcement
» Disable 3rd party vendor auto
update, Adobe, Java
» Compliance Controls
43
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
44. Lumension Endpoint Integrity Service
Software
Vendors
Lumension Endpoint Integrity Service
Lumension Certified Application
(Sha-256 Hash Application Identification)
Customized Whitelist
Customer downloads Lumension certified
application data to build unique whitelist.
Whitelist Updated
Lumension dynamically updates customer
whitelist with latest vulnerability information.
Customer
44
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
45. Lumension Device Control
Supported Device Types:
• Biometric devices
• COM / Serial Ports
L.E.M.S.S.: Device Control • DVD/CD drives
• Floppy disk drives
• Imaging Devices / Scanners
• LPT / Parallel Ports
• Modems / Secondary Network Access
Devices
• Palm Handheld Devices
• Portable (Plug and Play) Devices
• Printers (USB/Bluetooth)
• PS/2 Ports
• Removable Storage Devices
• RIM BlackBerry Handhelds
• Smart Card Readers
• Tape Drives
• User Defined Devices
• Windows CE Handheld Devices
• Wireless Network Interface Cards (NICs)
48. Minimize Your True Endpoint Risk
Augment existing defense-in-depth tools
» Comprehensive Patch and »Device Control
Configuration Management
»Encryption
» Application Control / Whitelisting
Traditional
Endpoint Security
Blacklisting
As The Core
Zero Day Volume of
Malware
3rd Party Malware
Application As a
Risk Service
49. Minimize Your True Endpoint Risk
Rapid Patch and Configuration Areas of Risk
at the Endpoint
Management 5%
Zero-Day
• Analyze and deploy patches across all OS’s
and apps (incl. 3rd party)
30%
• Ensure all endpoints on the network are Missing Patches
managed
• Benchmark and continuously enforce patch and
configuration management processes
65%
• Don’t forget about the browser! Misconfigurations
» Un-patched browsers represent the highest risk for
web-borne malware.
Source: John Pescatore Vice
President, Gartner Fellow
50. Stop Malware Payloads with App Whitelisting
Antivirus
Apps Malware
• Use for malware clean-up
and removal
Authorized Known
• Operating Systems • Viruses
• Business Software • Worms
Application control • Trojans
• Much better defense to
prevent unknown or Un-Trusted
unwanted apps from Unknown
Unauthorized • Viruses
running • Games • Worms
• iTunes • Trojans
• Shareware • Keyloggers
• Spyware
• Unlicensed S/W
51. Encryption
Endpoints (Whole Disk) Removable Devices
• Secure all data on endpoint • Secure all data on removable
• Enforce secure pre-boot devices (e.g., USB flash drives)
authentication w/ single sign-on and/or media (e.g. CDs / DVDs)
• Recover forgotten passwords and • Centralized limits, enforcement,
data quickly and visibility
• Automated deployment
Lost UFDs (Ponemon 2011)
Laptop Thefts (IDC 2010)
52. Back in 2009 / 2010
Patch & Application
SCM
Remediation Control
Device Content
AV
Control Wizard
Risk
Scan PM
Manager
52
53. Lumension Endpoint Management Platform
Single Integrated Console / Single Agent
» Unified workflow
» Consolidated data
» Increased visibility
» Operational & Strategic
2009 Integration
Reporting
» Modular, extensible design
Endpoint Operations
» Power of granularity
Endpoint Security
» Improved productivity and
Compliance
lower TCO
53
54. Massive ongoing U.I. Integration
2010
2011
2012 LPR LRS LCW AC DC AV PM SCM Scan LRM
*2010 – each color represents a different product with a different user interface
*2011 – Migration to a consolidated user interface. SCAN and LRM are also sold as separate stand alone products
54
55. Lumension Platform Advantage
• Fully integrated UI across
ALL technologies
Many • Unified Policy Framework
to automatically enforce
Products and eliminate
configuration drift
Single UI
Many
Consoles
Single
Console
• N-Tier Design
• Full Integration for all
technologies
One Partner
One Platform
Many Solutions
Disparate N Tier Agile n-tier pluggable
Architecture architecture
• Cross Platform
• Single Communication
Vector
• One agent-all
technologies
Many SingleSingle Promotable
Agent
Agents Agent
55
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
56. Lumension Endpoint Management and Security Suite: Dashboard
56
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
58. Real time risk & compliance manager
Regulation Authority Documents
GLBA PCI FISMA HIPAA NHS NERC SOX ISO/IEC…
Business Interests Corporate Policies
Business Processes
Revenue Streams
Trade Secrets IT Assets
Profile Risk Attributes
Open to the Internet
Contains Credit Card
Information
Contains Customer Data
Applicable Controls Pass/Fail Regulation Assessment
Password Length
Data Encryption
Power Save
HIPAA SOX PCI NERC
100% 65% 65% 30%
59. Security Posture Index
Contextual
» High-level security
posture objectives
are captured in LRM
» Combined KPI’s
form a security
posture report
» Drill down on
different sections of
the SPI report for
detailed assessment
scores
59 59
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
60. More Information
SMB Security Series SMB Market Survey
» Resource Center:
http://www.lumension.com/smb-budget www.lumension.com/smb-survey
» Webcast Part 2:
http://www.lumension.com/Resources/Webinars
/How-to-Reduce-Endpoint-Complexity-and-
Costs.aspx
E is for Endpoint Webcast and
Quantify Your IT Risk with Free Whitepaper Series
Scanners
http://www.lumension.com/E-is-for-Endpoint.aspx
» http://www.lumension.com/special-
offer/PREMIUM-SECURITY-TOOLS.ASPX
Lumension® Endpoint Management
and Security Suite
» Demo:
http://www.lumension.com/endpoint-
management-security-suite/demo.aspx
» Evaluation:
http://www.lumension.com/endpoint-
management-security-suite/free-trial.aspx
61. Please consider next steps
• Lumension® Intelligent Whitelisting™
» Overview
• www.lumension.com/Solutions/Intelligent-Whitelisting.aspx
» Free Demo
• www.lumension.com/Resources/Demo-Center/Overview-Endpoint-Protection.aspx
» Free Application Scanner
• www.lumension.com/special-offer/App-Scanner-Tool-V3.aspx
• Whitepaper and Videos
» Think Your Anti-Virus is Working? Think Again.
• www.lumension.com/special-offer/App-Whitelisting-V2.aspx
» Using Defense-in-Depth to Combat Endpoint Malware
• l.lumension.com/puavad
» Reducing Local Admin Access
• www.lumension.com/special-offer/us-local-admin.aspx
Welcome and greetings. Thank You for coming. This will be the story about changes in endpoint security. From traditional to innovative. From AV or other blacklist vendors to Lumension Security. Introducing in 2011 the Intelligent Application Whitelisting and new Lumension Endpoint Management & Security Suite. L.E.M.S.S.
Brief introduction of company.
Started in 1991, received leadership as Patchlink, merged with Securewave and Stat, later Securityworks. Now a global leader in Endpoint security, operations, data protection and risk management.
Brief introduction of Agenda.
Security is becoming more important than ever and bigger and bigger challenge to manage. . Technologies are developing with the speed of light.
Professionals and not kids any more. Targeted and sophisticated and not by incident. Every day, more and more we hear it, see it, experience it.
There is no single company that starts from zero. Everyone has security solutions. Unfortunately they don’t work.
Your environment also has all sorts of risk added everyday and in different waysSoftware and OS lifecycle assumes new bugs; design flaws will be discovered as technology is adopted and deployed.On average, 15 new vulnerabilities are released per dayAnd over 90% of vulnerabilities could be exploited remotely. Software vulnerabilities grow daily. Understanding these risks is critical in your ability to address risk efficiently.
Your environment also has all sorts of risk added everyday and in different waysSoftware and OS lifecycle assumes new bugs; design flaws will be discovered as technology is adopted and deployed.On average, 15 new vulnerabilities are released per dayAnd over 90% of vulnerabilities could be exploited remotely. Software vulnerabilities grow daily. Understanding these risks is critical in your ability to address risk efficiently.
Most overflows result in a system crashOccasionally, a vulnerability is discovered that allows the “overflowed” code to be executedThat execution typically escapes any established security controlsBecause buffers are small and these attacks are difficult, many overflows attacks will try to download a more substantial payload
On average, the companies lost 12,000 customer, consumer, and employee records on missing USB sticks, the study explained. At an average cost of $214 a record, that amounts to losses that could go north of $2.5 million for the companies in the survey.
Most organizations wind up dealing several hundred controls that must be measured against hundreds or thousands of assets. This can produce individual assessment scores measuring in the hundreds of thousands.To help you see a roll-up of this information in a simple view, LRM includes Key Performance Indicators, or KPI's. These KPI's capture the high-level security posture objectives that matter to your organization. Most organizations will typically have 10-20 KPI's at this high level that summarize their high-level security posture objectives.These KPIs combine to form a high-level security posture report card that gives a quick glance into your enterprise-wide security posture. You can drill down to any of these to get to the detailed assessment scores that produced your high-level grade.