20. 6 UNAUTHORISED FILE SHARING DATA THEFT THROUGH USB / CD DRIVES MALICIOUS SOFTWARE INSTALLATIONS WEAK PASSWORD POLICIES SOFTWARE PIRACY WORMS SPREADING THROUGH THE NETWORK INSUFFICIENT DATA ENCRYPTION WAS ALL THIS DATA ENCRYPTED? CD’s USED TO STEAL DATA MALWARE STOLE PASSWORDS INSECURE PASSWORDS CAUSED THEFT USB DRIVE HAD CUSTOMER DATA Endpoint security has never been a more pressing issue…
21. 7 Data Breach Costs Continue to Grow Total Economic Impact From Data Loss & Security Breaches Is Estimated at Over$1 Trillion a Year The cost of recovering from a single data breach now averages$6.6M 20% of customerswill discontinue the relationship immediately and 40% are likely to leave within 6 months Ponemon Institute 2009, U.S. Costs of a Data Breach November 2008, Unsecured Economies Report 2009
23. 9 Mounting External Compliance Regulations 75% of organizations must comply with two or more regulations and corresponding audits 43% of organizations comply with 3 or more regulations PII Security Standards Sarbanes-Oxley, Section 404 PCI Data Security Standards (DSS) PCI Data Security Standards (DSS) Organizations spend 30-50% more on compliance than they should Basel II Basel II SB1386 (CA Privacy Act) SB1386 (CA Privacy Act) SB1386 (CA Privacy Act) USA Patriot Act USA Patriot Act USA Patriot Act USA Patriot Act Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) Gramm Leach Bliley (GLBA) 21CFR11 21CFR11 21CFR11 21CFR11 21CFR11 21CFR11 HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive *The Struggle to Manage Security Compliance for Multiple Regulations”. IT Policy Group Time
26. It’s now IT’s job to say YES!Employee-provisioned laptop programs lead to greater user satisfaction and reduce total ownership costs up to 44%* * Gartner 2008
27. 12 Consumerization of IT… The applications we use today for productivity Collaborative / Browser-based / Open Source Social Communities, Gadgets,Blogging and Widgets open up our endpoints to increasing risk everyday.
29. 14 Is the firewall enabled? Is the antivirus updated? Are USB drives disabled? What software is installed? Are audit logs being saved? Is the user an administrator? Is the password policy strong? Are logon messages displayed? What are the installed services? Who are the users on the system? Is the registry remotely accessible? Are other desktop agents operating correctly? Does the screensaver lock the system? Are unauthorized files being shared? What programs are running? What patches are installed? Are guest accounts disabled? Is network data digitally signed? Who can shut-down the system? Are all drives using NTFS securely? What is the account lockout duration? Are passwords being saved in web-forms? What is the actual security state of your desktops & servers?
30. 15 Multiple endpoints, geographically spread…securityinsight becomes hard. There are numerous such desktops and servers in your organization
31. Do you know the gap between your prescribed policies & the ground reality? 16
32. 17 MIEL Endpoint Diagnostic Service (MEDS™) The answer to your desktop security questions
33. 18 MIEL Endpoint Diagnostic Service (MEDS™) AGENT-LESS ARCHITECTURE Nothing to install on the endpoints
34. 19 MIEL Endpoint Diagnostic Service (MEDS™) HELPS MAKE IT MORE EFFICIENT Scans are fast, scalable and reliable
35. 20 MIEL Endpoint Diagnostic Service (MEDS™) MANAGED SERVICE MODEL Hassle-free scanning with expert analysis