Your Partner for Superior Cybersecurity Rene Anthony Gonzalez, SE Manager, Endpoint Security Your Partner for Superior Cybersecurity
Your security risk is higher than ever. $19.95/mo. 40% buys hackers easy-to-use “as-a-service” options for attacks. ZDNet of spam contains ransomware. IBM
16% 2016 ransomware attacks were up over 2015. Verizon 2016 DBIR
of recipients open phishing messages. 30% of recipients open phishing messages. click on attachments. 12% Verizon 2016 DBIR
You can’t afford to be wrong on this one. 1 in 2 70% $1B USD executives experience a ransomware attack of businesses hit pay the ransom in ransom paid in 2016 IBM IBM FBI estimate
Bring IT Ops and Security together. Only Security Both Only IT Security alerts Privilege management Server OS patching Application whitelisting Setting IT access control panels
Feedback from a survey of 100 CIO/CSOs “We have to tear down the traditional view of what an IT operations entity is and what a security entity is.”
“IT wants things to work smoothly, while security wants security. Feedback from a survey of 100 CIO/CSOs “IT wants things to work smoothly, while security wants security. At the endpoint, they have to work together to maintain both.”
Feedback from a survey of 100 CIO/CSOs “You do not need 15 best-in-breed products for a successful layered approach to cybersecurity.”
Unfocused security strategies lead to Expense in Depth. Unified Threat Management Data Loss Prevention Two-factor Authentication Next-Generation Firewall Intrusion Prevention System Containerization Configuration Management Web Proxy Wireless Intrusion Detection System Passive Vulnerability Scanner Network Analysis and Visibility Software Inventory Tools Encryption Mobile Device Management Malware Analysis Automated Asset Inventory Discovery Tool Antivirus Blacklisting Configuration Auditing SIM Microvisor Security Application Control Endpoint Analysis File Integrity Monitoring Predictive Threat Modeling Secure File Transfer Threat Intelligence Wireless Intrusion Prevention Whitebox Testing Endpoint Visibility Host Intrusion Prevention Application White Listing Firewall Application Wrapping Data Execution Prevention Just Enough Administration JIT Administration Intrusion Detection Systems Database Activity Monitoring DDoS Mitigation Forensics Continuous Vulnerability Assessment Network Intrusion Prevention Web Application Firewall Network Access Control Antispyware Email Proxy Vulnerability Scanner Privileged User Monitoring Network Encryption File Activity Monitoring Digital Rights Management Big Data Analytics Sandboxing Patch Management Blockbox Testing Systems Hardening
Make sense of endpoint security. Forrester examined past research, surveyed experts, and experimented with endpoint security products to determine: Current business value Potential business value (overall trajectory, from minimal to significant success) Current market maturity (“ecosystem phase”) Time to next stage of maturity Key takeaways: Endpoint security is critical to defend against data breaches. Security pros seek to balance prevention and detection. Consolidating technologies leads to more effective suites. Source: Forrester TechRadar™: Endpoint Security, Q1 2017, by Chris Sherman, January 27, 2017
Focused strategies lead to strategic IT success. Defense in depth Integrate the environment to discover the breadth of risk. Provide tech that reduces the attack surface. Analyze data for insight into issues. Help users take action to solve problems. Sense in breadth Learn about users and discover their needs. Provide security without getting in the way of their jobs. Silently service them through upgrades and risk evasion. Increase productivity with the right tools.
Our approach to security Discover Provide insight Take action Easily find and quantify the assets you need secured. Apply our integrated best practices to clearly identify risk. Use our best-in-breed tools to act swiftly. Integrated, easy-to-use security offering
Our defense-in-depth solutions Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management Patch and secure the OSes and 3rd-party apps that you can. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Patch management Vulnerability management Application control Privilege management Device control Anti-malware Threat alerting Asset management Service management Secure configuration management
Our defense-in-depth products Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management Ivanti Patch for Endpoints Ivanti Patch for Servers Ivanti Patch for SCCM Ivanti Application Control for Endpoints Ivanti Application Control for Servers Ivanti Application control for SCCM Ivanti Endpoint Security Ivanti Server Security Ivanti Service Manager Ivanti Asset Manager
Rex
Security Compliance
Critical Security Controls (CSC) The Center for Internet Security Critical Security Controls ensure a more secure environment. Prioritized list of focused actions Compliant with all industry and government security requirements Based on experience with actual attacks Block initial compromises and detect compromised devices
The first 5 controls Inventory of authorized and unauthorized devices CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly reduce security threats. Inventory of authorized and unauthorized devices Inventory of authorized and unauthorized software Secure configuration Controlled use of administration privileges Continuous vulnerability assessment and remediation
Our defense-in-depth solutions Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management Patch and secure the OSes and 3rd-party apps that you can. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Patch management Vulnerability management Application control Privilege management Device control Anti-malware Threat alerting Asset management Service management Secure configuration management