Lumension: Because Hope is no Strategy Andreas Müller Regional Sales Manager D/A/CH.

Slides:



Advertisements
Similar presentations
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Advertisements

Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Security Controls – What Works
The State of Security Management By Jim Reavis January 2003.
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
LittleOrange Internet Security an Endpoint Security Appliance.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Norman Endpoint Protection Advanced security made easy.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Vulnerability Management Dimension Data – Tom Gilis 24 November 2011.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
HIPAA COMPLIANCE WITH DELL
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Dell Connected Security Solutions Simplify & unify.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
The Changing World of Endpoint Protection
Security Business Partner Guide Value Propositions
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Global Strategy. Mitch Rowe.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
System Center 2012 Configuration Manager Service Pack 1 Overview.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Redcell™ Management Essentials, Juniper Networks Enterprise Edition
Working at a Small-to-Medium Business or ISP – Chapter 8
Data Minimization Framework
Firewalls.
Virtualization & Security real solutions
I have many checklists: how do I get started with cyber security?
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Securing the Threats of Tomorrow, Today.
Contact Center Security Strategies
Healthcare Cloud Security Stack for Microsoft Azure
AMI Security Roadmap April 13, 2007.
(With Hybrid Network Support)
OSL150 – Get Hands on with Ivanti Endpoint Security
Presentation transcript:

Lumension: Because Hope is no Strategy Andreas Müller Regional Sales Manager D/A/CH

Press Highlights Conficker hits Kärnten Government! 3000 Clients down! Datatheft at German Telekom: Data of Customers lost! About version of new Malware in 2008! Cybercrime cost $1 Trillion in

Endpoints are the Weakest Link 2 Skript-Kiddies changed to business man

3

What Sources of Endpoint Risk do Threats Target? 4 65% Mis- Configurations 30% Missing Patches 5% Zero-day Attacks Exploit Risks at the Core The CORE / Sources of Risk Source: John Pescatore Vice President, Gartner Fellow

Traditional, Reactive Security Approaches 5 Security Add-on Solutions Desktop Firewall Anti-Virus Spyware IPS Heuristics Application Blacklist EXTERNAL THREATS The CORE / Sources of Risk X X X X X X

Endpoints are the Weakest Link 6 The weakest Point in IT: The User

Proactive, Operational Approach 7 Authorize Software Use Eliminate Data Leakage Internal Threats: Enforce Application & Device Use Policies

Endpoints are the Weakest Link How has the Security Landscape Changed and What is the Impact? Increasing number of vulnerabilities for all platforms and applications Endpoints are targeted by internal and external threats Attacks from “well funded adversaries” target endpoints Data protection is a major challenge and cost Traditional and reactive security approaches are ineffective Evolving regulations create strict compliance and reporting standards 8

What We Deliver 9  Dynamically enforce application/device policies to prevent security threats at the endpoint  Proactively discover and assess risks and threats within the IT environment for comprehensive view of risk profile Lumension delivers best-of-breed, policy-based solutions that address the entire security management lifecycle.  Assess, prioritize and remediate vulnerabilities for continuous validation and compliance reporting

Lumension More Effectively Secures the Endpoint 10 Endpoint Security must address internal and external threats Platform Security  VA and Remediation  Application Control User Security  Application Control  Device Control Data Security  Device Control  Data-at-Rest  Content Filtering Internal and External Threats Internal Threats External Threats Vulnerability Management / Patch Solution Endpoint Security Solution Data Security Solution

Effective Endpoint Security is a Continuous Process 11 Discover Assets Develop Policy Assess & Remediate Threats Enforce Policy Compliance Audit Centralized Management & Reporting

Who is responsible for this? 12 YOU!

Patchlink Scan 13

Comprehensive Reporting Out-of-the-box reports provide high-level or detailed information on vulnerabilities found Compare security posture to common industry tracking mechanisms 14

PatchLink Scan™ Value Quickly Discover All Network Assets and Vulnerabilities Accurate Network-based Assessments Actionable Information Delivered to Make Intelligent Policy Decisions Comprehensive Vulnerability Coverage Highly Scalable Architecture Common Criteria EAL2 Certified 15

Patchlink Update

PatchLink Update™ Value Stay Ahead of Threats with Automated and Accurate Enterprise-Wide Patch Management »Most accurate patch applicability and assessment »Deploy patches within hours of release from vendor »Capabilities and context to effectively act on information - Role and Task Based »Redundant vulnerability assessment Broad Support of Content via Open Architecture »Leverages content directly from OS/Application vendors »Broad English and international content support »Security and operational patches Protect Heterogeneous Environments with One Solution »All major Operating System platforms »All major third party applications 17

Rapid, Accurate Network-based Scans 18 Thorough and accurate discovery of all network devices Detailed assessment checks on configurations, AV, worms, Trojans, missing patches, open ports, services and more Deep inspection of target systems

PatchLink Security Configuration Management™ 19

PatchLink SCM™ Workflow Policy Management Upload a Security Configuration Specification Customize Security Specifications Policy Assessment Apply a Security Configuration Specification Perform a Manual Assessment Policy Compliance Reporting View Group Policy Compliance Details View Device Security Configuration 20

Open, Standards-Based Approach to Policy Compliance Comprehensive Policies »Security Content Automation Protocol (SCAP)Security Content Automation Protocol »Hundreds of pre-defined checks Easy-to-edit XML Format »New policy checklists can be added/created Based on Industry Standards »OVAL, XCCDF, CVE, CME, CPE »Ensure compliance with specific regulations (i.e. FDCC, PCI, etc.) »Improved operational efficiencies due to security best practices 21

How Policies get into PatchLink SCM™ 22 XCCDF Policy Instance  Mapping policies and other sets of requirements to high-level technical checks OVAL Archive  Mapping technical checks to the low-level details of executing those checks SCAP Checklist Policy  Government (OMB Mandate)  Industry (PCI, SOX, HIPAA)  US or other Regulations  Corp. Specific best practices PatchLink SCM Automation (monitoring/reporting)

How Policies get into PatchLink SCM™: Example 23 XCCDF Policy Instance  Mapping policies and other sets of requirements to high-level technical checks OVAL Archive  Mapping technical checks to the low-level details of executing those checks SCAP Checklist Policy  Government (OMB Mandate)  Industry (PCI, SOX, HIPAA)  US or other Regulations  Corp. Specific best practices NIST SP Authentication Management Policy: System’s minimum password length is at least 8 characters XCCDF Mapping: Map specific requirement for system’s minimum password length is at least 8 characters OVAL Check Mapping: Check to be performed (E.g.) on all Windows XP based computers

PatchLink SCM™ Value 24 Ensures that security configurations are standardized throughout the enterprise Ensures continuous policy compliance Improves operational efficiency Consolidates vulnerability and mis-configuration monitoring and reporting

PatchLink Developers Kit™ 25

Develop Custom Patches Create and deliver patches and updates for commercial or proprietary software Patch legacy applications and niche products Open and modify any packages available via PatchLink Update 26

PatchLink PDK™ – How it Works 27

Lumension VMS 28

Comprehensive Vulnerability Assessment and Remediation 29 Discover, Assess and Remediate Vulnerabilities for Policy Compliance Rapid identification of unprotected endpoints Automated remediation of configuration and software vulnerabilities Advanced vulnerability, configuration and policy compliance reporting Flexible, open support for all major platforms, applications and vulnerability and configuration content Purpose-built to support compliance with regulatory policies and industry standards Vulnerability Assessment and Remediation for Configuration Issues & Patches PatchLink Developers Kit™ (Add-On Module) PatchLink Scan™ (Network Based) PatchLink Update™ (Agent Based) PatchLink Security Configuration Management™ (Add-On Module) – FDCC and PCI

Sanctuary ® Application Control 30

Sanctuary ® Application Control Value Protects against both known and unknown threats Safeguards against zero-day threats and targeted attacks Controls proliferation of unwanted applications from burdening network bandwidth Maximizes benefits of new technologies and minimizes risk of network disruption Stabilizes desktop and Windows server configurations Enables adherence with software license agreements 31

Sanctuary ® Device Control 32

Automates discovery of peripheral devices Provides granular device control permission settings Offers flexible encryption options 33 PatchLink Developers Kit™ Enforcement of Peripheral Device Use Policies Delivers detailed audit capabilities  Patented bi-directional “Shadowing” of data written to/from a device  All device access attempts  All administrator actions Sanctuary ® Application Control Sanctuary ® Device Control Endpoint Policy Enforcement (Agent Based)

Sanctuary ® Device Control Value Minimizes risk of data theft / data leakage via any removable device »Granular Device Control Policies »Forced Encryption »File Type Filtering »Detailed Audit Capabilities »Blocks USB Keyloggers Prevents malware introduction via unauthorized removable media Assures compliance with privacy and confidentiality regulations and policies 34

Overall 35

Lumension Product Portfolio 36 Sanctuary ® Application Control Sanctuary ® Device Control Vulnerability Management for Configuration Issues & Patches Endpoint Policy Enforcement PatchLink Developers Kit™ (Add-On Module) Enterprise-Wide Compliance Reporting PatchLink Enterprise Reporting ™ Enterprise Policy Management PatchLink Security Management Console ™ PatchLink Scan™ (Network Based) PatchLink Update™ (Agent Based) PatchLink Security Configuration Management™ (Add-On Module) – FDCC and PCI (Agent Based)

Who we are? 37

Who We Are 38 Leading global security management company, providing unified protection and control of all enterprise endpoints.  Ranked #14 on Inc. 500 list of fast growing companies  Ranked #1 for Patch and Remediation for third consecutive year  Ranked #1 Application and Device Control  Over 5,100 customers and 14 million nodes deployed worldwide Award-Winning, Industry Recognized and Certified

Worldwide Customer Deployments 39 Miscellaneous Charities Legal Services Manufacturing Dolphin Drilling Health Care Transportation/Utilities Media Education Bishop’s Stortford College Financial Government/ Military

Industry-Leading Partnerships 40

Distribution partner Baltics 41

Thank you.