This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Slides:



Advertisements
Similar presentations
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security for Today’s Threat Landscape Kat Pelak 1.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Security+ Guide to Network Security Fundamentals
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
HIPAA COMPLIANCE WITH DELL
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Small Business Security Keith Slagle April 24, 2007.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Microsoft and Symantec
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Computer Security By Duncan Hall.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Your Partner for Superior Cybersecurity
OIT Security Operations
Deployment Planning Services
Cybersecurity - What’s Next? June 2017
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Security Standard: “reasonable security”
Compliance with hardening standards
Contain and Isolate Ransomware with Citrix and Microsoft
Virtualization & Security real solutions
I have many checklists: how do I get started with cyber security?
Contact Center Security Strategies
How to Mitigate the Consequences What are the Countermeasures?
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Presentation transcript:

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2010 Gartner, Inc. and/or its affiliates. All rights reserved. Terrence Cosgrove Security and Management Convergence on the Desktop

Defending Against Targeted Attacks Find and fix system vulnerabilities Shield vulnerable applications Network defenses Find and fix application vulnerabilities Shield vulnerable systems Steal data Compromise accounts Target User Install malware Surveillance Steal user's credentials Compromise servers Compromise applications Perfect defenses not achievable

Malware Trends Volume increasing ,000/month, accelerating Infection rates increasing -3% to 5% of enterprise PCs Web-enabled Easily customizable Ransomware Trojans Lower level (BIOS, RAM, driver) Conflicker was an exception, not the trend Unique Malware Threats (in Millions) Source: Symantec Threat Report, 2009

Security and IT Operations: Dependent but Different Service Quality Lower TCO Risk Identification Risk Mitigation Compliance Desktop Lockdown Configuration Standards SW/Patch Distribution Infrastructure HW/SW Inventory Operations Security Compliance Different Goals … But Common Methods

90% of successful attacks occurred against previously known vulnerabilities where a patch or secure configuration standard was already available. Fix the Root Cause of Security Problems Apps installed Patches installed Settings /configurations Agents/Services Block apps Deploy patches Change mis-configured settings Reinstall missing agents Reduce the attack surface Reduce the time to security Rogue apps Missing patches Configuration errors Encryption not installed

The Mobile User: A Growing Security and Management Problem Issues : They are beyond the perimeter Visibility: Will they get patches; how do I ensure compliance? They probably have admin rights Organizations often have separate security metrics for notebooks and desktops Mobile PC Unit Share, 1Q03-4Q11 Telework Growth: 27% of U.S. workers telework at least one day per month By 2011, 46.6 million employees globally will telework at least one day a week, and 112 million will telework at least one day per month Source: "Dataquest Telebriefing: Preliminary PC Forecast and Market Scenarios, 3Q09" (G ) Source: "Gartner's Telework Action Plan Is Key to Successful Implementations" (G )

Vulnerability Management Weak Spots: Patch Management Strategy Tightly manage configuration diversity Automate quality assurance (QA) testing Network isolation and deployment of intrusion prevention technology Invest in monitoring technology (breach discovery) Patch management over the Internet (a few products support it) Activate and manage personal firewalls, consider host intrusion protection software (HIPS) Encrypt laptop data Strategy Not accessible for rapid patching from the internal network Threat exposure (outside perimeter protection) Loss exposure (sensitive data) Mobile PCs

Patch Management: A Maturing Discipline Group Responsible for PC Patch Management Maturity LevelCharacteristics 1Awareness Inconsistent standardization Ad hoc testing Crisis/deadline driven Results ~80% 6-8 weeks 2Committed Some standardization Resources assigned, but not dedicated Results: ~85% patched in 6 weeks 3Proactive Standardization Formal testing Ongoing assessments Few crises 95% patched in 2-3 weeks 4Business Aligned Service orientation Proactive assessment No crises Continuous business assessment for risk Source Gartner 2010 Patch Management Maturity Analysis

Security Configuration Assessment Group Responsible For Security Configuration Assessment Early, but moving over to desktop Many do Security Configuration Assessment within both Security and Ops Source Gartner 2010 Why It's Needed Vulnerability reporting not oriented toward remediation. The root cause of many vulnerabilities can be eliminated through changes in provisioning and administration processes. Advice Security orgs should orient mitigation initiatives with IT ops around security configuration assessments (as opposed to vulnerability assessments).

Endpoint Protection and Operations Integration: Why? Group Responsible for Antivirus Deployment and Management Source Gartner 2010 Rapid benchmark capability What assets do we have? What software is on them? -Is the software malicious, nonproductive, unlicensed, redundant, nonstandard, vulnerable? Is the software/machine configured correctly? Are we compliant with the regulation du jour? How do we move seamlessly from problem detection to remediation?

User Owns and Manages PC Company Owns PC Application Control PolicySettings No Control Basic Application Control Software Control No app control Only blacklisted apps can't run Per-app system resource control Only permitted apps use network No policy Written policy Technology- enforced policy Users can change any settings Users cannot change certain settings Users cannot change any settings Users can add any software Users can add and run apps not on blacklist Users cannot add software Users can add and run apps on whitelist Per-app port control Only whitelisted apps can run Full Control Windows Application Control Solutions: An Alternative to Desktop Lockdown

Lock Down Most, but Not All, Users Through 2015, IT organizations will continue to deploy lockdown policies on the majority of PCs. Reasons this will be true: 52% of organizations increasing the number of locked-down users; 31% keeping the same levels "Standard user" increasingly recognized as best practice Apps are increasingly written to run as a standard user Reasons this will be false: Mutiny: the new generation of worker will not allow it Application control tools will do a better job of locking down the PC while giving users some freedom User's workspace will be hosted in the data center; we don't care what's on the device

Data Leakage Threats: Encrypt Data, Track Usage and Disposal Source: Source: hard drive Group Responsible for the Operations of PC Data Encryption

Convergence: Host Intrusion Prevention, Configuration Management, Software Distribution Vulnerability Assessment Security Inventories Operational Configuration Policy Anti-spyware Operational Inventories Security Configuration Policy Audit Personal Firewall Antivirus Software Distribution HIPS Patch Management Consolidated Inventory Endpoint Suites PC Intrusion Prevention (AV, AS, HIPS, PFW, Others) PC Intrusion Prevention (AV, AS, HIPS, PFW, Others) Software Distribution (Including Patches) Software Distribution (Including Patches) Configuration Management Vulnerability Assessment Endpoint Suites

Security and Operations — Integrated Processes with Segregation of Duties Identity and Access Policies Security Configuration Policies Threat/Vulnerability Assessment Security Network and System Compliance Audit Monitor Privileged Access Implement Configuration Changes Software Distribution/Patch Install Network Operations System Administration Desktop Support Availability/Change Management Provision Systems Privileged Users Database Administration Internal Audit/Compliance

Recommendations Actions are set in italics. Adopt a process-centric approach to security. Develop mitigation processes on the assumption that content and software will be: -Used in unexpected ways -Abused -Stolen -Attacked by outsiders and insiders Move routine security processes to IT operations groups. Balance spending among mitigation, shielding and monitoring based on practical limitations of mitigation for specific IT components.

Resources More information about “Convergence”: For upcoming and previously live webcasts: Got webcast content ideas? Contact us at: