Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Security and Organizational Governance Anand Lakshminarayanan Senior Product Manager Microsoft Corporation.
Unified. Simplified. Unified Communications Launch 2007.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
InterGuard The only complete internal threat platform Data Loss PreventionWeb FilteringLaptop SecurityEmployee Monitoring Total Visibility and Control.
eScan Total Security Suite with Cloud Security
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Entré NetMonitor Proactive IT monitoring, Management and support Think DIFFERENT about IT.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Dell Connected Security Solutions Simplify & unify.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
Small Business Security Keith Slagle April 24, 2007.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
KTAC Security Task Force Superintendents Update April 23, 2015.
Unified. Simplified. Unified Communications Launch 2007.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Introduction TO Network Administration
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
User and Device Management
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Kaspersky Small Office Security INTRODUCING New for 2014!
Computer Security Sample security policy Dr Alexei Vernitski.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Secure Services Shared Hosted MS Exchange 2010.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Encrypted from CDS Office Technologies
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Check Point Connectra NGX R60
Microsoft Data Insights Summit
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a desktop workstation. But today’s environment is far more complex. Laptops, mobile devices, teleworking, outsourcing – all of these add tremendous complexity to the challenge of keeping systems and data secure. This session looks at the latest strategies and solutions being used in the public sector.

 1– Protecting Data on Desktop and Tracking ◦ - Virus Protection ◦ - Firewalls ◦ - Desktop Protection ◦ - Encryption  2 – Protection  3 – Why?

 - Enterprise Virus Protection  Why important?  ePolicy Orchestrater  Benefit to Agency and our Local Health Department’s workstations and servers.  Centralized notification of virus outbreaks, out of date clients, definition files and rogue systems (computers with no anti-virus client). -Update Process  Each day at 6:00 AM to download to Server.  Workstations and servers then connect to the ePO server each day to obtain update, if needed.

- Importance of firewall. - Many options. - We went with Windows Defender and Windows Firewall for spyware blocking and protection as we moved to Windows Vista.

 Why protect more?  Remote Staff  Stolen or missing Equipment  Asset Management  Software Management  Cost  Computrace helps combat the security risks associated with computing assets, and the asset management challenges they pose.  Recovery protection  Remote kill

 Absolute Software’s product line is based on the patented Computrace Technology Platform.  This client/server architecture provides secure, client- initiated IP-based communications between the Computrace Agent and the Monitoring Center.  The Computrace agent resides on the hard drive, or, ideally embedded in the Basic Input Output System (BIOS) or firmware of the host computer.

 - Compliance – Adherence to all applicable mobile data protection regulations, with an easily accessible audit trail  - Protection – Protecting data on mobile computers includes encryption, strong authentication and the ability to remotely delete sensitive data on stolen devices  - Recovery – Recovery of lost or stolen devices returns them to the control of the organization and facilitates prosecution.  By adopting the CPR approach to laptop security, government agencies can minimize the impact of computer theft, while complying with privacy regulations.

 - Protect data on your pc’s, laptops and external devices.  Mandated by Executive Order  Sensitive data  SafeBoot – How did we do it.  Used SafeBoot AutoBoot\AutoLogin method to get started and protected quickly.  Deployed through Windows Group Policy.  Beginning to move toward SSO and Content Encryption.  Put less data on Laptops. Do more work in the Data Center. Citrix is a possible solution. This is a very important when you discuss DR and teleworking.

 Why important?  What is the only application that everybody uses?  GFI MailSecurity is a comprehensive content checking and anti-virus solution to safeguard your mail server and network. GFI MailSecurity acts as an firewall and protects you from viruses, exploits and threats, as well as attacks targeted at your organization.  GFI MailEssentials is an enterprise level anti-spam solution. GFI MailEssentials offers spam protection at server level and eliminates the need to install and update anti-spam software on each desktop. This tool is and will always be very important to the Agency in protecting us from Spam, which some say may become worse than viruses. 

 We received a total of 477,288 pieces of mail from until Of those, 1,786 were virus and attachment blocks and 335,109 were spam. Legitimate mail delivered to users was 140,393. These numbers indicate that 78% of the received was blocked due to spam and viruses.  Will you be able to stop all spam?  Can you avoid Spam?

 Why important:  HIPAA  Sensitive Data  - ZIXVPM (Virtual Private Messaging) applies encryption to sensitive outbound . The ZIXVPM device to examines and automatically encrypts that meets a predefined set of criteria.  - We are using ZixCorp services to protect our and ensure all Protected Health Information remains confidential.  - Secured communications easy. ZixCorp services enable us to send encrypted to anyone, whether they are ZixCorp customers or not. Secure e-messaging is not just a government mandate; it's a practical way to do business.

 The content of all outbound messages are scanned and compared against two  lexicons, or dictionaries.  - Identifier Lexicon has a criteria of identifier information  example: Social Security numbers  - HIPAA Lexicon contains HIPAA terminology  example: a health condition/disease  The content of the message must meet a criteria defined in both lexicons for  encryption to occur.   Example 1: Message will be encrypted if message or attachments  contain a Social Security number and a name of a disease.  Example 2: Message will not be encrypted if message or attachments  only include a Social Security number.  Example 3: Message will not be encrypted if message or attachments  only include a name of a disease.

 ODH has also enabled “keyword encryption”. Anyone can send an encrypted by using the keyword. The keyword must be the first word in the subject line.  When the user receives the encrypted message and if they are not a ZIX customer, they will need to follow a registration process. The process part of the message they will receive in their inbox. If they are a ZIX customer, the message should go directly to their inbox.

 - Why do we seem in business and in life to wait for bad things to happen to us before we take action?  - Did I get a good backup?  - Where is my laptop?  - Where did that go?  - Is your power on? Take a look at yourself and your organization.