Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.

Similar presentations


Presentation on theme: "Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT."— Presentation transcript:

1 Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT

2 What is an Endpoint? Desktop Computer Server Laptops Tablets Smart Phones POS Device Printers

3 What is End Point Security? End Point Security protects a network by requiring endpoint devices (laptops, mobile devices, etc.) to comply with corporate security standards before access is granted. These security standards may include an approved OS, a VPN client and anti-virus software.

4 What has Changed? Threat Landscape Virus/Trojans - old Phishing emails – Social Engineering Malicious - Ransomware APT’s – AET’s Focus Privileged accounts - old Authenticated users End point devices – Management (who’s - what – when - where) Technology Antivirus – old Solutions Architecture – integrated security

5 5

6 End Point Security - Technology Methodology Signature based Specific code profiles – Palo Alto Heuristic / Behavorial Analysis IOC (Indicators of Compromise) – Tanium/McAfee/Fireeye Attack Indicators – Symantec ATP Proactive - Shavlik

7 Attack Focus

8 Endpoints – Who’s, What, When, Where? Who’s Company/Agency Employee’s Vendor What Desktop Laptop/Tablet Smart Phone POS When ???? Where Office Data Center Cloud Remote

9 The Perimeter Next Generation Firewall (NGFW) Fortinet - Palo Alto – Checkpoint– Cisco Application Awareness Authenticated Users Advanced Threat Protection Sand boxing (on prem and cloud)

10 The Perimeter Next Generation Firewall (NGFW) Email Gateways On Premise Cloud Internet – gmail, yahoo, hotmail MDM BYOD MAM VPN Other Agencies Vendors

11 Case Study Infrastructure – McAfee Implemented Tanium Implemented Malware Bytes Leveraged Palo Alto

12 What’s to come IoT – Internet of Things Endpoints Change the definition Number/types Manage Security Patches Integration Connectivity Anywhere - Anytime

13 Summary Endpoints what was what is what will be Threat Landscape Phishing emails Malicious stuff APT’s – AET’s Technology Methodology Architecture What’s to come IoT Security Architecture Integrated Security

14 Questions?


Download ppt "Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT."

Similar presentations


Ads by Google