Download presentation
Presentation is loading. Please wait.
Published byHoward Norris Modified over 8 years ago
1
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT
2
What is an Endpoint? Desktop Computer Server Laptops Tablets Smart Phones POS Device Printers
3
What is End Point Security? End Point Security protects a network by requiring endpoint devices (laptops, mobile devices, etc.) to comply with corporate security standards before access is granted. These security standards may include an approved OS, a VPN client and anti-virus software.
4
What has Changed? Threat Landscape Virus/Trojans - old Phishing emails – Social Engineering Malicious - Ransomware APT’s – AET’s Focus Privileged accounts - old Authenticated users End point devices – Management (who’s - what – when - where) Technology Antivirus – old Solutions Architecture – integrated security
5
5
6
End Point Security - Technology Methodology Signature based Specific code profiles – Palo Alto Heuristic / Behavorial Analysis IOC (Indicators of Compromise) – Tanium/McAfee/Fireeye Attack Indicators – Symantec ATP Proactive - Shavlik
7
Attack Focus
8
Endpoints – Who’s, What, When, Where? Who’s Company/Agency Employee’s Vendor What Desktop Laptop/Tablet Smart Phone POS When ???? Where Office Data Center Cloud Remote
9
The Perimeter Next Generation Firewall (NGFW) Fortinet - Palo Alto – Checkpoint– Cisco Application Awareness Authenticated Users Advanced Threat Protection Sand boxing (on prem and cloud)
10
The Perimeter Next Generation Firewall (NGFW) Email Gateways On Premise Cloud Internet – gmail, yahoo, hotmail MDM BYOD MAM VPN Other Agencies Vendors
11
Case Study Infrastructure – McAfee Implemented Tanium Implemented Malware Bytes Leveraged Palo Alto
12
What’s to come IoT – Internet of Things Endpoints Change the definition Number/types Manage Security Patches Integration Connectivity Anywhere - Anytime
13
Summary Endpoints what was what is what will be Threat Landscape Phishing emails Malicious stuff APT’s – AET’s Technology Methodology Architecture What’s to come IoT Security Architecture Integrated Security
14
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.