Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
#MicroFocusCyberSummit
#MicroFocusCyberSummit
Securing Your Devices and Data with ZENworksDarrin VandenBos
Jason Blackett
Security threats in today’s world
How do you protect your endpoints?
Key takeaways
Agenda
3
Security Threats in Today’s World
Malware Attacks on the RiseRansomware, viruses, worms, coinminer attacks, and more
Just a few of the more notable attacks
More to come?Worms—self-spreading malware—enjoyed their heyday around the turn of the century…Until May 2017, it seemed unlikely that another threat could cause global disruption in the same way.
That all changed with the arrival of WannaCry and Petya/NotPetya… Although the vulnerability had been patched several months previously, there was enough unpatched computers online for both threats to cause serious disruption.
Attackers will no doubt have noticed how effective both threats were…It’s likely we’ll see an increase in threats self-propagating using these techniques.
Symantec Internet Security Threat ReportMarch 2018, Volume 23, Page 85
Software Patches Increasing in Number and FrequencyApproximate number of patches released in 2017*
* Released into ZENworks Patch Management
2600
Microsoft
2000
SUSE
50
50
Apple
70
Mozilla
120
Adobe
1500
Red Hat
30
Oracle
Diverse Platforms, Operating Systems, and Applications
Increasing Numbers of Laptops and Mobile Devices
…on the move It can happen to anyone
March 16, 2017 - A laptop belonging to a Secret
Service agent was stolen on Thursday reportedly
exposing details about Donald Trump, the Trump
Tower, and an investigation into Hillary Clinton’s emails, according to ABC News. The
laptop was stolen from a female agent’s vehicle in New York City during a
break-in.
Kari Paul, The Secret Service’s stolen laptop is a reminder to us all to secure devices March 2017
…carrying sensitive data
Kensington IT Security & Laptop Theft reportJuly 2016
One laptop is stolen every 53 seconds
80 percent of the cost of a lost laptop is from data breach
70 million smartphones are lost each year, with only 7 percent recovered
4.3 percent of company-issued smartphones are lost or stolen every year
Employees Doing Their Jobs
Running unauthorized or vulnerable applications
Connecting to unsecure networks
Accessing sensitive data from hotspots
Transferring sensitive data via non-encrypted removable drives
Shutting down security-related applications that are “interfering” with their work
Performing personal and work tasks on the same device
9
2017 Top 5 Threats to IT Security
1. End Users
2. Lack of Security Patching
3. Lack of Security Software and Hardware
4. Inadequate Backup and Planning
5. Stagnate IT Staff
Shawn Pate, Senior Technical AdvisorWorkSmart (worksmart.com)
Shrinking IT Staff and Budgets
2017 Top 5 Threats to IT Security
1. End Users
2. Lack of Security Patching
3. Lack of Security Software and Hardware
4. Inadequate Backup and Planning
5. Stagnate IT Staff
Shawn Pate, Senior Technical AdvisorWorkSmart (worksmart.com)
How do you protect your endpoints?
Securing the Network Perimeter…is not enough
12
Exposure Risk
Every endpoint device, whether internal or
external to your network security perimeter, opens
a window to your organization’s data and
resources
Security Information and Event Management (SIEM)
Securing Endpoints Requires Multiple Layers of Protection
Software Patching
Mailbox Protection
User Education
Personal Firewall
Antimalware/Antivirus
Data Backup
Data Encryption
Wi-Fi and VPN Software
Application Control
iOS and Android
Patching of OS via native mechanisms
Patching of applications via ZENworks application deployment
Start with Patching
14
Windows, Linux, and Mac
Servers and workstations
OS vendor applications and third-party vendor applications
Rules-based policies for automating patch deployment
Staged patch rollout via automated testing-to-production process
Scheduled patch deployment
Dashboards and reports for showing device compliance
Patch Management Configuration Management
ZENworks PatchManagement
ZENworks ConfigurationManagement
Expert Advice“Patch frequently.Patch everything.”
MATTHEW PASCUCCI, Cyber Security Specialist& Privacy Advocate at Front Line Sentinel
“Install security updates as early and as often as possible, and try to avoid using any software that is no longer supported and no longer receives security updates.”
BRIAN DONOHUE, Technology JournalistCovering Network Security @ Cyber4Sight
15
Encrypt Endpoint Data
Windows
UEFI/GPT and BIOS/MBR
Encryption of whole disk or disk partitions
Optional pre-boot authentication via a secured Linux kernel
Help for PBA password recovery
Emergency recovery disk for unbootable devices
Windows
Encrypt any drives that enumerate as removable drives
Utilizes BitLocker encryption
Full Disk Encryption
ZENworks EndpointSecurity Management
Endpoint Security
ZENworks FullDisk Encryption
Configuration Management
iOS and Android
Dependent on MDM capabilities of device
ZENworks ConfigurationManagement
Expert Advice“Encryption works best if it is
ubiquitous and automatic. It should be enabled for everything by default, not a feature you only turn on when you’re doing something you consider worth protecting.”
BRUCE SCHNEIER, American cryptographer and privacy specialist
Separate Work Life from Personal Life
16
iOS and Android
Isolate sensitive company data from personal data
Encrypt data with dedicated, banking-grade encryption
Require two-factor authentication for access to workspace
Wipe the company workspace if a device is lost or an employee leaves
Control the company workspace on mobile devices
ZENworks MobileWorkspace
Restrict access to the workspace if the mobile device does not meet requirements
Allow access to company documents, email, and calendar
Separate work contacts from personal contacts
Expert Advice“Smartphones and other portable devices are among the easiest attack vectors for hackers…
We need to emphasize that these devices hold the key to our lives – both corporate and individual. Because they are always close to us, in our pockets, users experience a false perception of security.”
ONDREJ KREHEL, CEO & Founder, LIFARS
Protect Employees from Themselves
17
Windows
Location aware
Control application execution
Secure wireless access
Enforce VPN usage
Control USB connectivity
Restrict communication hardware
Enforce firewalls
Control storage device access
Extend location awareness and security to 3rd party software via scripting
iOS and Android
Enforce passwords, inactivity timeouts, and device wipes
Control access to features such as cameras, games, application installation, and account settings
Much, much more…
ZENworks EndpointSecurity Management
ZENworks ConfigurationManagement
Endpoint Security Configuration Management
Expert Advice“People often represent
the weakest link in the security chain and are chronically responsible for the failure of security systems.”
BRUCE SCHNEIER, Secrets and Lies
“Security is always excessive until it's not enough.”
ROBBIE SINCLAIR, Head of Security, Country Energy, NSW Australia
Takeaways
Malware attacks or network attacks
Lost or stolen laptops or mobile devices
Transferring sensitive data via non-encrypted removable data drives (RDD)
Running unauthorized or vulnerable applications
Connecting to unsecure networks or accessing sensitive data from hotspots
Performing personal and work tasks on the same device
19
Mitigating Threats with ZENworks
Security Threat Mitigation Method ZENworks Solution
Patch, quarantine, personal firewall
Encryption
RDD controls and encryption
Application controls
Wireless and VPN controls
Mobile device management
Endpoint SecurityManagement
PatchManagement
Full DiskEncryption
ConfigurationManagement
Endpoint SecurityManagement
MobileWorkspace
Endpoint SecurityManagement
Endpoint SecurityManagement
Endpoint SecurityManagement
ConfigurationManagement
ConfigurationManagement
20
Micro Focus ZENworks
Secure Unified Endpoint Management
ConfigurationManagement
DesktopContainers
AssetManagement
PatchManagement
Disk Encryption
EndpointSecurity
MobileWorkspace
Any Device
IT Service Management
ReportingService Any Device
User Centric
21
Want to learn more?
Drop by the Demo Lab
Come to the ZENworks hands-on workshop Thursday at 1:30
Thank You.
#MicroFocusCyberSummit
#MicroFocusCyberSummit