23
#MicroFocusCyberSummit

Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

#MicroFocusCyberSummit

Page 2: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

#MicroFocusCyberSummit

Securing Your Devices and Data with ZENworksDarrin VandenBos

Jason Blackett

Page 3: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Security threats in today’s world

How do you protect your endpoints?

Key takeaways

Agenda

3

Page 4: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Security Threats in Today’s World

Page 5: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Malware Attacks on the RiseRansomware, viruses, worms, coinminer attacks, and more

Just a few of the more notable attacks

More to come?Worms—self-spreading malware—enjoyed their heyday around the turn of the century…Until May 2017, it seemed unlikely that another threat could cause global disruption in the same way.

That all changed with the arrival of WannaCry and Petya/NotPetya… Although the vulnerability had been patched several months previously, there was enough unpatched computers online for both threats to cause serious disruption.

Attackers will no doubt have noticed how effective both threats were…It’s likely we’ll see an increase in threats self-propagating using these techniques.

Symantec Internet Security Threat ReportMarch 2018, Volume 23, Page 85

Page 6: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Software Patches Increasing in Number and FrequencyApproximate number of patches released in 2017*

* Released into ZENworks Patch Management

2600

Microsoft

2000

SUSE

50

Google

50

Apple

70

Mozilla

120

Adobe

1500

Red Hat

30

Oracle

Page 7: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Diverse Platforms, Operating Systems, and Applications

Page 8: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Increasing Numbers of Laptops and Mobile Devices

…on the move It can happen to anyone

March 16, 2017 - A laptop belonging to a Secret

Service agent was stolen on Thursday reportedly

exposing details about Donald Trump, the Trump

Tower, and an investigation into Hillary Clinton’s emails, according to ABC News. The

laptop was stolen from a female agent’s vehicle in New York City during a

break-in.

Kari Paul, The Secret Service’s stolen laptop is a reminder to us all to secure devices March 2017

…carrying sensitive data

Kensington IT Security & Laptop Theft reportJuly 2016

One laptop is stolen every 53 seconds

80 percent of the cost of a lost laptop is from data breach

70 million smartphones are lost each year, with only 7 percent recovered

4.3 percent of company-issued smartphones are lost or stolen every year

Page 9: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Employees Doing Their Jobs

Running unauthorized or vulnerable applications

Connecting to unsecure networks

Accessing sensitive data from hotspots

Transferring sensitive data via non-encrypted removable drives

Shutting down security-related applications that are “interfering” with their work

Performing personal and work tasks on the same device

9

2017 Top 5 Threats to IT Security

1. End Users

2. Lack of Security Patching

3. Lack of Security Software and Hardware

4. Inadequate Backup and Planning

5. Stagnate IT Staff

Shawn Pate, Senior Technical AdvisorWorkSmart (worksmart.com)

Page 10: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Shrinking IT Staff and Budgets

2017 Top 5 Threats to IT Security

1. End Users

2. Lack of Security Patching

3. Lack of Security Software and Hardware

4. Inadequate Backup and Planning

5. Stagnate IT Staff

Shawn Pate, Senior Technical AdvisorWorkSmart (worksmart.com)

Page 11: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

How do you protect your endpoints?

Page 12: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Securing the Network Perimeter…is not enough

12

Exposure Risk

Every endpoint device, whether internal or

external to your network security perimeter, opens

a window to your organization’s data and

resources

Security Information and Event Management (SIEM)

Page 13: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Securing Endpoints Requires Multiple Layers of Protection

Software Patching

Mailbox Protection

User Education

Personal Firewall

Antimalware/Antivirus

Data Backup

Data Encryption

Wi-Fi and VPN Software

Application Control

Page 14: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

iOS and Android

Patching of OS via native mechanisms

Patching of applications via ZENworks application deployment

Start with Patching

14

Windows, Linux, and Mac

Servers and workstations

OS vendor applications and third-party vendor applications

Rules-based policies for automating patch deployment

Staged patch rollout via automated testing-to-production process

Scheduled patch deployment

Dashboards and reports for showing device compliance

Patch Management Configuration Management

ZENworks PatchManagement

ZENworks ConfigurationManagement

Expert Advice“Patch frequently.Patch everything.”

MATTHEW PASCUCCI, Cyber Security Specialist& Privacy Advocate at Front Line Sentinel

“Install security updates as early and as often as possible, and try to avoid using any software that is no longer supported and no longer receives security updates.”

BRIAN DONOHUE, Technology JournalistCovering Network Security @ Cyber4Sight

Page 15: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

15

Encrypt Endpoint Data

Windows

UEFI/GPT and BIOS/MBR

Encryption of whole disk or disk partitions

Optional pre-boot authentication via a secured Linux kernel

Help for PBA password recovery

Emergency recovery disk for unbootable devices

Windows

Encrypt any drives that enumerate as removable drives

Utilizes BitLocker encryption

Full Disk Encryption

ZENworks EndpointSecurity Management

Endpoint Security

ZENworks FullDisk Encryption

Configuration Management

iOS and Android

Dependent on MDM capabilities of device

ZENworks ConfigurationManagement

Expert Advice“Encryption works best if it is

ubiquitous and automatic. It should be enabled for everything by default, not a feature you only turn on when you’re doing something you consider worth protecting.”

BRUCE SCHNEIER, American cryptographer and privacy specialist

Page 16: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Separate Work Life from Personal Life

16

iOS and Android

Isolate sensitive company data from personal data

Encrypt data with dedicated, banking-grade encryption

Require two-factor authentication for access to workspace

Wipe the company workspace if a device is lost or an employee leaves

Control the company workspace on mobile devices

ZENworks MobileWorkspace

Restrict access to the workspace if the mobile device does not meet requirements

Allow access to company documents, email, and calendar

Separate work contacts from personal contacts

Expert Advice“Smartphones and other portable devices are among the easiest attack vectors for hackers…

We need to emphasize that these devices hold the key to our lives – both corporate and individual. Because they are always close to us, in our pockets, users experience a false perception of security.”

ONDREJ KREHEL, CEO & Founder, LIFARS

Page 17: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Protect Employees from Themselves

17

Windows

Location aware

Control application execution

Secure wireless access

Enforce VPN usage

Control USB connectivity

Restrict communication hardware

Enforce firewalls

Control storage device access

Extend location awareness and security to 3rd party software via scripting

iOS and Android

Enforce passwords, inactivity timeouts, and device wipes

Control access to features such as cameras, games, application installation, and account settings

Much, much more…

ZENworks EndpointSecurity Management

ZENworks ConfigurationManagement

Endpoint Security Configuration Management

Expert Advice“People often represent

the weakest link in the security chain and are chronically responsible for the failure of security systems.”

BRUCE SCHNEIER, Secrets and Lies

“Security is always excessive until it's not enough.”

ROBBIE SINCLAIR, Head of Security, Country Energy, NSW Australia

Page 18: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Takeaways

Page 19: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Malware attacks or network attacks

Lost or stolen laptops or mobile devices

Transferring sensitive data via non-encrypted removable data drives (RDD)

Running unauthorized or vulnerable applications

Connecting to unsecure networks or accessing sensitive data from hotspots

Performing personal and work tasks on the same device

19

Mitigating Threats with ZENworks

Security Threat Mitigation Method ZENworks Solution

Patch, quarantine, personal firewall

Encryption

RDD controls and encryption

Application controls

Wireless and VPN controls

Mobile device management

Endpoint SecurityManagement

PatchManagement

Full DiskEncryption

ConfigurationManagement

Endpoint SecurityManagement

MobileWorkspace

Endpoint SecurityManagement

Endpoint SecurityManagement

Endpoint SecurityManagement

ConfigurationManagement

ConfigurationManagement

Page 20: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

20

Micro Focus ZENworks

Secure Unified Endpoint Management

ConfigurationManagement

DesktopContainers

AssetManagement

PatchManagement

Disk Encryption

EndpointSecurity

MobileWorkspace

Any Device

IT Service Management

ReportingService Any Device

User Centric

Page 21: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

21

Want to learn more?

Drop by the Demo Lab

Come to the ZENworks hands-on workshop Thursday at 1:30

Page 22: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

Thank You.

#MicroFocusCyberSummit

Page 23: Micro Focus Presentation Template · 2018. 10. 8. · Microsoft 2000 SUSE 50 Google 50 Apple 70 Mozilla 120 Adobe 1500 Red Hat 30 Oracle. ... Control the company workspace on mobile

#MicroFocusCyberSummit