25
Securing the Endpoints in Networks By Govind Rammurthy CEO & Managing Director

Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Embed Size (px)

Citation preview

Page 1: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Securing the Endpoints in Networks

By Govind RammurthyCEO & Managing Director

Page 2: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Agenda

• Business Continuity Demands• Threat Scenario – Past & Present• Endpoints & Endpoint Security• Layers of Endpoint Security• Endpoint Security Best Practices

Page 3: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Business Continuity Demands• Unified Networks for

– Email, Text Chat, Web Browsing, File Sharing, Games– Voice, Audio, Video, Tele-presence, Telemedicine– Web Services, EDI, SCADA, Emergency Services

• Users To Enjoy Mobility– Any service from any device on any network– Seamless mobility across devices and networks– Strong but easy user authentication

• Reliability and Security of Networks.

Page 4: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Business Continuity Demands• Increased Access to Sensitive Information• Mission-critical network• Mobile and remote devices and users• Wide variety of endpoints• Wide variety of users: employees, customers, contractors,

guests• Interoperability

Page 5: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Vendors

Mobile PDA

Mobile Laptops

Home Computer

Local Users

File Servers

Web or App Servers

Email Servers

Desktops

Typical Network Security Scenario

Very High

High

Medium

Risks

Very Low

Low

Page 6: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Typical Network Security Scenario

Very High

High

Medium

Risks

Very Low

Low

Page 7: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Business Continuity Vs Security

Statistics on Attack Trends that could lead to Data/Identity Theft.

Theft / Loss

Insecure Policies

Hacking

Insider Threats

Unknown

54%

28%

13%

4%

1%

Page 8: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Threats were indiscriminate, hit everyone

Threats are highly targeted, regionalized

Threats were disruptive impact visible

Threats steal data & damage brands impact unclear

Remediation action was technical (“remove”)

Remediation more complex, may need to investigate data leak

Entry through perimeter and gateway

Entry through uneducated network clients and endpoints

Threats were noisy & visible to everyone

Threats are silent & unnoticed with variants

Threat Scenario – Past & Present

Page 9: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Endpoints & Endpoint SecurityKey Influencers:

A. Devices and Storage Mediums

B. Portability of Data

C. Accessibility

D. Compliance Laws & Regulations (HIPAA, SOX, etc.)

E. Extranet/Intranet Access provided to employees & partners.

F. Network Downtime due to infections

Page 10: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Endpoints & Endpoint SecurityA. Loss/leak of confidential information

B. Losing valuable employees

C. Unknown/invisible threats and loss of productivity due to using non-complaint storage mediums

D. Unauthorized intrusions – via Web Servers, email Servers, etc.

E. Access to internal networks via individual end points

F. Loss of Productivity due to Infections

Page 11: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

A. IPODs / Portable Entertainment devices

B. Bluetooth Cell Phones

C. Wireless LAN

D. USB Devices

E. Open Non-authenticated Mail/Proxy Servers

F. Lack of defined employee security policies

G. Authorized Applications

Endpoints & Endpoint Security

Page 12: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

• Data in Motion• Emails• Instant Messaging• P2P• File Transfers• Web Posts• Blogs

• Data at Rest• Laptops/Desktops/File Servers• USB

Key Data to be Protected

Endpoint Security Is Mission Critical

Endpoints & Endpoint Security

Page 13: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Reducing Threat Exposure

Information Protection & Control• Data in Motion• Data in RestAsset Protection & Control• Asset management• Desktop computing support• Application Control• Security Incident Alerts/logs• Policy Implementation & Oversight• NAC/NAP

Endpoints & Endpoint Security

Page 14: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

• Endpoint management costs are increasing– Cost of downtime impacts both productivity and revenue– Costs to acquire, manage and administer point products are increasing, as well as the demand

on system resources• Complexity is increasing as well

– Complexity and man power to manage disparate endpoint protection technologies are inefficient and time consuming

• Growing number of new known and unknown threats– Stealth-based and silent attacks are increasing, so there is a need for anti-virus to do much more

• The Perfect Endpoint Security system is with a Centrally Managed Client Security Solution. Some of the Major Technology based threats

– Bluesnarfing - Using Bluetooth– Podslurping – Using iPods– Thumbsucking – Using Thumb Drives– Zero-day threats – New and evolving threats

Endpoints & Endpoint Security

Page 15: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Layers of Endpoint Security

AntiVirus / Antispyware

Web Protection

Firewall

IntrusionPrevention

Device Control

Network AccessControl / Network Access

Protection

Antispam / Antiphising

Page 16: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Layers of Endpoint Security

AntiVirus / Antispyware

• Real-Time AV Scanning

• Spyware, Adware, Keylogger, & Rootkit Blocker

• Suspicious Application Detection

• Registry Monitoring

• Protection against web based threats

• Protection against email based threats

• Spyware and rootkit detection and removal

• Ability to safely remove infections & restore system files effectively

Detect, prevent and remove malicious code & Vulnerability-based protection

Page 17: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Layers of Endpoint Security

• Web/FTP/CHAT Scanning

• Domain and IP reputation based checker

• Block websites with restricted words

• Block web content (Multi-Media & Applications)

• Block web applets, Cookies, Scripts

• Block Pop-Ups

• Browser Cleanup

Web Protection

Page 18: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Layers of Endpoint Security

• Real-Time Antispam filter

• Sender reputation checker

• Antiphising filter

• Attachment Control

Antispam / Antiphising

Page 19: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Layers of Endpoint Security

Firewall

• Managed desktop firewall• Adaptive policies allowing for location awareness• Network, port, protocol, and application control

Page 20: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Layers of Endpoint Security

Intrusion Prevention

• Behavior-based prevention• Network traffic inspection• Application inspection

Page 21: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Layers of Endpoint Security

Device Control

• Device control to prevent data leakage at the endpoint • Protection against mp3 players, USB drives, etc.

Page 22: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Layers of Endpoint Security

Network Access Control / Network Access ProtectionControl Access

– to critical resources– to entire network

Based on– User identity and role– Endpoint identity and health– Other factors

With– Remediation– Management

Page 23: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Endpoint Security Best Practices1. Inventory all IT resources2. Group resources into levels of sensitivity3. Define end user access scenarios4. Associate end user access scenarios with levels of sensitivity5. Validate the policies with a select group using event logging6. Roll policies into full production7. User must Be authenticated

1. With Identity Management System8. Endpoint Must Be Healthy

• Anti-Virus software running and properly configured• Recent scan shows no malware• Personal Firewall running and properly configured• Patches up-to-date

9. Behavior Must Be Acceptable• No port scanning, sending spam

Page 24: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

Any Questions and Queries?

Page 25: Govind Rammurthy - Securing The Endpoints In Networks - Interop Mumbai 2009

THANK YOU!!!THANK YOU!!!