Upload
lumension
View
670
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Randy Franklin Smith, from Ultimate Windows Security.com, discusses the range of endpoint security threats and the need for: * Integration and consolidated management for core endpoint security technologies * Centralized patch management for multiple software vendors and platforms * Scalability in terms of endpoint quantity and granularity or different endpoint types and profiles * Integration with Active Directory to leverage organization and policy information * Visibility into endpoint discovery, agent status and operation * Wake On LAN capability to coordinate system security maintenance with power management and green initiatives
Citation preview
Practical Steps For Integrating and Managing Endpoint Security
Made possible by:
© 2011 Monterey Technology Group Inc.
Brought to you by
Speakers:Russ Ernst, Group Product ManagerAndrea Hilwig, Product Marketing Manager
http://www.lumension.com/endpoint-management-security-suite.aspx
Preview of Key Points
Categorizing endpoint security risksIdentifying endpoint security technologiesMapping risks to technologies and
prioritizingAssessing Integration in Integrated
Security Suites
© 2011 Monterey Technology Group Inc.
Categorizing endpoint security risks
MalwareMalicious ContentMisbehaved UserInbound Network PenetrationNetwork Data LeakagePhysical Data LossPhysical Data Leakage
Identifying endpoint security technologies and countermeasures
PatchingAVFirewallWhitelistingLeast Privilege ConfigurationDevice ControlEncryptionEnd-user Security Awareness Training
Mapping risks to technologiesand prioritizing
Technologies
Patching AV FirewallWhite-listing
Device Control
Harddisk Encryption
Least Privilege
Training
Risks
Malware ● ● ● ● ●
Malicious Content ● ● ● ● ●
Physical Data Loss ● ● ●
Physical Data Leakage ● ● ● ●
Inbound Network Penetration
● ●
Misbehaved User ● ● ● ● ●
Network Data Leakage ● ● ● ● ●
The need for integration and consolidation in endpoint security
Too many management interfacesToo many agents…
Prioritizing
What combination of technologies best address your core risks?
Which risks do you feel like you may need a best of breed point solution?
Endpoint security suites
No suite does it allWhich one best covers your core risks?
Everyone claims integration but close examination neededAgentUIWindows and non-Windows Integration with Active Directory to leverage
organization and policy informationSilos within the productSingle pane of glass
Endpoint security suites
Additional issuesCentralized patch management for multiple software vendors and platforms
Scalability in terms of endpoint quantity and granularity or different endpoint types and profiles
Visibility into endpoint discovery, agent status and operation
Wake On LAN capability to coordinate system security maintenance with power management and green initiatives
Bottom Line
Endpoint security is a many headed beastRequires a coordinated, planned and strategic
approachAvoid deploying point solutions to address this
week’s security scareThe right suite covers your core risks, your
core platforms and provides real integration
© 2011 Monterey Technology Group Inc.
Brought to you by
Speakers:Russ Ernst, Group Product ManagerAndrea Hilwig, Product Marketing Manager
http://www.lumension.com/endpoint-management-security-suite.aspx