36
Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite Hosted by

Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Embed Size (px)

Citation preview

Page 1: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Stronger Security and IT Operational Excellence:How to Achieve Both from Your Endpoint Management and Security Suite

Hosted by

Page 2: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Mike RothmanAnalyst & President

Securosis LLChttp://securosis.com

Page 3: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

*Any* Computing*Any* Computing

• Connecting to critical information• At any time• From any where• On any device

Page 4: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Defining the “Endpoint” Defining the “Endpoint”

Page 5: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

• Over the past few years, lots of stuff has

been added to endpoint agents:• Anti-spyware• HIPS• Firewall• Encryption

• 10 lbs of **** in a 2 lb. bag

Endpoint Agent OverloadEndpoint Agent Overload

Page 6: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Problem: ScaleProblem: Scale• Attacks aplenty• Millions of new malware

samples• Automated attack kits

• Financial motives brings

new attackers

• The problem isn’t getting

better

Page 7: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Problem: EffectivenessProblem: Effectiveness

• Detection rates on slippery downward slope

• Today’s attacks are not predictable

• Attacks target different exposures

• Web browsers

• Applications (XSS & CSRF)

Page 8: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Problem: SilosProblem: Silos

Page 9: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Ah No.

Are we more Secure?Are we more Secure?

Page 10: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

It’s not working.It’s not working.

So why are endpoint security suites still

a multi-billion dollar business?

Page 11: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite
Page 12: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Oh crap! The Cloud is coming...Oh crap! The Cloud is coming...

• What happens when data can be

both internal/external?

• Perimeter? Buh Bye.

• Increases focus on the endpoint.

Page 13: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

The Answer?The Answer?

• Layered Defenses

• Fundamentals

• Management Leverage

Page 14: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Operating SystemsOperating Systems

• Operating systems are getting more secure (relatively)

• Windows 7, Mac OS X

• Mobile OS lockdown and control (iOS vs. Android)

• But it’s still a lot of code and there will be problems

• Anti-Exploitation Techniques

• Data Execution Prevention (DEP)

• Address Space Layout Randomization (ASLR)

Page 15: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Endpoint Security FundamentalsEndpoint Security Fundamentals• Patch and Update

• Secure Configurations

• HIPS/file integrity

monitoring

• System lockdown

(standard user, GPO,

white listing)

Page 16: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

The Continuum of IntegrationThe Continuum of Integration

Page 17: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Visibility vs. ControlVisibility vs. Control

Page 18: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

SummarySummary• Endpoint security is not dead, nor is it a panacea

• Agent technologies evolving

• Management silos hurt efficiency and effectiveness

• Defense in depth still critical

• Pay attention to the fundamentals

Page 19: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Securosis LLCMike Rothman

[email protected]

http://securosis.com

Twitter: @securityincite

Page 20: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Paul ZimskiVP of Solution Strategy

Lumension

Page 21: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Challenges of Endpoint Management

21

IT Operations

Challenges

IT Security

» Lack of Common Management Console

» Increasing Agent Bloat

» Increasing and costly back-end Integration

» Lack of visibility and collaboration with IT security

Challenges» Need for better accuracy

» User access rights (Local Admin)

» Lack of Scalability

» Silos and insufficient collaboration between IT and business operations*

Lack of integration across technologies is the #1 IT security

risk.*

*Worldwide State of The Endpoint Report 2009

Page 22: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Consolidate Your Endpoint Security Technologies

• Multiple Consoles• 3-6 different management consoles on average

• Agent Bloat• 3-10 agents* installed per endpoint• Decreased network performance

• Lack of Control• 54% of IT security professionals cite managing

the complexity of security as their #1 challenge• Decreasing visibility-disparate data• Ad-hoc monitoring of security posture

• 43% of existing access rights were either excessive or should have been retired

• Increasing TCO of Point Technologies• Integration & Maintenance

Lumension Global State of The Worldwide Endpoint 2009

22

Page 23: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

New Approach to Endpoint Management & Security

Page 24: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Agile Architecture

Best of BreedSolution Capability

Modular Delivery

The Lumension Approach

24

Page 25: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Unified Management Console

25

2009 Integration

Endpoint Operations

Endpoint Security

Compliance

» Role-based workflows

» Consolidated data

» Intuitive web interface

» Central control & visibility

» Operational & strategic reporting

» Improved productivity

25

Page 26: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Modular Agent – Pluggable Enterprise Service Bus

•Single common agent delivers and manages many capabilities via pluggable services

•Provides single, integrated communication mechanism between the agent and the server

•Monitors and secures modules on the endpoint

26

Patch and Remediation

Application Control

Client Transport

SecurityCO

MM

Eve

nt Q

ueue

26

Page 27: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Lumension® Endpoint Management and Security Suite

•Single Endpoint Management solution on a unified platform» Ease of management» Feature extensibility via separately licensed

modules» Integrated endpoint security workflows

•Reduced management overhead» Integrated console» Centralized visibility and control» Single agent architecture

27A

nti

viru

s

Ap

pli

cati

on

Co

ntr

ol

Pat

ch &

Rem

edia

tio

n

Po

wer

Man

agem

ent

n M

od

ule

L.E.M.S.S. Platform

27

Page 28: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Effective and Operational IT Security

SingleConsole

Agile architecture

Single Promotable Agent

Many Consoles

Disparate Architecture

ManyAgents

IT Control Made Simple

• Agile platform architecture

• Leverage existing endpoint technology

• Reduced integration and maintenance costs

• Improved endpoint performance

• More effective endpoint security

Effective but not Efficient

Effective AND Efficient

28

Page 29: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Defense-in-Depth

Patch & Config.Mgmt.

» Address the core IT risk with Patch & Configuration Management

» Stop unwanted / un-trusted change with Application Control

» Protect against insider risk with Device Control

» Deploy a broad defensive perimeter with AntiVirus

» Reduce endpoint complexity with a truly integrated Endpoint Management and Security Suite

29

Page 30: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Lumension Solution Strategy

Endpoint Security

Endpoint Operations

Unified Platform

Endpoint Management & Security

“By 2011, leading enterprise endpoint protection platform (EPP) and PC life cycle management (PCLM) vendors will offer mature integrated security and operations tools. IT organizations should understand the benefits of these tools and develop a strategy for adoption.”

Peter FirstbrookGartner Analyst 2009

30

Page 31: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Lumension® Endpoint Management and Security Suite

• Expanded visibility and control of endpoints - both online and offline

• Heterogeneous O/S support

» Linux (RHEL), Oracle Enterprise Linux, Microsoft, Mac

• Largest 3rd party application vulnerability content support

» Adobe, Microsoft, Apple and more

• Power Management supports custom power policy definition and reporting

• NIST-validated Configuration Management solution

• Mandatory baseline import/export for efficient syndication of baseline polices

Endpoint

Security

End

poin

t O

pera

tions

Endpoint Operations

ManagementLumension® AntiVirus

Lumension® Application Control

Lumension® Device Control

Lumension® Patch and Remediation

Lumension® Configuration Mgmt.

Lumension® Power Management

31

Page 32: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Lumension® Endpoint Management and Security Suite

• Granular policy-based whitelisting, blacklisting and device policy distribution

• Comprehensive discovery of apps, online/offline machines and removable devices

• Proactive protection against Zero-day threats

• Effective malware removal to ensure cleaned system environments

• Integrated workflow across multiple defense layers

• Flexible Trust Engine for change mgmt. across processes, paths, users, vendors

• Encryption to ensure secure data in the event of accidental or malicious data loss

Endpoint

Security

End

poin

t O

pera

tions

Endpoint Security

Lumension® AntiVirus

Lumension® Application Control

Lumension® Device Control

Lumension® Patch and Remediation

Lumension® Configuration Mgmt.

Lumension® Power Management

32

Page 33: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Endpoint

Security

End

poin

t O

pera

tions

Lumension® Endpoint Management and Security Suite

Total Endpoint Management

• Comprehensive solution suite that unifies IT operational and security functions• Delivers a more effective defense-in-depth endpoint security solution• Simplifies endpoint system and agent management through a single console• Centralizes policy management and reporting• Expands operational and security visibility• Reduces technology complexity and integration costs• Flexible and modularly licensed best-of-breed application modules• Scalable and agile single-agent, single-server platform architecture

Lumension® AntiVirus

Lumension® Application Control

Lumension® Device Control

Lumension® Patch and Remediation

Lumension® Configuration Mgmt.

Lumension® Power Management

33

Page 34: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Q&A

Page 35: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

[email protected]

Page 36: Stronger Security and IT Operational Excellence: How to Achieve Both from Your Endpoint Management and Security Suite

Attendee Services

• Download a copy of today’s presentation

• Provide your feedback! Please complete our survey

• View our calendar of upcoming events

• A recorded version of this seminar will be available at www.eSeminarsLive.com

Hosted by