SlideShare uma empresa Scribd logo
1 de 19
Reflective Memory Attacks Deep Dive:
How They Work;
Why They’re Hard to Detect
© 2013 Monterey Technology Group Inc.
Brought to you by
Speaker
 Dan Teal, Senior Architect
www.lumension.com
Preview of Key Points
© 2013 Monterey Technology Group Inc.
How did we get to where we are today with
reflective memory attacks?
How does reflective memory injection work?
Why doesn’t AV or application whitelisting
detect it?
What does a process look like that has been
injected this way?
How can it be detected via security software?
How did we get to where we are today with
reflective memory attacks?
© 2013 Monterey Technology Group Inc.
Simple
scripts
Buffer
overflows
with file
drops
Reflective
memory
injection
How does reflective
memory injection work?
© 2013 Monterey Technology Group Inc.
Relocatable code DLLs Threads
Memory
management
• Stack
• Heap
• Addresses/pointers
Function calls
How does reflective
memory injection work?
© 2013 Monterey Technology Group Inc.
Malformed
content sent to
PC
Buffer overflow
Shell code
activates
Downloads larger
malware from
Internet
Writes malware
directly to heap
memory
• No file access
Dynamically links
references to
function calls
Flags memory as
executable
Spins up a thread
to run the
malware
How does reflective
memory injection work?
© 2013 Monterey Technology Group Inc.
 More details
 Write the library into the address space of the target process
 Pass execution to the Reflective Loader
 Determines its location in memory for parsing its own headers
 Parse kernel32.dll export table to calculate addresses of
 GetProcAddress and VirtualAlloc
 Allocate a contiguous block of memory for loading its image
 Load in its headers and sections
 Process its import table, loading additional libraries as needed
and
 resolving imported function addresses
 Process its relocation table
 Call its entry point function, DLLMain
In a way, Microsoft makes
it easy
© 2013 Monterey Technology Group Inc.
• NtQueryVirtualMemory()
• VirtualAllocEx()
• NtReadVirtualMemory / NtWriteVirtualMemory
• NtCreateThread()
A process can access and manipulate
the address space of another process
• When functions are used within the kernel, even
DRM protected processes can be accessed
• This is why ProcessHacker has the option to install
KProcessHacker
Ease of access is related to how
Windows processes are created
Why doesn’t AV or
application whitelisting detect it?
© 2013 Monterey Technology Group Inc.
 Nothing dropped onto the file system
 Does not use LoadLibrary()
Will not show up in list of loaded modules for a process
 RMI places libraries into processes that are already
authorized and running
DEP, ASLR, and other technologies great but not enough
 Blacklisting involves collecting a list of bad threat
signatures and preventing those apps from running
Reactive: Always a step behind the latest threats
 Traditional signature based anti-virus is not enough
What does a process look like
that has been injected this way?
© 2013 Monterey Technology Group Inc.
“At a process level the only indicators that the library
exists is that there will be a chunk of allocated
memory present, via VirtualAlloc, where the loaded
library resides. This memory will be marked as
readable, writable and executable. There will also be
a thread of execution which will be, periodically at
least, executing code from this memory chunk.”
Stephen Fewer
Harmony Security
http://www.harmonysecurity.com/files/HS-
P005_ReflectiveDllInjection.pdf
How can it be detected
via security software?
© 2013 Monterey Technology Group Inc.
Synchronously
Rock solid but prohibitively expense performance-
wise
Asynchronously
Stack walking
• Performance prohibitive
Correlate processes with legitimate code
• Catches the attack without impacting performance
How can it be detected
via security software?
© 2013 Monterey Technology Group Inc.
Synchronously
Sequence of events
• Allocate memory via VirtualAllocEx
• Copy in the library
• Link it in
• Start a thread.
Windows kernel only gives a few options for
registering for callbacks.
Security software used to be able to hook the kernel
to monitor VirtualAllocEx, but that is no longer an
option on x64 with PatchGuard.
We can register to be notified when a thread is
started but not when memory is allocated
How can it be detected
via security software?
© 2013 Monterey Technology Group Inc.
Asynchronously
Stack walking
• Periodically analyze the call stack ofevery running
thread to ensure
• that the instruction pointer in every stack frame points
to legitimate
• code
• Pros: works very well if implemented correctly and can
also detect types of buffer overflows
• Cons: performance impact
How can it be detected
via security software?
© 2013 Monterey Technology Group Inc.
Asynchronously
Legitimate code correlation
• Continually track every process from the kernel and
correlate with legitimate code
• Threads, memory regions, loaded module list (can be
manipulated)
• Whitelisting provides great support for this – control
loading of kernel modules
• Pros: Low performance impact
• Cons: Limited to detecting library injection
Let’s see detection in action…
© 2013 Monterey Technology Group Inc.
Brought to you by
Speaker
• Dan Teal, Senior Architect
www.lumension.com
More Information
• Free Security Scanner Tools
» Vulnerability Scanner – discover all OS and
application vulnerabilities on your network
» Application Scanner – discover all the apps
being used in your network
» Device Scanner – discover all the devices
being used in your network
http://www.lumension.com/special-
offer/premium-security-tools.aspx
• Lumension® Endpoint Management
and Security Suite
» Online Demo Video:
http://www.lumension.com/Resources/Demo-
Center/Vulnerability-Management.aspx
» Free Trial (virtual or download):
http://www.lumension.com/endpoint-
management-security-suite/free-trial.aspx
• Get a Quote (and more)
http://www.lumension.com/endpoint-
management-security-suite/buy-now.aspx#2
17
Q&A
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255
1.888.725.7828
info@lumension.com

Mais conteúdo relacionado

Mais de Lumension

Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 

Mais de Lumension (20)

Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You.
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Reflective Memory Attacks Deep Dive: How They Work; Why They’re Hard to Detect

  • 1. Reflective Memory Attacks Deep Dive: How They Work; Why They’re Hard to Detect © 2013 Monterey Technology Group Inc.
  • 2. Brought to you by Speaker  Dan Teal, Senior Architect www.lumension.com
  • 3. Preview of Key Points © 2013 Monterey Technology Group Inc. How did we get to where we are today with reflective memory attacks? How does reflective memory injection work? Why doesn’t AV or application whitelisting detect it? What does a process look like that has been injected this way? How can it be detected via security software?
  • 4. How did we get to where we are today with reflective memory attacks? © 2013 Monterey Technology Group Inc. Simple scripts Buffer overflows with file drops Reflective memory injection
  • 5. How does reflective memory injection work? © 2013 Monterey Technology Group Inc. Relocatable code DLLs Threads Memory management • Stack • Heap • Addresses/pointers Function calls
  • 6. How does reflective memory injection work? © 2013 Monterey Technology Group Inc. Malformed content sent to PC Buffer overflow Shell code activates Downloads larger malware from Internet Writes malware directly to heap memory • No file access Dynamically links references to function calls Flags memory as executable Spins up a thread to run the malware
  • 7. How does reflective memory injection work? © 2013 Monterey Technology Group Inc.  More details  Write the library into the address space of the target process  Pass execution to the Reflective Loader  Determines its location in memory for parsing its own headers  Parse kernel32.dll export table to calculate addresses of  GetProcAddress and VirtualAlloc  Allocate a contiguous block of memory for loading its image  Load in its headers and sections  Process its import table, loading additional libraries as needed and  resolving imported function addresses  Process its relocation table  Call its entry point function, DLLMain
  • 8. In a way, Microsoft makes it easy © 2013 Monterey Technology Group Inc. • NtQueryVirtualMemory() • VirtualAllocEx() • NtReadVirtualMemory / NtWriteVirtualMemory • NtCreateThread() A process can access and manipulate the address space of another process • When functions are used within the kernel, even DRM protected processes can be accessed • This is why ProcessHacker has the option to install KProcessHacker Ease of access is related to how Windows processes are created
  • 9. Why doesn’t AV or application whitelisting detect it? © 2013 Monterey Technology Group Inc.  Nothing dropped onto the file system  Does not use LoadLibrary() Will not show up in list of loaded modules for a process  RMI places libraries into processes that are already authorized and running DEP, ASLR, and other technologies great but not enough  Blacklisting involves collecting a list of bad threat signatures and preventing those apps from running Reactive: Always a step behind the latest threats  Traditional signature based anti-virus is not enough
  • 10. What does a process look like that has been injected this way? © 2013 Monterey Technology Group Inc. “At a process level the only indicators that the library exists is that there will be a chunk of allocated memory present, via VirtualAlloc, where the loaded library resides. This memory will be marked as readable, writable and executable. There will also be a thread of execution which will be, periodically at least, executing code from this memory chunk.” Stephen Fewer Harmony Security http://www.harmonysecurity.com/files/HS- P005_ReflectiveDllInjection.pdf
  • 11. How can it be detected via security software? © 2013 Monterey Technology Group Inc. Synchronously Rock solid but prohibitively expense performance- wise Asynchronously Stack walking • Performance prohibitive Correlate processes with legitimate code • Catches the attack without impacting performance
  • 12. How can it be detected via security software? © 2013 Monterey Technology Group Inc. Synchronously Sequence of events • Allocate memory via VirtualAllocEx • Copy in the library • Link it in • Start a thread. Windows kernel only gives a few options for registering for callbacks. Security software used to be able to hook the kernel to monitor VirtualAllocEx, but that is no longer an option on x64 with PatchGuard. We can register to be notified when a thread is started but not when memory is allocated
  • 13. How can it be detected via security software? © 2013 Monterey Technology Group Inc. Asynchronously Stack walking • Periodically analyze the call stack ofevery running thread to ensure • that the instruction pointer in every stack frame points to legitimate • code • Pros: works very well if implemented correctly and can also detect types of buffer overflows • Cons: performance impact
  • 14. How can it be detected via security software? © 2013 Monterey Technology Group Inc. Asynchronously Legitimate code correlation • Continually track every process from the kernel and correlate with legitimate code • Threads, memory regions, loaded module list (can be manipulated) • Whitelisting provides great support for this – control loading of kernel modules • Pros: Low performance impact • Cons: Limited to detecting library injection
  • 15. Let’s see detection in action… © 2013 Monterey Technology Group Inc.
  • 16. Brought to you by Speaker • Dan Teal, Senior Architect www.lumension.com
  • 17. More Information • Free Security Scanner Tools » Vulnerability Scanner – discover all OS and application vulnerabilities on your network » Application Scanner – discover all the apps being used in your network » Device Scanner – discover all the devices being used in your network http://www.lumension.com/special- offer/premium-security-tools.aspx • Lumension® Endpoint Management and Security Suite » Online Demo Video: http://www.lumension.com/Resources/Demo- Center/Vulnerability-Management.aspx » Free Trial (virtual or download): http://www.lumension.com/endpoint- management-security-suite/free-trial.aspx • Get a Quote (and more) http://www.lumension.com/endpoint- management-security-suite/buy-now.aspx#2 17
  • 18. Q&A
  • 19. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com