SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Lumension
and the change
in Endpoint
Protection
Matthew Walker – VP EMEA Channel Sales




       PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
IT Security Continues to be a Growing Problem
Cyber Attacks #4 Top 50 Global Risks1
                                        The New Computing Era
                                        » Enterprise users experience 339 malware
                                          encounters per month2
                                            » 11 per day- 200% increase over same
                                              period
                                            » 1/3 was zero day

                                        » By 2015, more than 60% of enterprises will
                                          have suffered material loss of sensitive
                                          corporate data via mobile devices3

                                        » Less than 20% of CIO’s felt that their device
                                          security and management polices would
                                          satisfy an auditor3

                                        » 60% percent of virtualized servers will be less
                                          secure than the physical servers they replace3
                                                    1) World Economic Forum 2011, 2) Cisco Threat Report 2012, 3) Gartner 2011
What Gartner Says

• Malware effectiveness continues to accelerate, while vendors are busy
  polishing increasingly ineffective solutions and doing little to
  fundamentally reduce the attack surface and protect users.

• ......Application Control holds significant promise but with a few
  exceptions most vendors in this analysis do not provide flexible enough
  solutions for large enterprises.

• Endpoint protection platforms continue to struggle to block typical
  malware threats, and are even less effective with low-volume targeted
  attacks. A few vendors have started to provide proactive tools, such as
  vulnerability detection and application control, that reduce the attack
  surface...(16 January 2012)

                                      Lumension are in Visionary quadrant

3
Growing Application Centric Risk

                                                         What's In Your Network?
                                                        » Social networking applications are detected
                                                          in 95% of organizations **
                                                        » 78% of web 2.0 applications support file
                                                          transfer**
                                                        » 2/3 of applications in use had known
                                                          vulnerabilities**
                                                        » 28% of applications were known to
                                                          propagate malware**

                                                          Gartner projects that 50% of companies
                                                          will be deploying “default deny “ polices to
                                                          restrict application usage, by 2015.
  *Ponemon-Lumension State of the Endpoint 2010,2011
  ** Palo Alto Networks Application Survey 2010, 2011
Trust Stack of the Future
        Today’s Trust Stack         Trust Stack of the Future


          New application                   New application



                                   Is this known good?

    ?     Is this known bad?
                               ?   Is this known bad?
                                   Is this unwanted?
                                   Do I trust the Vendor?
                                   What program introduced it?
                                   Do I trust where it came from?
                                   Do I trust the user installing it?
                                   Am I licensed for this?
    Allow / Block / Remove


                                   Allow / Block / Restrict / Remove

5
Lumension’s Application Control Approach
       Lumension’s approach is to deliver a dynamic trust engine that can
           simultaneously accommodate change and validate trust.


                   People   Path   Process    Publisher
    Trust Engine




                                                               Provides manageable
                                                               rules-based exceptions
                                                               in a dynamic enterprise
                                                               environment.




    Whitelisting                                              Blacklisting




6
Challenges of Endpoint Management
    IT Operations                                                          IT Security


                                                    Lack of integration
                                                   across technologies
                                                   is the #1 IT security
                                                           risk.*




    Challenges                                                             Challenges
    » Lack of Common Management Console                                    » Need for better accuracy

    » Increasing Agent Bloat                                               » User access rights (Local Admin)

    » Increasing and costly back-end Integration                           » Lack of Scalability

    » Lack of visibility and collaboration with IT                         » Silos and insufficient collaboration
      security                                                               between IT and business operations*

    *Worldwide State of The Endpoint Report 2009
7
Lumension EMSS

DSS ITSEC 2012



Liam Puleo
Pre Sales Engineer (EMEA)




      PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
New End Point Strategy
                                                                                  Emerging
                                                                            Endpoint Security Stack


                  Traditional
               Endpoint Security




                                                               Defense-N-
                          Blacklisting                           Depth
                          As The Core                                                Patch &
                                                                                   Configuration
                                                                                      Mgmt.
                                                    Consumerization
Zero Day
                                                         of IT




              3rd Party                Malware
           Application Risk          As a Service




   9
L.E.M.S.S. Core Product Offerings 2012

      Anti-Virus                 Patch Management               Application Control         Device Control
• Protection against all        • Automated patch             • Prevents all unknown     • Device visibility
  known malware                   deployment and                executables from
                                                                                         • File type filtering
  (Blacklistng)                   remediation                   running (whitelisitng)
                                                                                         • Device whitelisitng
• Efficient Malware             • Configuration & Power       • Effective zero day
  removal                         management                    malware protection       • Read only access
• Effective protection          • Software deployment         • Flexible Trust based     • Effective protection
  against fast wide                                             change management          against physically
                                • Heterogeneous and 3rd
  spreading malware                                             policy control             introduced malware
                                  party vulnerability
                                  content coverage            • Application visibility   • Reduces insider and
                                                                                           data loss risk

                           Lumension® Endpoint Management and Security Suite

        Effective                                   Reduced Endpoint                          Enhanced IT
     Endpoint Security                                 Complexity                        Operations & Productivity


 Add on modules:
  Lumension Disk Encryption (Powered by Sophos)
        •    Requires Patch management and Content Wizard
  Power Management
        •    Requires Patch management and Content Wizard
  Content Wizard
  Enterprise Reporting
10
NEXT – Demo of LEMSS

      Secure the endpoint by enforcing a known good baseline of secure
       configurations and an operating system and applications that are
       patched and up-to-date.


      Lock down the configuration and installed applications using
       application control.


      Lock down the endpoint and eliminate data leakage via peripheral
       devices using device control.


      Use anti virus to validate what application control has blocked.




11
        PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Think Different!


       Current Approach to                    New Approach to
      Endpoint Management                   Endpoint Management
            Threat Centric                         Trust Centric
       Point products and tools            Integrated platform technology
           Multiple consoles                      Single console
            Multiple Agents                         Single agent
     Ad-hoc workflows & processes        Standardized workflow & processes
       Reactive, signature-based                Proactive, real time
 Inconsistent interpretation of policy     Shared understanding of policy
           Ad hoc auditing                    Continuous monitoring




12
Intelligent Whitelisting from Lumension

            Anti-Virus                  Patch Management         Application Control

                                                                 • Prevents all unknown
      • Protection against all          • Automated patch          executables from
        known malware                     deployment               running
      • Identification of               • Vulnerability          • Effective zero day
        suspicious code                   remediation              malware production
      • Malware removal                 • Reduces malware risk   • Effective application
                                                                   policy support



                            Intelligent Whitelisting
      More Effective                     Reduced Endpoint               Enhanced IT
     Endpoint Security                      Complexity                  Operations &
                                                                        Productivity



13
              PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC
IWL is Secure

                                         » Block known and unknown malware
                                           without signatures
                                         » Protect against targeted attacks and
                                           Advanced Persistent Threats
                                         » Ensure only trusted applications can run
                                         » Provide enforcement and monitoring for
                                           end-users with local-admin rights
                                         » Reduced risk of data loss
                                         » Eliminate application and configuration
                                           vulnerabilities




14
      PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC
Lumension
 and the change in
Endpoint Protection

       Thank you
           for
       listening!




   PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Mais conteúdo relacionado

Mais procurados

2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity
Svetlana Belyaeva
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Shanker Sareen
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
Nicholas Cramer
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
Ian Sommerville
 

Mais procurados (19)

2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
 
DamballaOverview
DamballaOverviewDamballaOverview
DamballaOverview
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
 
Barqa Edinburgh Final
Barqa Edinburgh FinalBarqa Edinburgh Final
Barqa Edinburgh Final
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
 
Designing your applications with a security twist 2007
Designing your applications with a security twist 2007Designing your applications with a security twist 2007
Designing your applications with a security twist 2007
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 

Semelhante a DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & LEMSS

Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
HyTrust
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
OpSource
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
Jeremiah Grossman
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
Interop
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
 

Semelhante a DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & LEMSS (20)

Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats2009 Security Mega Trends & Emerging Threats
2009 Security Mega Trends & Emerging Threats
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 

Mais de Andris Soroka

Mais de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & LEMSS

  • 1. Lumension and the change in Endpoint Protection Matthew Walker – VP EMEA Channel Sales PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 2. IT Security Continues to be a Growing Problem Cyber Attacks #4 Top 50 Global Risks1 The New Computing Era » Enterprise users experience 339 malware encounters per month2 » 11 per day- 200% increase over same period » 1/3 was zero day » By 2015, more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices3 » Less than 20% of CIO’s felt that their device security and management polices would satisfy an auditor3 » 60% percent of virtualized servers will be less secure than the physical servers they replace3 1) World Economic Forum 2011, 2) Cisco Threat Report 2012, 3) Gartner 2011
  • 3. What Gartner Says • Malware effectiveness continues to accelerate, while vendors are busy polishing increasingly ineffective solutions and doing little to fundamentally reduce the attack surface and protect users. • ......Application Control holds significant promise but with a few exceptions most vendors in this analysis do not provide flexible enough solutions for large enterprises. • Endpoint protection platforms continue to struggle to block typical malware threats, and are even less effective with low-volume targeted attacks. A few vendors have started to provide proactive tools, such as vulnerability detection and application control, that reduce the attack surface...(16 January 2012) Lumension are in Visionary quadrant 3
  • 4. Growing Application Centric Risk What's In Your Network? » Social networking applications are detected in 95% of organizations ** » 78% of web 2.0 applications support file transfer** » 2/3 of applications in use had known vulnerabilities** » 28% of applications were known to propagate malware** Gartner projects that 50% of companies will be deploying “default deny “ polices to restrict application usage, by 2015. *Ponemon-Lumension State of the Endpoint 2010,2011 ** Palo Alto Networks Application Survey 2010, 2011
  • 5. Trust Stack of the Future Today’s Trust Stack Trust Stack of the Future New application New application Is this known good? ? Is this known bad? ? Is this known bad? Is this unwanted? Do I trust the Vendor? What program introduced it? Do I trust where it came from? Do I trust the user installing it? Am I licensed for this? Allow / Block / Remove Allow / Block / Restrict / Remove 5
  • 6. Lumension’s Application Control Approach Lumension’s approach is to deliver a dynamic trust engine that can simultaneously accommodate change and validate trust. People Path Process Publisher Trust Engine Provides manageable rules-based exceptions in a dynamic enterprise environment. Whitelisting Blacklisting 6
  • 7. Challenges of Endpoint Management IT Operations IT Security Lack of integration across technologies is the #1 IT security risk.* Challenges Challenges » Lack of Common Management Console » Need for better accuracy » Increasing Agent Bloat » User access rights (Local Admin) » Increasing and costly back-end Integration » Lack of Scalability » Lack of visibility and collaboration with IT » Silos and insufficient collaboration security between IT and business operations* *Worldwide State of The Endpoint Report 2009 7
  • 8. Lumension EMSS DSS ITSEC 2012 Liam Puleo Pre Sales Engineer (EMEA) PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 9. New End Point Strategy Emerging Endpoint Security Stack Traditional Endpoint Security Defense-N- Blacklisting Depth As The Core Patch & Configuration Mgmt. Consumerization Zero Day of IT 3rd Party Malware Application Risk As a Service 9
  • 10. L.E.M.S.S. Core Product Offerings 2012 Anti-Virus Patch Management Application Control Device Control • Protection against all • Automated patch • Prevents all unknown • Device visibility known malware deployment and executables from • File type filtering (Blacklistng) remediation running (whitelisitng) • Device whitelisitng • Efficient Malware • Configuration & Power • Effective zero day removal management malware protection • Read only access • Effective protection • Software deployment • Flexible Trust based • Effective protection against fast wide change management against physically • Heterogeneous and 3rd spreading malware policy control introduced malware party vulnerability content coverage • Application visibility • Reduces insider and data loss risk Lumension® Endpoint Management and Security Suite Effective Reduced Endpoint Enhanced IT Endpoint Security Complexity Operations & Productivity Add on modules:  Lumension Disk Encryption (Powered by Sophos) • Requires Patch management and Content Wizard  Power Management • Requires Patch management and Content Wizard  Content Wizard  Enterprise Reporting 10
  • 11. NEXT – Demo of LEMSS  Secure the endpoint by enforcing a known good baseline of secure configurations and an operating system and applications that are patched and up-to-date.  Lock down the configuration and installed applications using application control.  Lock down the endpoint and eliminate data leakage via peripheral devices using device control.  Use anti virus to validate what application control has blocked. 11 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 12. Think Different! Current Approach to New Approach to Endpoint Management Endpoint Management Threat Centric Trust Centric Point products and tools Integrated platform technology Multiple consoles Single console Multiple Agents Single agent Ad-hoc workflows & processes Standardized workflow & processes Reactive, signature-based Proactive, real time Inconsistent interpretation of policy Shared understanding of policy Ad hoc auditing Continuous monitoring 12
  • 13. Intelligent Whitelisting from Lumension Anti-Virus Patch Management Application Control • Prevents all unknown • Protection against all • Automated patch executables from known malware deployment running • Identification of • Vulnerability • Effective zero day suspicious code remediation malware production • Malware removal • Reduces malware risk • Effective application policy support Intelligent Whitelisting More Effective Reduced Endpoint Enhanced IT Endpoint Security Complexity Operations & Productivity 13 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC
  • 14. IWL is Secure » Block known and unknown malware without signatures » Protect against targeted attacks and Advanced Persistent Threats » Ensure only trusted applications can run » Provide enforcement and monitoring for end-users with local-admin rights » Reduced risk of data loss » Eliminate application and configuration vulnerabilities 14 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC
  • 15. Lumension and the change in Endpoint Protection Thank you for listening! PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION