23
E is for Endpoint: How to Implement the Vital Layers to Protect Your Endpoints

E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Embed Size (px)

DESCRIPTION

IT security professionals rank third-party application vulnerabilities as the greatest security risk in 2012. Yet, malware continues to exploit these - and other - vulnerabilities to breach our defenses. Knowing how to bridge the gap between knowing the problem and finding a solution is critical to mitigate risks in your endpoint environment. In this presentation, learn: • What the vital layers of defense are for your endpoints. • How to thwart exploitation of your endpoint OS, configuration and 3rd party application vulnerabilities. • How to prevent unknown applications from executing on your systems.

Citation preview

Page 1: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

E is for Endpoint: How to Implement the Vital Layers to Protect Your Endpoints

Page 2: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Today’s Agenda

Current Threat Landscape

Back to Basics with Patch and Configuration Management

Stopping Unknown Applications & Attacks

Q&A

Page 3: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Today’s Panelists

3

Eric OgrenPrincipal AnalystOgren Group

Paul HenrySecurity & Forensics Analyst

Page 4: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

4

The Malware Trend Continues…

Page 5: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

5

Not Simply A Microsoft Issue

•Since 2009 the most hacked software was 3rd party apps and browser add-ons like Adobe and QuickTime.

•Yet we focus our attention on patching Microsoft OS/Applications.

Page 6: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

6

All Hail The New Malware King – Java !

Page 7: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

7

Apple Also Got A Needed Dose Of Reality

Page 8: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

8

600,000 Infected Mac’s Globally

Page 9: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

9

BYOD – On Going Blind Adoption

• A recent survey of Companies with 2,000 or more employees indicated that 70% permitted BYOD yet less then 30% had policies to address device security

Page 10: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

10

… Your Plugging That In To My Network?

Source: Juniper Mobile Threat Report

Page 11: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

E is for Endpoint Series

11

1: Think Different 2: Back to Basics With Patch and Configuration Management 3: How to Check Unknown Apps at the Door 4: Enabling the Self-Defending Endpoint 5: Secrets to Reducing Complexity and Cost 6: How to Continuously Manage Compliance and Risk

Page 12: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Patch and Configuration Management

Page 13: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Eliminate Exploitable Surface Area

Source: John Pescatore Vice President, Gartner Fellow

30% Missing Patches

Areas of Risk at the Endpoint

65% Misconfigurations

5% Zero-Day

13

Page 14: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Patch Management Back in Vogue

Source:

1 - SANS Institute

14

•The top security priority is “patching client-side software”1

» Streamline patch management and reporting across OS’s AND applications

Page 15: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

3rd Party Applications

15

•Patch and defend is not just a Microsoft issue

» More than 2/3 of today’s vulnerabilities come from non-Microsoft applications

Page 16: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Application Control

Page 17: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Defining a Trusted Environment

17

Page 18: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Stop Unwanted Applications

»Immediate and simple risk mitigation

18

Page 19: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Application Whitelisting

19

Authorized• Operating Systems• Business Software

• Productivity Software

Known malware• Viruses• Worms• Trojans

Unauthorized• Games• iTunes

• Shareware• Unlicensed S/W

Unknown Malware• Zero day• Targeted• Keyloggers• Spyware

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Page 20: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Layered Approach to Endpoint Protection

20PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Page 21: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

More Information

• Quantify Your IT Risk with Free Scanners» http://www.lumension.com/special-offer/

premium-security-tools.aspx

• Lumension® Endpoint Management and Security Suite» Demo:

http://www.lumension.com/endpoint-management-security-suite/demo.aspx

» Evaluation: http://www.lumension.com/endpoint-management-security-suite/free-trial.aspx

E is for Endpoint Webcast and Whitepaper Series

http://www.lumension.com/E-is-for-Endpoint.aspx

21

Page 22: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Q&A

Page 23: E is for Endpoint II: How to Implement the Vital Layers to Protect Your Endpoints

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

[email protected]

http://blog.lumension.com