Upload
lumension
View
444
Download
1
Tags:
Embed Size (px)
DESCRIPTION
IT security professionals rank third-party application vulnerabilities as the greatest security risk in 2012. Yet, malware continues to exploit these - and other - vulnerabilities to breach our defenses. Knowing how to bridge the gap between knowing the problem and finding a solution is critical to mitigate risks in your endpoint environment. In this presentation, learn: • What the vital layers of defense are for your endpoints. • How to thwart exploitation of your endpoint OS, configuration and 3rd party application vulnerabilities. • How to prevent unknown applications from executing on your systems.
Citation preview
E is for Endpoint: How to Implement the Vital Layers to Protect Your Endpoints
Today’s Agenda
Current Threat Landscape
Back to Basics with Patch and Configuration Management
Stopping Unknown Applications & Attacks
Q&A
Today’s Panelists
3
Eric OgrenPrincipal AnalystOgren Group
Paul HenrySecurity & Forensics Analyst
4
The Malware Trend Continues…
5
Not Simply A Microsoft Issue
•Since 2009 the most hacked software was 3rd party apps and browser add-ons like Adobe and QuickTime.
•Yet we focus our attention on patching Microsoft OS/Applications.
6
All Hail The New Malware King – Java !
7
Apple Also Got A Needed Dose Of Reality
8
600,000 Infected Mac’s Globally
9
BYOD – On Going Blind Adoption
• A recent survey of Companies with 2,000 or more employees indicated that 70% permitted BYOD yet less then 30% had policies to address device security
10
… Your Plugging That In To My Network?
Source: Juniper Mobile Threat Report
E is for Endpoint Series
11
1: Think Different 2: Back to Basics With Patch and Configuration Management 3: How to Check Unknown Apps at the Door 4: Enabling the Self-Defending Endpoint 5: Secrets to Reducing Complexity and Cost 6: How to Continuously Manage Compliance and Risk
Patch and Configuration Management
Eliminate Exploitable Surface Area
Source: John Pescatore Vice President, Gartner Fellow
30% Missing Patches
Areas of Risk at the Endpoint
65% Misconfigurations
5% Zero-Day
13
Patch Management Back in Vogue
Source:
1 - SANS Institute
14
•The top security priority is “patching client-side software”1
» Streamline patch management and reporting across OS’s AND applications
3rd Party Applications
15
•Patch and defend is not just a Microsoft issue
» More than 2/3 of today’s vulnerabilities come from non-Microsoft applications
Application Control
Defining a Trusted Environment
17
Stop Unwanted Applications
»Immediate and simple risk mitigation
18
Application Whitelisting
19
Authorized• Operating Systems• Business Software
• Productivity Software
Known malware• Viruses• Worms• Trojans
Unauthorized• Games• iTunes
• Shareware• Unlicensed S/W
Unknown Malware• Zero day• Targeted• Keyloggers• Spyware
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Layered Approach to Endpoint Protection
20PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
More Information
• Quantify Your IT Risk with Free Scanners» http://www.lumension.com/special-offer/
premium-security-tools.aspx
• Lumension® Endpoint Management and Security Suite» Demo:
http://www.lumension.com/endpoint-management-security-suite/demo.aspx
» Evaluation: http://www.lumension.com/endpoint-management-security-suite/free-trial.aspx
E is for Endpoint Webcast and Whitepaper Series
http://www.lumension.com/E-is-for-Endpoint.aspx
21
Q&A
Global Headquarters8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255
1.888.725.7828
http://blog.lumension.com