application rationalization - reducing the risk from unpatched and unsupported software
Post on 16-Apr-2017
1.107 Views
Preview:
TRANSCRIPT
Application Rationalization:Reducing risk from unpatched and unsupported software
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential2
Todays Presenters
Timothy DavisSenior Product Marketing Manager, Flexera Software
Tdavis@Flexerasoftware.com
@TimothyToday
MPereira@flexerasoftware.com
Marcelo PereiraSoftware Vulnerability Product Marketing ManagerFlexera Software
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential3
The Enterprise Software Landscape Change in the last 10 years:
20x increase in the number of software vendors
10x the number of software titles companies buy
12x the number of internal “buyers” inside companies
4x increase in spending on software
$Source: GigaOm.com, The Future of Enterprise Software is Abundance, by Auren Hoffman
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential4
The Enterprise Software Landscape
• 34% of orgs still have XP and Windows Server 2003• 20% have Internet Explorer 8, 9, or 10
$Click Here - To watch this webinar on demand
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential5
System management
Improving the availability and performance
Achieving seamless user interaction across devices
Collaboration strategies
Project management
Ensuring IT personnel are effectively trained
Improving applications to better match the business
Lowering cost of IT infrustructure
Improving security for IT systems
0 10 20 30 40 50 60 70 80
45
47
48
49
50
51
59
60
71
Top Technological Priorities
Source: Tech Pro Research
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential6
The Attack Vector You Should Never Ignore
“Apparently, hackers really do still party like it’s 1999.
The tally of really old CVEs suggests that any
vulnerability management program should include broad coverage of the “oldies but goodies”
- Verizon
Intelligence and visibility of vulnerabilities are crucial
99.9%of the exploited vulnerabilities were compromised more than a year after the Common Vulnerability & Exposure (CVE) was published
Source: “ 2015 Data Breach Investigation Report ” Verizon http://www.verizonenterprise.com/DBIR/2015/
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential7
Time to Patch
Source: “Secunia Vulnerability Review 2015.” https://secunia.com/vulnerability-review/
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential8
Vulnerabilities in All Products in 2014:A 55% increase in vulnerabilities - 5 year trend
15,435
vulnerabilities were discovered in
3,870 vulnerable products
Source: “Secunia Vulnerability Review 2015.” https://secunia.com/vulnerability-review/
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential9
Advisories 2016
476Secunia Research
has written
Advisories in February 2016
939Secunia Research has
written
Advisories in 2016 up to 29 February
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential10
Digesting the vulnerability data for February 2016
No advisories for Extremely Critical vulnerabilities written in February!
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential11
Digesting the vulnerability data for February 2016• Solution status for the 79 “Highly Critical” Advisories
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential12
Application Rationalization:Reducing the Attack Surface
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential13
Rationalization Benefits
Reduces Infrastructure & support costs
Mitigates risk and reduce the attack surface
Advances dialogue with the business
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential14
Microsoft Configuration Manager Inventory: Too Much Data
- Inconsistent naming
- Minor versions
- Drivers
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential15
Actionable Information Familiar Names
Simplified Versions
Filtered content
Categories
Classifications
Compatibility
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential16
Application Recognition Service
Microsoft System Center Configuration Manager
AdminStudio Suite
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential17
Identify EOL
Keep up with new versions
Know which are being used
Determine Suitability
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential18
Identify EOL
Keep up with new versions
Know which are being used
Determine Suitability
Start workflows
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential19
Unified Application Readiness ProcessDeliver Consistent and Reliable Applications for All Devices
Deploy
Fix & Package
Plan
Assess Compatibility
Rationalize
Identify Identify deployed, used, and vulnerable applications
Eliminate unused, duplicate, and risky applications
Determine suitability and security patches for target platform
Scope, prioritize, and plan delivery
Fix, package and test for target environments
Deploy to management systems and enterprise app store
Proc
ess
Man
agem
ent a
nd R
epor
ting
© 2016 Flexera Software LLC. All rights reserved. | Company Confidential20
Next Steps
• Visit www.FlexeraSoftware.com for these downloads
• Contact a Flexera representative or business partner to learn more – North America: 800-809-5659– Europe, Middle East & Africa: +44 (0) 870 873 6300– Asia-Pacific: +61 3 9895 2000
The latest Vulnerability Review
Preparing for Windows 10and beyond White Paper
Click Here > To watch this webinar on demand
top related