lumension security - state of endpoint and security dss @vilnius 2010
DESCRIPTION
Lumension Security is making the revolution in Endpoint Security by enabling one agent one platform solution to answer all the endpoint security related questions.TRANSCRIPT
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
The Evolving State of Endpoint Management
& Security
Maik Bockelmann VP EMEA
He told me … what’s happen today morning!
Devices Nodes
I think I know … where he really is!
Devices Nodes
What is an Endpoint?
The Endpoint: Any device with a URL specifying where the endpoint can be accessed, and binding properties that specify how the data will be transferred. -Wikipedia
Devices Nodes
5 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Do you remember? … how easy it was!
… and it was IT’s Job to Say NO!
6
IT Networks 2000: Static Networks
7
Corporate HQ
Remote Offices & Subsidiaries
WAN
Corporate Data Center
….. And data centers used to house a company’s data inside a safe and
well-defined perimeter
That Was Yesterday!
8 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Today’s Endpoint Management & Security
Landscape has Fundamentally Changed
9 9
Forces Impacting Today's Endpoint Environment
9 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
New Threat Landscape
Compliance
Consumerization
of IT
Total Cost of Ownership
Total Economic Impact From Data Loss & Security Breaches
Well Funded. Well Organized.
Financially Motivated.
Today We Deal with a Growing Cyber Mafia
* information provided by Interior Ministry on losses from card fraud - comparison with those of payment systems REMA (mio RUB)
Losses from card fraud
Losings: Russia in 2009
Камера на ПИН-ПАД
Wincor ProCash Wincor, Diebold
New types of devices
NCR
Насадка для кражи треков
Diebold
Через отверстие проводится подключение к штатной головке считывателя магнитной полосы
…or just shopping … and the story starts
…or just shopping … welcome surprise
…or just shopping … and please block your card
…or just shopping … what’s happen
…or just shopping … analysis
21 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Ponemon Institute, 2009
60% of your employees would take confidential information if they left your organization.
Consumerization of IT
Consumerization of IT
23 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
An adoption trend led by a technology savvy workforce that self-provisions collaborative tools, information sources, and human networks — requiring minimal or no ongoing support from a central IT organization.
Employee provisioned laptop programs can lead to greater user satisfaction and reduce total ownership costs up to 44% percent. Gartner 2008
If Facebook were a country:
24 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
It would be the 4th largest country in the world
1. China 2. India 3. US 4. Facebook 5. Indonesia 6. Brazil 7. Pakistan 8. Bangladesh
Age of Mobile Computing
25 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Netbook
Terminals
3GS
Cellular
Speed & Flexibility
Mobility & Power
Changing IT Role: Enables the Use of New Technology
26
Major Shift For IT Security
It’s now IT’s job to say YES!
Growing Compliance
Mounting External Compliance Regulations
28 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
EU Directive
Basel II
HIPAA
Sarbanes-Oxley, Section 404
PCI Data Security Standards (DSS)
PII Security Standards
21CFR11
Gramm Leach Bliley (GLBA)
USA Patriot Act
SB1386 (CA Privacy Act)
EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive
HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA
21CFR11 21CFR11 21CFR11 21CFR11 21CFR11
Gramm Leach Bliley (GLBA)
Gramm Leach Bliley (GLBA)
Gramm Leach Bliley (GLBA)
Gramm Leach Bliley (GLBA)
USA Patriot Act USA Patriot Act USA Patriot Act
SB1386 (CA Privacy Act)
SB1386 (CA Privacy Act)
Basel II
PCI Data Security Standards (DSS)
Time *The Struggle to Manage Security Compliance for Multiple Regulations”..SecurityCompliance.com
3 out 4 organizations must comply with two or more regulations and corresponding audits.
43% of organizations comply with 3 or more regulations.
Our IT Networks Were Never Designed With Compliance In Mind
Today Organizations Spend 30-50% More On Compliance Than They Should
Total Cost of Ownership
31 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
TCO Pressures Will Drive IT To Even Greater Distributed and Virtual Solutions
The average company has intellectual property worth $ xx million
stored, accessed and managed overseas.
Unsecured Economies report 2009
IT Networks 2009: Highly Distributed
33
Corporate HQ
Mobile Endpoints
Remote Offices & Subsidiaries
WAN Internet
Data Center
Data has effectively moved away from the data center to a borderless endpoint
Cloud Computing is a REALITY
…but which cloud will it be?
So What Does All This Mean For Endpoint Security?
Our approach to IT security remains the same:
Threat Centric
While the Endpoint & Networks are changing…
There will always be ways to breakdown walls!
Break with the Old Approach
It’s No Longer Relevant
1. Think Differently About the Endpoint
2. Converge our Silos
3. Adopt a Trust-Centric Approach
People are “The New Perimeter”
41 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Need For Optimized IT Risk Management
42
In a world where nothing can be 100% secure the game organizations play is “optimization” – How do I mitigate the most amount of IT risk with the lowest investment of time and money?
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION 42
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Nodes Devices Applications Business Processes
People Compliance Regulations
Limited IT Resources and Investment Budget | Personnel | Technology
Growing complexity and external pressure
43
Functional Silos
Operational IT
Lifecycle Management, Remove Risk from Technology
IT Security
Stopping Threats, & Protecting Data
We need to start thinking differently
We need a Trust-Centric Approach to Endpoint Management & Security
Trust Stack of the Future
45
Today’s Trust Stack
New application New application
Is this known bad? Is this known good? Is this known bad? Is this unwanted? Do I trust the Vendor? What program introduced it? Do I trust where it came from? Do I trust the user installing it? Am I licensed for this?
Allow / Block / Remove
Trust Stack of the Future
? ?
Allow / Block / Restrict / Remove
Challenges with Today's Technology Approaches?
47 47
Compliance & IT Risk Management
Console
47
Visibility: Disparate Data
Vulnerability Assesment
Systems Mgt Patching AV/Malware Data Protection Compliance
Limited visibility Disparate workflows across ops & security Limited relational insight Limited user productivity across multiple management consoles
Data Data Data Data Data Data
48
Inefficient Scalability
• Network and endpoint resources are not scalable and require high server to endpoint ratios and cannot meet changing needs without additional costs • Network resources are taxed as higher levels of bandwidth, storage and processing are required to manage multiple and disparate systems • Existing security and operations platforms are rarely open and extensible • Multiple agents are required to perform related tasks leading to increased agent bloat
49 49
Lumension Endpoint Management and Security Suite
49
Lumension® Patch and Remediation
Lumension® Scan
Lumension® Security Configuration Management
Lumension® Asset Manager
Lumension® Power Mgmt Reporting
Lumension® Content Wizard
Lumension® Risk Manager
Lumension® Enterprise Reporting
Compliance Endpoint Operations Endpoint Security
Lumension® AntiVirus
Lumension® Application Control
Lumension® Endpoint Integrity Service [IWL]
Lumension® Device Control
Lumension® Data Loss Prevention
PGP® Whole Disk Encryption
IT Risk M
anagement
Intelligent Whitelisting
49
CTP
CTP
L.E.M.S.S. - DEMO December 2nd 2010