SlideShare una empresa de Scribd logo
1 de 26
Developing Best
Practices for
Application
Whitelisting

An In-Depth Technical Webcast
Today’s Agenda




             Introduction



             Augment Your Defenses to Mitigate Zero-Days,
             with Lessons Learned from the Field
             • Laying the Groundwork
             • Creating Policies
             • Protecting Endpoints
             • Managing the Environment


             Q&A
Today’s Panelists




      Douglas Walls               David Murray
      Chief Information Officer   Sr. Product Manager
      EMSolutions, Inc.           Lumension




3
Why Application Whitelisting Is Important



                                      AVERAGE detection rate after 30 days = 62%




    Today’s Endpoint Security Stack      Sources of Endpoint Risk

                 AV                                     5%
                                                     Zero-Days
                Device
                Control                               30%
              Application                       Missing Patches
               Control
                                                     65%
        Patch & Configuration
            Management                         Misconfigurations

4
Benefits of a Solid Whitelisting Process
Malware Costs Money     Controlled Change is Good




                        © Creative Commons / Kevin Dooley




5
Application Whitelisting Best Practices

                    Laying the
                   Groundwork




                   Application
    Managing the                  Creating
                   Whitelisting
    Environment                   Policies
                    Process




                    Protecting
                    Endpoints


6
Laying the Groundwork
Groundwork | Policies | Lockdown | Management


Clean
        Avoid End User Disruption
        • No need to reimage
        • Off-hours, thorough scan to
          remove known malware




8
Groundwork | Policies | Lockdown | Management


Scan




9
Groundwork | Policies | Lockdown | Management


Organize




10
Groundwork | Policies | Lockdown | Management


Denied Apps

                                      Eliminate unknown or
                                      unwanted applications on
                                      your endpoints


                                               User Endpoint View




Admin Console View

Prevent applications from executing
even while endpoints are in monitor
mode only

11
Creating Policies
Groundwork | Policies | Lockdown | Management


Trusted Updater
Automated whitelist maintenance reduces workload




13
Groundwork | Policies | Lockdown | Management


Trusted Publisher
Automated whitelist maintenance reduces workload




14
Groundwork | Policies | Lockdown | Management


Trusted Path
Automated whitelist maintenance reduces workload




15
Groundwork | Policies | Lockdown | Management


Monitor
          Stabilize Whitelist Maintenance
          • Full visibility into unaccounted for
            changes (good and bad)
          • Accommodate variations
          • Reduce maintenance workload




16
Groundwork | Policies | Lockdown | Management


Local Authorization
                                    Effectively Balance Security
                                    and Productivity
                                    • End user flexibility
                                    • “Third Way” between Monitor
                                      and Lockdown




Admin Console View




                     User Endpoint View
17
Protecting Endpoints
Groundwork | Policies | Lockdown | Management


Enforce




          Easy Transition
          • Minimize disruption
          • Provide flexibility
          • Minimize workload




19
Groundwork | Policies | Lockdown | Management


Fine-Tune




Think Globally, Act Locally
• Harmonize where appropriate
• Anticipate future needs


20
Managing the Environment
Groundwork | Policies | Lockdown | Management


Control                                      Is this a
                                           Known Bad?
               Should my           Is this a
             users have this?   Known Good?




          What is trying
          to install this?
                                                     Is this
                                                   Unwanted?




                                            Who wrote
                                              this?


          Where did this
           come from?




22
Groundwork | Policies | Lockdown | Management


Adapt
Develop processes
• Changes in environment
• Changes in end user needs
• Changes in business needs


Create flexibility to balance
security with productivity across
entire organization




                                    © Creative Commons / Bruce Tuten


23
Q&A
More Information
• Free Security Scanner Tools                    • Get a Quote (and more)
 » Application Scanner – discover all the apps    http://www.lumension.com/
   being used in your network                     intelligent-whitelisting/buy-now.aspx#7
 » Vulnerability Scanner – discover all OS and
   application vulnerabilities on your network
 » Device Scanner – discover all the devices
   being used in your network
   http://www.lumension.com/Resources/
   Security-Tools.aspx


• Lumension® Intelligent Whitelisting™
 » Online Demo Video:
   http://www.lumension.com/Resources/
   Demo-Center/Endpoint-Security.aspx
 » Free Trial (virtual or download):
   http://www.lumension.com/
   intelligent-whitelisting/free-trial.aspx




25
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com
http://blog.lumension.com

Más contenido relacionado

Destacado

хэрэглэгдэхүүн 5
хэрэглэгдэхүүн 5хэрэглэгдэхүүн 5
хэрэглэгдэхүүн 5Enhtuya Oidov
 
Dutch Cuisine | Dag van de Duurzaamheid 2016 | Centrum Duurzaam
Dutch Cuisine | Dag van de Duurzaamheid 2016 | Centrum DuurzaamDutch Cuisine | Dag van de Duurzaamheid 2016 | Centrum Duurzaam
Dutch Cuisine | Dag van de Duurzaamheid 2016 | Centrum Duurzaamduurzame verhalen
 
Gareth Trotman P.P.A. July 2013 (Personality Profile Assessment)
Gareth Trotman P.P.A. July 2013 (Personality Profile Assessment)Gareth Trotman P.P.A. July 2013 (Personality Profile Assessment)
Gareth Trotman P.P.A. July 2013 (Personality Profile Assessment)Gareth Trotman
 

Destacado (6)

хэрэглэгдэхүүн 5
хэрэглэгдэхүүн 5хэрэглэгдэхүүн 5
хэрэглэгдэхүүн 5
 
1 news item
1 news item1 news item
1 news item
 
Phys LO
Phys LOPhys LO
Phys LO
 
Happy Birthday
Happy BirthdayHappy Birthday
Happy Birthday
 
Dutch Cuisine | Dag van de Duurzaamheid 2016 | Centrum Duurzaam
Dutch Cuisine | Dag van de Duurzaamheid 2016 | Centrum DuurzaamDutch Cuisine | Dag van de Duurzaamheid 2016 | Centrum Duurzaam
Dutch Cuisine | Dag van de Duurzaamheid 2016 | Centrum Duurzaam
 
Gareth Trotman P.P.A. July 2013 (Personality Profile Assessment)
Gareth Trotman P.P.A. July 2013 (Personality Profile Assessment)Gareth Trotman P.P.A. July 2013 (Personality Profile Assessment)
Gareth Trotman P.P.A. July 2013 (Personality Profile Assessment)
 

Más de Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

Más de Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Developing Best Practices to Application Whitelisting: An In-Depth Technical Discussion

  • 2. Today’s Agenda Introduction Augment Your Defenses to Mitigate Zero-Days, with Lessons Learned from the Field • Laying the Groundwork • Creating Policies • Protecting Endpoints • Managing the Environment Q&A
  • 3. Today’s Panelists Douglas Walls David Murray Chief Information Officer Sr. Product Manager EMSolutions, Inc. Lumension 3
  • 4. Why Application Whitelisting Is Important AVERAGE detection rate after 30 days = 62% Today’s Endpoint Security Stack Sources of Endpoint Risk AV 5% Zero-Days Device Control 30% Application Missing Patches Control 65% Patch & Configuration Management Misconfigurations 4
  • 5. Benefits of a Solid Whitelisting Process Malware Costs Money Controlled Change is Good © Creative Commons / Kevin Dooley 5
  • 6. Application Whitelisting Best Practices Laying the Groundwork Application Managing the Creating Whitelisting Environment Policies Process Protecting Endpoints 6
  • 8. Groundwork | Policies | Lockdown | Management Clean Avoid End User Disruption • No need to reimage • Off-hours, thorough scan to remove known malware 8
  • 9. Groundwork | Policies | Lockdown | Management Scan 9
  • 10. Groundwork | Policies | Lockdown | Management Organize 10
  • 11. Groundwork | Policies | Lockdown | Management Denied Apps Eliminate unknown or unwanted applications on your endpoints User Endpoint View Admin Console View Prevent applications from executing even while endpoints are in monitor mode only 11
  • 13. Groundwork | Policies | Lockdown | Management Trusted Updater Automated whitelist maintenance reduces workload 13
  • 14. Groundwork | Policies | Lockdown | Management Trusted Publisher Automated whitelist maintenance reduces workload 14
  • 15. Groundwork | Policies | Lockdown | Management Trusted Path Automated whitelist maintenance reduces workload 15
  • 16. Groundwork | Policies | Lockdown | Management Monitor Stabilize Whitelist Maintenance • Full visibility into unaccounted for changes (good and bad) • Accommodate variations • Reduce maintenance workload 16
  • 17. Groundwork | Policies | Lockdown | Management Local Authorization Effectively Balance Security and Productivity • End user flexibility • “Third Way” between Monitor and Lockdown Admin Console View User Endpoint View 17
  • 19. Groundwork | Policies | Lockdown | Management Enforce Easy Transition • Minimize disruption • Provide flexibility • Minimize workload 19
  • 20. Groundwork | Policies | Lockdown | Management Fine-Tune Think Globally, Act Locally • Harmonize where appropriate • Anticipate future needs 20
  • 22. Groundwork | Policies | Lockdown | Management Control Is this a Known Bad? Should my Is this a users have this? Known Good? What is trying to install this? Is this Unwanted? Who wrote this? Where did this come from? 22
  • 23. Groundwork | Policies | Lockdown | Management Adapt Develop processes • Changes in environment • Changes in end user needs • Changes in business needs Create flexibility to balance security with productivity across entire organization © Creative Commons / Bruce Tuten 23
  • 24. Q&A
  • 25. More Information • Free Security Scanner Tools • Get a Quote (and more) » Application Scanner – discover all the apps http://www.lumension.com/ being used in your network intelligent-whitelisting/buy-now.aspx#7 » Vulnerability Scanner – discover all OS and application vulnerabilities on your network » Device Scanner – discover all the devices being used in your network http://www.lumension.com/Resources/ Security-Tools.aspx • Lumension® Intelligent Whitelisting™ » Online Demo Video: http://www.lumension.com/Resources/ Demo-Center/Endpoint-Security.aspx » Free Trial (virtual or download): http://www.lumension.com/ intelligent-whitelisting/free-trial.aspx 25
  • 26. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com http://blog.lumension.com