SlideShare a Scribd company logo
1 of 19
E is for Endpoint:
6 Security Strategies
for Highly Effective IT
Professionals
Today’s Agenda




             Most Common Threats in Today’s Environment


             6 Steps to Improve Endpoint Security


             Secrets to Effective Defense-in-Depth Approach


             Q&A
Today’s Panelists




    Richard Stiennon         Paul Henry                     Jim Czyzewski
    Chief Research Analyst   Security & Forensics Analyst   Supervisor – Clinical Desktop
    IT-Harvest                                              Support
                                                            MidMichigan Medical Center




3
Most Common Threats
• Hard to dispute the fact that patching
  an underlying software flaw in most
  cases is the best defense
     • In the current environment 72% of
       vulnerabilities have a patch
       available within 24 hours of
       disclosure
     • In the current environment 77% of
       vulnerabilities have a patch
       available within 30 days of
       disclosure
• Microsoft data indicates that in the first
  half of 2011 Zero Day attacks
  amounted to less the 1% of the attack
  surface

Patch or get hacked the                        Source http://www.zdnet.com/blog/security/report-third-

choice is yours…
                                               party-programs-rather-than-microsoft-programs-
                                               responsible-for-most-vulnerabilities/10383?tag=nl.e539


 4
Most Common Threats
• Vulnerable software is not just a
  Microsoft problem…
• Third party software historically has
  had more unpatched vulnerabilities
  then Microsoft
• Java is your number one issue today
  followed by Adobe – the leader for the
  past couple of years
                                           Source http://www.zdnet.com/blog/security/report-third-party-programs-rather-than-microsoft-
                                           programs-responsible-for-most-vulnerabilities/10383?tag=nl.e539




Bottom line is WSUS is
not going to save you !
                                           Source: http://www.zdnet.com/blog/security/37-percent-of-users-browsing-the-web-with-
                                           insecure-java-versions/9541?tag=content;siu-container

 5
Most Common Threats
• Hackers are always going to take
  advantage of areas that simply are not
  properly handled by defenders
• Looking at the chart on the right is
  there any question why Java, Adobe
  and QuickTime are favored by the Bad
  Guys
     • In case you missed it the chart is
       showing the “Most Outdated Web
       Browser Plugins”




What did you really                         Source: http://www.zscaler.com/state-of-web-q3-2011.html




think was going to
happen?

 6
Most Common Threats
• It is important to remember that
  taking advantage of a vulnerability is
  not really the “End Game” for a bad
  guy
      • The Vulnerability only
         represents a “Delivery
         Mechanism”
      • The “End Game” is actually to
         allow them to Execute Malicious
         Code in your environment
• Why are we focusing on the delivery
  method not the end game
      • Duh - because everyone else is
• Hackers will always beat us in the
  delivery mechanism “Arms Race”
• Get ahead of the problem by
  focusing on the End Game


7
6 Steps to Improve Endpoint Security
1 - Think Different
               Traditional                                   Emerging Defense
                Endpoint                                     in Depth Endpoint
                Security                                       Security Stack




                 Blacklisting
                 As The Core


                                          Consumerization
    Zero                                       of IT          Patch &
    Day                                                     Configuration
                                                               Mgmt.
                                Malware
            3rd Party
                                 As a
           Application
                                Service
              Risk




9
2 – Eliminate Exploitable Surface Area

                                                         Areas of Risk
• Patch and configuration analysis and delivery are     at the Endpoint
  needed across all systems; operating systems
                                                               5%
  and applications.                                          Zero-Day

• Unmanaged endpoints on the network are
  unknown and unprotected.                                  30%
                                                       Missing Patches
• Application and operating system patching is not
  benchmarked or continuously enforced.

• Standard configurations are not assessed or
                                                             65%
  enforced.                                            Misconfigurations

• Un-patched browsers represent the highest risk
  for web-borne malware.
                                                      Source: John Pescatore Vice
                                                        President, Gartner Fellow



10
3: Defining a Trusted Environment




11
4 - Protect Your Data




     Targeted Attacks                         Malicious Insider      Negligent Insider




12
          PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
5 - Reduce Complexity and Cost
         Effective                                                              Effective
     but not Efficient                                                         And Efficient
         Many Consoles




                                                IT Control Made Simple
                                                                                     Single
                                                                                    Console


                                          • Agile platform architecture
                                          • Leverage existing endpoint
                                            technology
                                          • Reduced integration and
                                            maintenance costs                     Agile architecture
                      Disparate
                     Architecture         • Improved endpoint performance
                                          • More effective endpoint security




                                                                                 Single Promotable
                                                                                       Agent
                          Many
                         Agents


13
          PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
6 – Relating Risk to the Business
Strategic                                                                                           Tactical

 Business Impact           Compliance & IT Risk                     Compliance Audit   Operational Assessment
                               Exposure                               & Reporting

6 – Relating Risk to the Business




                                                               Compliance & IT Risk
                                                               Management Console




           Integrated strategic compliance and IT risk visibility with tactical assessment
       information to maintain continuous monitoring of organizational compliance & policy

  14
                   PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Best Practices: Lessons Learned From the Field

     • Virtualize the Endpoint
       » Security Management becomes easier since you are now only securing the
         virtual desktop pool instead of hundreds of endpoints
       » You remove the chance of any data residing on the endpoint
     • Scan Unmanaged Clients
       » Clients without security management software need to be identified,
         monitored and remediated (if possible)
     • Test, Test, Test
       » We have over 600 applications running
       » Patch, Remediation, and Configuration changes can have different effects
       » Utilize Production Testing
     • End User Education
       » Keep them aware of the threats
       » Inform them what it is you‟re are doing and why you‟re doing it


15
               PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Tips for Securing Endpoints
• Think „least privilege‟ when choosing platforms
  » While Microsoft‟s strategy of the same code everywhere serves their purpose, it is not
    the most secure strategy for an enterprise.
  » Kiosks, single purpose machines (medical equipment), mobile devices, and embedded
    systems should run on specialized Oos with reduced functionality to reduce exposed
    attack surface.
• NSA Approved Whitelisting for Most Critical Systems
  » Start the transition to whitelisting as the primary defense, and AV as the back-up.
• What Endpoint Security Strategy is Best for New Data Centers & Cloud
  Environments?
  » Virtualization makes cleanup (post infection) easier but exposes critical systems to wide
    spread attacks.
• Consider Virtual Desktops (VDI)
  » For tasks like call centers, data entry and accounting
• Server Lockdown: Neglected in Many Environments
  » Systems that do not change, often should have rigid controls.
A Secure endpoint should consider the network hostile, just as a secure
 network should consider the endpoints as hostile. (And secure apps
 should treat the user as hostile.)
More Information
• Quantify Your IT Risk with Free              E is for Endpoint: 6 Strategies for
  Scanners                                     Highly Effective IT Pros
 » http://www.lumension.com/special-offer/
   premium-security-tools.aspx                 http://www.lumension.com/E-is-for-Endpoint.aspx


• Lumension® Endpoint Management
  and Security Suite
 » Demo:
   http://www.lumension.com/endpoint-
   management-security-suite/demo.aspx
 » Evaluation:
   http://www.lumension.com/endpoint-
   management-security-suite/free-trial.aspx




17
Q&A
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com
http://blog.lumension.com

More Related Content

Viewers also liked

Basics of Machine Learning
Basics of Machine LearningBasics of Machine Learning
Basics of Machine Learningbutest
 
E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce PresentationTylerjd
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningRahul Jain
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningLior Rokach
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business modelsVikram g b
 
Business Analysis Fundamentals
Business Analysis FundamentalsBusiness Analysis Fundamentals
Business Analysis Fundamentalswaelsaid75
 
Business Analysis Techniques
Business Analysis TechniquesBusiness Analysis Techniques
Business Analysis TechniquesIIBA UK Chapter
 
Data Mining Concepts
Data Mining ConceptsData Mining Concepts
Data Mining ConceptsDung Nguyen
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Miningidnats
 
Introduction to Big Data/Machine Learning
Introduction to Big Data/Machine LearningIntroduction to Big Data/Machine Learning
Introduction to Big Data/Machine LearningLars Marius Garshol
 
introduction to data mining tutorial
introduction to data mining tutorial introduction to data mining tutorial
introduction to data mining tutorial Salah Amean
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesSaif Ullah
 
Machine Learning and Data Mining: 12 Classification Rules
Machine Learning and Data Mining: 12 Classification RulesMachine Learning and Data Mining: 12 Classification Rules
Machine Learning and Data Mining: 12 Classification RulesPier Luca Lanzi
 

Viewers also liked (17)

Basics of Machine Learning
Basics of Machine LearningBasics of Machine Learning
Basics of Machine Learning
 
E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce Presentation
 
E commerce
E commerceE commerce
E commerce
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business models
 
Business Analysis Fundamentals
Business Analysis FundamentalsBusiness Analysis Fundamentals
Business Analysis Fundamentals
 
Business Analysis Techniques
Business Analysis TechniquesBusiness Analysis Techniques
Business Analysis Techniques
 
Data Mining Concepts
Data Mining ConceptsData Mining Concepts
Data Mining Concepts
 
Data mining
Data miningData mining
Data mining
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Mining
 
Introduction to Big Data/Machine Learning
Introduction to Big Data/Machine LearningIntroduction to Big Data/Machine Learning
Introduction to Big Data/Machine Learning
 
introduction to data mining tutorial
introduction to data mining tutorial introduction to data mining tutorial
introduction to data mining tutorial
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 
Machine Learning and Data Mining: 12 Classification Rules
Machine Learning and Data Mining: 12 Classification RulesMachine Learning and Data Mining: 12 Classification Rules
Machine Learning and Data Mining: 12 Classification Rules
 

More from Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsLumension
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers GuideLumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationLumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary ResultsLumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftLumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and AnalysisLumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskLumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateLumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security SolutionsLumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesLumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksLumension
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT RiskLumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

More from Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

E is for Endpoint: 6 Security Strategies for High Effective IT Professionals

  • 1. E is for Endpoint: 6 Security Strategies for Highly Effective IT Professionals
  • 2. Today’s Agenda Most Common Threats in Today’s Environment 6 Steps to Improve Endpoint Security Secrets to Effective Defense-in-Depth Approach Q&A
  • 3. Today’s Panelists Richard Stiennon Paul Henry Jim Czyzewski Chief Research Analyst Security & Forensics Analyst Supervisor – Clinical Desktop IT-Harvest Support MidMichigan Medical Center 3
  • 4. Most Common Threats • Hard to dispute the fact that patching an underlying software flaw in most cases is the best defense • In the current environment 72% of vulnerabilities have a patch available within 24 hours of disclosure • In the current environment 77% of vulnerabilities have a patch available within 30 days of disclosure • Microsoft data indicates that in the first half of 2011 Zero Day attacks amounted to less the 1% of the attack surface Patch or get hacked the Source http://www.zdnet.com/blog/security/report-third- choice is yours… party-programs-rather-than-microsoft-programs- responsible-for-most-vulnerabilities/10383?tag=nl.e539 4
  • 5. Most Common Threats • Vulnerable software is not just a Microsoft problem… • Third party software historically has had more unpatched vulnerabilities then Microsoft • Java is your number one issue today followed by Adobe – the leader for the past couple of years Source http://www.zdnet.com/blog/security/report-third-party-programs-rather-than-microsoft- programs-responsible-for-most-vulnerabilities/10383?tag=nl.e539 Bottom line is WSUS is not going to save you ! Source: http://www.zdnet.com/blog/security/37-percent-of-users-browsing-the-web-with- insecure-java-versions/9541?tag=content;siu-container 5
  • 6. Most Common Threats • Hackers are always going to take advantage of areas that simply are not properly handled by defenders • Looking at the chart on the right is there any question why Java, Adobe and QuickTime are favored by the Bad Guys • In case you missed it the chart is showing the “Most Outdated Web Browser Plugins” What did you really Source: http://www.zscaler.com/state-of-web-q3-2011.html think was going to happen? 6
  • 7. Most Common Threats • It is important to remember that taking advantage of a vulnerability is not really the “End Game” for a bad guy • The Vulnerability only represents a “Delivery Mechanism” • The “End Game” is actually to allow them to Execute Malicious Code in your environment • Why are we focusing on the delivery method not the end game • Duh - because everyone else is • Hackers will always beat us in the delivery mechanism “Arms Race” • Get ahead of the problem by focusing on the End Game 7
  • 8. 6 Steps to Improve Endpoint Security
  • 9. 1 - Think Different Traditional Emerging Defense Endpoint in Depth Endpoint Security Security Stack Blacklisting As The Core Consumerization Zero of IT Patch & Day Configuration Mgmt. Malware 3rd Party As a Application Service Risk 9
  • 10. 2 – Eliminate Exploitable Surface Area Areas of Risk • Patch and configuration analysis and delivery are at the Endpoint needed across all systems; operating systems 5% and applications. Zero-Day • Unmanaged endpoints on the network are unknown and unprotected. 30% Missing Patches • Application and operating system patching is not benchmarked or continuously enforced. • Standard configurations are not assessed or 65% enforced. Misconfigurations • Un-patched browsers represent the highest risk for web-borne malware. Source: John Pescatore Vice President, Gartner Fellow 10
  • 11. 3: Defining a Trusted Environment 11
  • 12. 4 - Protect Your Data Targeted Attacks Malicious Insider Negligent Insider 12 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 13. 5 - Reduce Complexity and Cost Effective Effective but not Efficient And Efficient Many Consoles IT Control Made Simple Single Console • Agile platform architecture • Leverage existing endpoint technology • Reduced integration and maintenance costs Agile architecture Disparate Architecture • Improved endpoint performance • More effective endpoint security Single Promotable Agent Many Agents 13 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 14. 6 – Relating Risk to the Business Strategic Tactical Business Impact Compliance & IT Risk Compliance Audit Operational Assessment Exposure & Reporting 6 – Relating Risk to the Business Compliance & IT Risk Management Console Integrated strategic compliance and IT risk visibility with tactical assessment information to maintain continuous monitoring of organizational compliance & policy 14 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 15. Best Practices: Lessons Learned From the Field • Virtualize the Endpoint » Security Management becomes easier since you are now only securing the virtual desktop pool instead of hundreds of endpoints » You remove the chance of any data residing on the endpoint • Scan Unmanaged Clients » Clients without security management software need to be identified, monitored and remediated (if possible) • Test, Test, Test » We have over 600 applications running » Patch, Remediation, and Configuration changes can have different effects » Utilize Production Testing • End User Education » Keep them aware of the threats » Inform them what it is you‟re are doing and why you‟re doing it 15 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 16. Tips for Securing Endpoints • Think „least privilege‟ when choosing platforms » While Microsoft‟s strategy of the same code everywhere serves their purpose, it is not the most secure strategy for an enterprise. » Kiosks, single purpose machines (medical equipment), mobile devices, and embedded systems should run on specialized Oos with reduced functionality to reduce exposed attack surface. • NSA Approved Whitelisting for Most Critical Systems » Start the transition to whitelisting as the primary defense, and AV as the back-up. • What Endpoint Security Strategy is Best for New Data Centers & Cloud Environments? » Virtualization makes cleanup (post infection) easier but exposes critical systems to wide spread attacks. • Consider Virtual Desktops (VDI) » For tasks like call centers, data entry and accounting • Server Lockdown: Neglected in Many Environments » Systems that do not change, often should have rigid controls. A Secure endpoint should consider the network hostile, just as a secure network should consider the endpoints as hostile. (And secure apps should treat the user as hostile.)
  • 17. More Information • Quantify Your IT Risk with Free E is for Endpoint: 6 Strategies for Scanners Highly Effective IT Pros » http://www.lumension.com/special-offer/ premium-security-tools.aspx http://www.lumension.com/E-is-for-Endpoint.aspx • Lumension® Endpoint Management and Security Suite » Demo: http://www.lumension.com/endpoint- management-security-suite/demo.aspx » Evaluation: http://www.lumension.com/endpoint- management-security-suite/free-trial.aspx 17
  • 18. Q&A
  • 19. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com http://blog.lumension.com