SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
Securing Your Endpoints
Using Novell ZENworks             ®                                 ®

Endpoint Security Management



Pete Green                        Scott Guscar
Technical Specialist - ZENworks   Technology Sales Specialist
Novell, Inc./pegreen@novell.com   Novell, Inc./sguscar@novell.com
Agenda

    •   Economic Effects on Security
    •   Compliance
    •   High Profile Breaches
    •   DLP/ILP
    •   “Yes. Endpoints are Outsiders.”
    •   ZENworks Endpoint Security Features
                                   ®




    •   Demonstration
    •   Questions and Answers



2   © Novell, Inc. All rights reserved.
Economic Effects on IT Security
                           2010
Economic Effects on IT Security 2010




4   © Novell, Inc. All rights reserved.
Economic Effects on IT Security 2010
    (cont.)



                 Threats
                 Information
                 Security
                 Budgets
                                   C
                                   h
                                   a
                                   n
                                   g
                                   e



                                          Upturn   Downturn   Upturn



                                                    Time



5   © Novell, Inc. All rights reserved.
Compliance
      2010
Compliance 2010

    •   PCI Focus                                                                •    Legal picture of PCI is
    •   SAS-70                                                                        very bleak and very real
    •   ISO 27002
                                                                                 •    Who is minding the legal
                                                                                      risk?
          –   Instead of focusing on detail
              of PCI-DSS, adopt ISO                                              •    Negligence is no excuse
              27002 for holistic security


           T.J. Hooper as precedent
           “Radio is new technology. We can’t be expected to have radio on our cargo ships!”
           There are precautions so imperative that even their universal disregard will
           not excuse their omission.
           The T.J.Hooper 60 F.2d 737 (2nd cir), cert. denied, 287 U.S. 662 (1932).




7   © Novell, Inc. All rights reserved.
High Profile Breaches
High Profile Breaches




                                          Source: Privacy Rights Clearinghouse




9   © Novell, Inc. All rights reserved.
DLP/ILP
DLP 2010

     •   Data Leakage Prevention

     •   Data Loss Prevention

     •   Data Loss Protection

     •   Information Leak Prevention

     •   Information Loss Prevention       DLP Calculator - http://www.tech-404.com/calculator.html



     •   Information Loss Protection


11   © Novell, Inc. All rights reserved.
DLP 2010
     (cont.)

           Endpoint                 Network/E-mail    Appps/DB                      FS/CMS                 Storage


                                           LAN

            Internal                                 Enterprise     Production
            Employee                                 Applications   Database     File Server
                                                                                                     Disk Arrays   Backup Tape
                                           WAN




            Remote                         VPN                                                       Disk Arrays   Backup Systems
            Employee                                 Business         Replica    File Server
                                                     Analytics




                                                                                                     Disk Arrays   Backup Disk

              Partners                                                           Collaboration and
                                                     Outsourced       Staging    Content Mgmt.
                                                     Dev.                        Systems



           Endpoint                 Network/E-mail    Appps/DB                      FS/CMS                 Storage


12   © Novell, Inc. All rights reserved.
DLP 2010
     (cont.)

           Endpoint                 Network/E-mail             Appps/DB                        FS/CMS                 Storage


                                                 LAN
                                            Network Leak
               Endpoint                                             Priviledge User        Priviledge User              Tapes lost or
            Internal                       Email-IM- HTTP-    EnterpriseBreachProduction
               theft/loss                                                                   FileBreach
                                                                                                 Server                    stolen
            Employee                          FTP-etc.        Applications Database
                                                                                                                Disk Arrays Backup Tape
                                                 WAN




            Remote                               VPN                                                            Disk Arrays   Backup Systems
            Endpoint Leak                   Email leak or     BusinessApps. DB or
                                                                               Replica      File Server
            Employee                                                                       File Server/CMS
             Via print/copy                Packets sniffed          Encryption Key
                                                              Analytics                          Hack
                                              In transit                 Hack




                                                                                                                Disk Arrays   Backup Disk

              Partners                           Public
                                                                                            Collaboration and
                                                                                                (Semi)
                IP Sent to
                                             Infrastructure   Outsourced         Staging
                                                                     Unintentional          Content User
                                                                                             Trusted Mgmt.
                                                                                                                       Discarded disk
             non trusted user                                 Dev.    Distribution          Systems                       exploited
                                              Access Hack                                       Misuse




           Endpoint                 Network/E-mail             Appps/DB                        FS/CMS                 Storage


13   © Novell, Inc. All rights reserved.
DLP 2010
     (cont.)

           Endpoint                 Network/E-mail             Appps/DB                        FS/CMS                 Storage


                                                 LAN
                                            Network Leak
               Endpoint                                             Priviledge User        Priviledge User              Tapes lost or
            Internal                       Email-IM- HTTP-    EnterpriseBreachProduction
               theft/loss                                                                   FileBreach
                                                                                                 Server                    stolen
            Employee                          FTP-etc.        Applications Database
                                                                                                                Disk Arrays Backup Tape
                                                 WAN




            Remote                               VPN                                                            Disk Arrays   Backup Systems
            Endpoint Leak                   Email leak or     BusinessApps. DB or
                                                                               Replica      File Server
            Employee                                                                       File Server/CMS
             Via print/copy                Packets sniffed          Encryption Key
                                                              Analytics                          Hack
                                              In transit                 Hack




                                                                                                                Disk Arrays   Backup Disk

              Partners                           Public
                                                                                            Collaboration and
                                                                                                (Semi)
                IP Sent to
                                             Infrastructure   Outsourced         Staging
                                                                     Unintentional          Content User
                                                                                             Trusted Mgmt.
                                                                                                                       Discarded disk
             non trusted user                                 Dev.    Distribution          Systems                       exploited
                                              Access Hack                                       Misuse




           Endpoint                 Network/E-mail             Appps/DB                        FS/CMS                 Storage


14   © Novell, Inc. All rights reserved.
DLP 2010
     (cont.)

                                    File shares, Servers, Laptops      300+ File Typed         Databases and Repositories

                                           -Microsoft file shares   -Microsoft Office Files    -SharePoint, Documentum
                                           -Unix file shares        -PDF's                     -Lotus Notes, Exchange
                                           -NAS/SAN storage         -PSTs                      -Microsoft Access
                                                                                               -Oracle, SQL, DB2
                                           -Windows 2000, 2003      -Zip Files
          Data at Rest                     -Windows XP, Vista
                                                                                               -Contact Mgmt Systems



                                    File shares, Servers, Laptops      Instant Messages              Web Traffic


                                       -SMTP email                  -Yahoo IM                    -FTP
                                       -Exchange, Lotus, etc.       -MSN Messenger               -HTTP
                                       -Webmail                     -AOL Messenger               -HTTPS
                                       -Text and attachments                                     -TCP/IP
        Data in Motion

                                              Print and Burn               USB                    Copy and Save As

                                       -Local printers              -External hard drives     -Copy to Network shares
                                       -Network printers            -Memory sticks            -Copy to external drives
                                       -Burn ro CDs/DVDs            -Removable media          -Save As to external
                                                                                              drives
          Data in Use

15   © Novell, Inc. All rights reserved.
DLP 2010
     (cont.)

                                    File shares, Servers, Laptops      300+ File Typed         Databases and Repositories

                                           -Microsoft file shares   -Microsoft Office Files    -SharePoint, Documentum
                                           -Unix file shares        -PDF's                     -Lotus Notes, Exchange
                                           -NAS/SAN storage         -PSTs                      -Microsoft Access
                                                                                               -Oracle, SQL, DB2
                                           -Windows 2000, 2003      -Zip Files
          Data at Rest                     -Windows XP, Vista
                                                                                               -Contact Mgmt Systems



                                    File shares, Servers, Laptops      Instant Messages              Web Traffic


                                       -SMTP email                  -Yahoo IM                    -FTP
                                       -Exchange, Lotus, etc.       -MSN Messenger               -HTTP
                                       -Webmail                     -AOL Messenger               -HTTPS
                                       -Text and attachments                                     -TCP/IP
        Data in Motion

                                              Print and Burn               USB                    Copy and Save As

                                       -Local printers              -External hard drives     -Copy to Network shares
                                       -Network printers            -Memory sticks            -Copy to external drives
                                       -Burn ro CDs/DVDs            -Removable media          -Save As to external
                                                                                              drives
          Data in Use

16   © Novell, Inc. All rights reserved.
Yes. Endpoints are Outsiders
Endpoints are Outsiders 2010

     •   “There used to be this thing called the ‘Network Perimeter’”.
                                                                                                               Exhibit 2.
                                                                                                               The B orderless Enterprise
                                                                                                               Source: Yankee Group, 2009

                                   Desktop              Pager
                                    video
                                                                           E-mail
                                                                                    Mobile Phone
           Conferencing                                                                               Audio
                                                                  Your Business                    Conferencing


                                                                Front           Back                                       Fax
                                      Suppliers         SCM Office        ERP   Office
                                                                                       CRM     Customers

     Collaboration
       Software
                                                                        Employees

                                                                                                                          Voice Mail


                        Messaging
                         Software                                                                     Laptop

                                                                                       Phone
                                                  PDA           Room Based
                                                                   video
18   © Novell, Inc. All rights reserved.
Endpoints are Outsiders 2010
     (cont.)




     Source: ISSA Journal, June 2009 – A Forward-looking Approach to the Network Perimeter Paradigm, by Fernando Alonso

19   © Novell, Inc. All rights reserved.
Endpoints are Outsiders 2010
     (cont.)

     •   Over 26,000 different USB          •   Billions and billions of USB
         products exist, 4.3 billion            devices have been sold to date
         shipped in 2007                        –   Over 220 million iPods
          –   Storage devices                   –   Over 30 million iPhones
          –   Networking adapters               –   ANY form factor
          –   Printers, scanners, webcams       –   Music albums now sold as USB
          –   Coffee warmers, hand              –   Their capacity keeps growing –
              massagers                             16GB flash drive is $20
                                                –   Virtually impossible to trace




                Source: In-STAT/MDR


20   © Novell, Inc. All rights reserved.
Inside ZENworks Endpoint Security
               ®
Inside ZENworks Endpoint Security     ®




22   © Novell, Inc. All rights reserved.
ZENworks Endpoint Security
         ®


                Demonstration
ZENworks Endpoint Security
         ®


             Questions and Answers
Inside ZENworks Endpoint Security     ®


     (cont.)




25   © Novell, Inc. All rights reserved.
Inside ZENworks Endpoint Security     ®


     (cont.)




26   © Novell, Inc. All rights reserved.
Inside ZENworks Endpoint Security     ®


     (cont.)




27   © Novell, Inc. All rights reserved.
Inside ZENworks Endpoint Security     ®


     (cont.)




28   © Novell, Inc. All rights reserved.
Inside ZENworks Endpoint Security     ®


     (cont.)




29   © Novell, Inc. All rights reserved.
Inside ZENworks Endpoint Security     ®


     (cont.)




30   © Novell, Inc. All rights reserved.
Inside ZENworks Endpoint Security     ®


     (cont.)




31   © Novell, Inc. All rights reserved.
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2Novell
 
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsUgly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsNovell
 
Novell Success Stories: Endpoint Management for Nonprofits
Novell Success Stories: Endpoint Management for NonprofitsNovell Success Stories: Endpoint Management for Nonprofits
Novell Success Stories: Endpoint Management for NonprofitsNovell
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell
 
Novell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell
 
Novell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and WorkflowsNovell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and WorkflowsNovell
 
Custom Development with Novell Teaming
Custom Development with Novell TeamingCustom Development with Novell Teaming
Custom Development with Novell TeamingNovell
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
Novell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
 
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...Novell
 
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...Novell
 
Novell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
 
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with PlatespinAdvanced Logic Industries
 
Consolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeConsolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
 
Novell ZENworks Advanced Application Management
Novell ZENworks Advanced Application ManagementNovell ZENworks Advanced Application Management
Novell ZENworks Advanced Application ManagementNovell
 
Adaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin OrchestrateAdaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin OrchestrateNovell
 

La actualidad más candente (20)

Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
Novell Filr
Novell FilrNovell Filr
Novell Filr
 
File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2File Access in Novell Open Enterprise Server 2 SP2
File Access in Novell Open Enterprise Server 2 SP2
 
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsUgly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
 
Novell Success Stories: Endpoint Management for Nonprofits
Novell Success Stories: Endpoint Management for NonprofitsNovell Success Stories: Endpoint Management for Nonprofits
Novell Success Stories: Endpoint Management for Nonprofits
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
 
Novell Open Enterprise Server Architecture
Novell Open Enterprise Server ArchitectureNovell Open Enterprise Server Architecture
Novell Open Enterprise Server Architecture
 
Novell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and WorkflowsNovell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and Workflows
 
Custom Development with Novell Teaming
Custom Development with Novell TeamingCustom Development with Novell Teaming
Custom Development with Novell Teaming
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
Novell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access Solution
 
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
Migrating from Novell ZENworks 7 Desktop Management to Novell ZENworks Config...
 
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...
 
Novell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in Education
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
 
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
 
Simplifying network management with Platespin
Simplifying network management with PlatespinSimplifying network management with Platespin
Simplifying network management with Platespin
 
Consolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeConsolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization Initiative
 
Novell ZENworks Advanced Application Management
Novell ZENworks Advanced Application ManagementNovell ZENworks Advanced Application Management
Novell ZENworks Advanced Application Management
 
Adaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin OrchestrateAdaptive Computing Using PlateSpin Orchestrate
Adaptive Computing Using PlateSpin Orchestrate
 

Destacado

FLOW3: Security mit AOP
FLOW3: Security mit AOPFLOW3: Security mit AOP
FLOW3: Security mit AOPnetlogix
 
McAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint SecurityMcAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint Securitynetlogix
 
Data Loss Prevention de RSA
Data Loss Prevention de RSAData Loss Prevention de RSA
Data Loss Prevention de RSAAEC Networks
 
TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0netlogix
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?Priyanka Aash
 

Destacado (7)

FLOW3: Security mit AOP
FLOW3: Security mit AOPFLOW3: Security mit AOP
FLOW3: Security mit AOP
 
McAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint SecurityMcAfee MOVE & Endpoint Security
McAfee MOVE & Endpoint Security
 
Data Loss Prevention de RSA
Data Loss Prevention de RSAData Loss Prevention de RSA
Data Loss Prevention de RSA
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0TYPO3 Neos and Flow - Security 2.0
TYPO3 Neos and Flow - Security 2.0
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 

Similar a Securing Your Endpoints Using Novell ZENworks Endpoint Security Management

Track 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniTrack 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniEMC Forum India
 
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...IMEX Research
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentationeraz
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
Tom McCann - Sopra
Tom McCann - SopraTom McCann - Sopra
Tom McCann - SopraSocitm
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...Mark Matienzo
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf MattssonUlf Mattsson
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center TechnologiesEMC
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis CollaborationCybera Inc.
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...ljaquet
 
SQL Server Workshop Paul Bertucci
SQL Server Workshop Paul BertucciSQL Server Workshop Paul Bertucci
SQL Server Workshop Paul BertucciMark Ginnebaugh
 
SQL Server 2008 Migration Workshop 04/29/2009
SQL Server 2008 Migration Workshop 04/29/2009SQL Server 2008 Migration Workshop 04/29/2009
SQL Server 2008 Migration Workshop 04/29/2009Database Architechs
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummiesrosegrif1
 
Google apps brochure
Google apps brochureGoogle apps brochure
Google apps brochureFrank Jung
 

Similar a Securing Your Endpoints Using Novell ZENworks Endpoint Security Management (20)

Track 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniTrack 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahani
 
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
Next Gen Data Center Implementing Network Storage with Server Blades, Cluster...
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentation
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Tom McCann - Sopra
Tom McCann - SopraTom McCann - Sopra
Tom McCann - Sopra
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
S series presentation
S series presentationS series presentation
S series presentation
 
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
fiwalk With Me: Building Emergent Pre-Ingest Workflows for Digital Archival R...
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center Technologies
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
Les solutions EMC de sauvegarde des données avec déduplication dans les envir...
 
SQL Server Workshop Paul Bertucci
SQL Server Workshop Paul BertucciSQL Server Workshop Paul Bertucci
SQL Server Workshop Paul Bertucci
 
SQL Server 2008 Migration Workshop 04/29/2009
SQL Server 2008 Migration Workshop 04/29/2009SQL Server 2008 Migration Workshop 04/29/2009
SQL Server 2008 Migration Workshop 04/29/2009
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummies
 
Google apps brochure
Google apps brochureGoogle apps brochure
Google apps brochure
 
SQL Server User Group 02/2009
SQL Server User Group 02/2009SQL Server User Group 02/2009
SQL Server User Group 02/2009
 

Más de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudNovell
 

Más de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 

Securing Your Endpoints Using Novell ZENworks Endpoint Security Management

  • 1. Securing Your Endpoints Using Novell ZENworks ® ® Endpoint Security Management Pete Green Scott Guscar Technical Specialist - ZENworks Technology Sales Specialist Novell, Inc./pegreen@novell.com Novell, Inc./sguscar@novell.com
  • 2. Agenda • Economic Effects on Security • Compliance • High Profile Breaches • DLP/ILP • “Yes. Endpoints are Outsiders.” • ZENworks Endpoint Security Features ® • Demonstration • Questions and Answers 2 © Novell, Inc. All rights reserved.
  • 3. Economic Effects on IT Security 2010
  • 4. Economic Effects on IT Security 2010 4 © Novell, Inc. All rights reserved.
  • 5. Economic Effects on IT Security 2010 (cont.) Threats Information Security Budgets C h a n g e Upturn Downturn Upturn Time 5 © Novell, Inc. All rights reserved.
  • 6. Compliance 2010
  • 7. Compliance 2010 • PCI Focus • Legal picture of PCI is • SAS-70 very bleak and very real • ISO 27002 • Who is minding the legal risk? – Instead of focusing on detail of PCI-DSS, adopt ISO • Negligence is no excuse 27002 for holistic security T.J. Hooper as precedent “Radio is new technology. We can’t be expected to have radio on our cargo ships!” There are precautions so imperative that even their universal disregard will not excuse their omission. The T.J.Hooper 60 F.2d 737 (2nd cir), cert. denied, 287 U.S. 662 (1932). 7 © Novell, Inc. All rights reserved.
  • 9. High Profile Breaches Source: Privacy Rights Clearinghouse 9 © Novell, Inc. All rights reserved.
  • 11. DLP 2010 • Data Leakage Prevention • Data Loss Prevention • Data Loss Protection • Information Leak Prevention • Information Loss Prevention DLP Calculator - http://www.tech-404.com/calculator.html • Information Loss Protection 11 © Novell, Inc. All rights reserved.
  • 12. DLP 2010 (cont.) Endpoint Network/E-mail Appps/DB FS/CMS Storage LAN Internal Enterprise Production Employee Applications Database File Server Disk Arrays Backup Tape WAN Remote VPN Disk Arrays Backup Systems Employee Business Replica File Server Analytics Disk Arrays Backup Disk Partners Collaboration and Outsourced Staging Content Mgmt. Dev. Systems Endpoint Network/E-mail Appps/DB FS/CMS Storage 12 © Novell, Inc. All rights reserved.
  • 13. DLP 2010 (cont.) Endpoint Network/E-mail Appps/DB FS/CMS Storage LAN Network Leak Endpoint Priviledge User Priviledge User Tapes lost or Internal Email-IM- HTTP- EnterpriseBreachProduction theft/loss FileBreach Server stolen Employee FTP-etc. Applications Database Disk Arrays Backup Tape WAN Remote VPN Disk Arrays Backup Systems Endpoint Leak Email leak or BusinessApps. DB or Replica File Server Employee File Server/CMS Via print/copy Packets sniffed Encryption Key Analytics Hack In transit Hack Disk Arrays Backup Disk Partners Public Collaboration and (Semi) IP Sent to Infrastructure Outsourced Staging Unintentional Content User Trusted Mgmt. Discarded disk non trusted user Dev. Distribution Systems exploited Access Hack Misuse Endpoint Network/E-mail Appps/DB FS/CMS Storage 13 © Novell, Inc. All rights reserved.
  • 14. DLP 2010 (cont.) Endpoint Network/E-mail Appps/DB FS/CMS Storage LAN Network Leak Endpoint Priviledge User Priviledge User Tapes lost or Internal Email-IM- HTTP- EnterpriseBreachProduction theft/loss FileBreach Server stolen Employee FTP-etc. Applications Database Disk Arrays Backup Tape WAN Remote VPN Disk Arrays Backup Systems Endpoint Leak Email leak or BusinessApps. DB or Replica File Server Employee File Server/CMS Via print/copy Packets sniffed Encryption Key Analytics Hack In transit Hack Disk Arrays Backup Disk Partners Public Collaboration and (Semi) IP Sent to Infrastructure Outsourced Staging Unintentional Content User Trusted Mgmt. Discarded disk non trusted user Dev. Distribution Systems exploited Access Hack Misuse Endpoint Network/E-mail Appps/DB FS/CMS Storage 14 © Novell, Inc. All rights reserved.
  • 15. DLP 2010 (cont.) File shares, Servers, Laptops 300+ File Typed Databases and Repositories -Microsoft file shares -Microsoft Office Files -SharePoint, Documentum -Unix file shares -PDF's -Lotus Notes, Exchange -NAS/SAN storage -PSTs -Microsoft Access -Oracle, SQL, DB2 -Windows 2000, 2003 -Zip Files Data at Rest -Windows XP, Vista -Contact Mgmt Systems File shares, Servers, Laptops Instant Messages Web Traffic -SMTP email -Yahoo IM -FTP -Exchange, Lotus, etc. -MSN Messenger -HTTP -Webmail -AOL Messenger -HTTPS -Text and attachments -TCP/IP Data in Motion Print and Burn USB Copy and Save As -Local printers -External hard drives -Copy to Network shares -Network printers -Memory sticks -Copy to external drives -Burn ro CDs/DVDs -Removable media -Save As to external drives Data in Use 15 © Novell, Inc. All rights reserved.
  • 16. DLP 2010 (cont.) File shares, Servers, Laptops 300+ File Typed Databases and Repositories -Microsoft file shares -Microsoft Office Files -SharePoint, Documentum -Unix file shares -PDF's -Lotus Notes, Exchange -NAS/SAN storage -PSTs -Microsoft Access -Oracle, SQL, DB2 -Windows 2000, 2003 -Zip Files Data at Rest -Windows XP, Vista -Contact Mgmt Systems File shares, Servers, Laptops Instant Messages Web Traffic -SMTP email -Yahoo IM -FTP -Exchange, Lotus, etc. -MSN Messenger -HTTP -Webmail -AOL Messenger -HTTPS -Text and attachments -TCP/IP Data in Motion Print and Burn USB Copy and Save As -Local printers -External hard drives -Copy to Network shares -Network printers -Memory sticks -Copy to external drives -Burn ro CDs/DVDs -Removable media -Save As to external drives Data in Use 16 © Novell, Inc. All rights reserved.
  • 17. Yes. Endpoints are Outsiders
  • 18. Endpoints are Outsiders 2010 • “There used to be this thing called the ‘Network Perimeter’”. Exhibit 2. The B orderless Enterprise Source: Yankee Group, 2009 Desktop Pager video E-mail Mobile Phone Conferencing Audio Your Business Conferencing Front Back Fax Suppliers SCM Office ERP Office CRM Customers Collaboration Software Employees Voice Mail Messaging Software Laptop Phone PDA Room Based video 18 © Novell, Inc. All rights reserved.
  • 19. Endpoints are Outsiders 2010 (cont.) Source: ISSA Journal, June 2009 – A Forward-looking Approach to the Network Perimeter Paradigm, by Fernando Alonso 19 © Novell, Inc. All rights reserved.
  • 20. Endpoints are Outsiders 2010 (cont.) • Over 26,000 different USB • Billions and billions of USB products exist, 4.3 billion devices have been sold to date shipped in 2007 – Over 220 million iPods – Storage devices – Over 30 million iPhones – Networking adapters – ANY form factor – Printers, scanners, webcams – Music albums now sold as USB – Coffee warmers, hand – Their capacity keeps growing – massagers 16GB flash drive is $20 – Virtually impossible to trace Source: In-STAT/MDR 20 © Novell, Inc. All rights reserved.
  • 22. Inside ZENworks Endpoint Security ® 22 © Novell, Inc. All rights reserved.
  • 23. ZENworks Endpoint Security ® Demonstration
  • 24. ZENworks Endpoint Security ® Questions and Answers
  • 25. Inside ZENworks Endpoint Security ® (cont.) 25 © Novell, Inc. All rights reserved.
  • 26. Inside ZENworks Endpoint Security ® (cont.) 26 © Novell, Inc. All rights reserved.
  • 27. Inside ZENworks Endpoint Security ® (cont.) 27 © Novell, Inc. All rights reserved.
  • 28. Inside ZENworks Endpoint Security ® (cont.) 28 © Novell, Inc. All rights reserved.
  • 29. Inside ZENworks Endpoint Security ® (cont.) 29 © Novell, Inc. All rights reserved.
  • 30. Inside ZENworks Endpoint Security ® (cont.) 30 © Novell, Inc. All rights reserved.
  • 31. Inside ZENworks Endpoint Security ® (cont.) 31 © Novell, Inc. All rights reserved.
  • 32.
  • 33. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.