end point security - the right protection in the right place

Upload: quocirca

Post on 09-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 End point security - the right protection in the right place

    1/15

    End point securitythe right protection in the right placeBob Tarzey,Service Director

    Quocirca Ltd

    BrightTALK

    Dec 7th 2010

    2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    2/15

    What is an end point?

    VDI VM

    FIREWALL

    2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    3/15

    The pressing problem of the mobileend point

    Percentage of employees working remotely at some point during a

    week (source Quocirca The distributed business index) 2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    4/15

    Diversity of mobile devices

    2010 Quocirca Ltd

    Source: Gartner

    Published in Information

    Age (Oct 2010)

  • 8/8/2019 End point security - the right protection in the right place

    5/15

    Three main challenges

    2010 Quocirca Ltd

    Malware

    Data loss

    Secure access

  • 8/8/2019 End point security - the right protection in the right place

    6/15

    2 2.5 3

    Email

    Web 2 tools

    External users

    Compromise of sensitive data

    Internal users

    Internet use

    Malware

    Malware always the biggest concern

    Scale from 1 = not

    a threat to 5 = a

    very serious threat

    To what extent are the following a threat to IT security in

    your organisation? (source Quocirca You sent what?)

    2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    7/15

    2.7 3.2 3.7

    Share with unauthorised external users

    Copy to mobile device

    Share with unauthorised internal users

    Post on the web

    Transfer it to memory sticks

    Print

    Send by web mail

    Send by corporate email

    Scale from 1 = notconfident to 5 =

    very confident

    When users have legitimate access to data how confident are

    you that you can control their ability to do the following?

    (source Quocirca You sent what?)

    A threat to data

    2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    8/15

    Three main factors to consider

    The type of device

    VM

    The user Employee

    External

    The transactions

    involved

    2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    9/15

    Two extreme approaches

    Centralisedcontrol

    mechanisms

    Hostbased

    security

    The

    approach

    taken

    should be

    somewhere

    between the

    two

    2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    10/15

    Centralised control Force all application and/or internet access via central

    control points Suits

    Some mobile PC use Remote/home workers Limited use for smartphones

    Tools VPN VDI Next generation firewalls Web proxies Email filtering

    Problems creates choke points 2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    11/15

  • 8/8/2019 End point security - the right protection in the right place

    12/15

    Consumerisation

    2010 Quocirca Ltd

    Consumerisation

    seems inevitable,

    it may be a secret

    weapon

  • 8/8/2019 End point security - the right protection in the right place

    13/15

    Management tools Ensuring protection is in place and remains so keeping device software and security up to date Taking action can be taken when a problem arises Auditing of device ownership and use (e.g. logging

    phone calls made, SMS content and photos) Asset and licence management Taking remote action

    End point management tools End point security tools Mobile device management

    2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    14/15

    A final thought end of life

    14 2010 Quocirca Ltd

  • 8/8/2019 End point security - the right protection in the right place

    15/15

    Thank you

    Thank you

    Bob Tarzey

    Quocircawww.quocirca.com

    Thanks, this presentation will be available on

    www.quocirca.com

    2010 Quocirca Ltd