end point security - the right protection in the right place
TRANSCRIPT
-
8/8/2019 End point security - the right protection in the right place
1/15
End point securitythe right protection in the right placeBob Tarzey,Service Director
Quocirca Ltd
BrightTALK
Dec 7th 2010
2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
2/15
What is an end point?
VDI VM
FIREWALL
2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
3/15
The pressing problem of the mobileend point
Percentage of employees working remotely at some point during a
week (source Quocirca The distributed business index) 2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
4/15
Diversity of mobile devices
2010 Quocirca Ltd
Source: Gartner
Published in Information
Age (Oct 2010)
-
8/8/2019 End point security - the right protection in the right place
5/15
Three main challenges
2010 Quocirca Ltd
Malware
Data loss
Secure access
-
8/8/2019 End point security - the right protection in the right place
6/15
2 2.5 3
Email
Web 2 tools
External users
Compromise of sensitive data
Internal users
Internet use
Malware
Malware always the biggest concern
Scale from 1 = not
a threat to 5 = a
very serious threat
To what extent are the following a threat to IT security in
your organisation? (source Quocirca You sent what?)
2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
7/15
2.7 3.2 3.7
Share with unauthorised external users
Copy to mobile device
Share with unauthorised internal users
Post on the web
Transfer it to memory sticks
Print
Send by web mail
Send by corporate email
Scale from 1 = notconfident to 5 =
very confident
When users have legitimate access to data how confident are
you that you can control their ability to do the following?
(source Quocirca You sent what?)
A threat to data
2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
8/15
Three main factors to consider
The type of device
VM
The user Employee
External
The transactions
involved
2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
9/15
Two extreme approaches
Centralisedcontrol
mechanisms
Hostbased
security
The
approach
taken
should be
somewhere
between the
two
2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
10/15
Centralised control Force all application and/or internet access via central
control points Suits
Some mobile PC use Remote/home workers Limited use for smartphones
Tools VPN VDI Next generation firewalls Web proxies Email filtering
Problems creates choke points 2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
11/15
-
8/8/2019 End point security - the right protection in the right place
12/15
Consumerisation
2010 Quocirca Ltd
Consumerisation
seems inevitable,
it may be a secret
weapon
-
8/8/2019 End point security - the right protection in the right place
13/15
Management tools Ensuring protection is in place and remains so keeping device software and security up to date Taking action can be taken when a problem arises Auditing of device ownership and use (e.g. logging
phone calls made, SMS content and photos) Asset and licence management Taking remote action
End point management tools End point security tools Mobile device management
2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
14/15
A final thought end of life
14 2010 Quocirca Ltd
-
8/8/2019 End point security - the right protection in the right place
15/15
Thank you
Thank you
Bob Tarzey
Quocircawww.quocirca.com
Thanks, this presentation will be available on
www.quocirca.com
2010 Quocirca Ltd