it's time to rethink your endpoint strategy

31
RETHINKING Your Endpoint Security Strategy Paul Henry | Security and Forensics Analyst

Upload: lumension

Post on 20-Aug-2015

791 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: It's Time to Rethink Your Endpoint Strategy

RETHINKINGYour Endpoint

Security Strategy

Paul Henry | Security and Forensics Analyst

Page 2: It's Time to Rethink Your Endpoint Strategy

The Threat Landscape has Evolved…

Page 3: It's Time to Rethink Your Endpoint Strategy

Shift in Information that is Targeted

Market for stolen data is saturated» Then - Stolen personally identifiable

information sold on the black market for up to $15 per record

» Now - Credit card data has dropped to about 20 cents per record

New, more valuable target is now intellectual property (IP)

» Revenue-generating information» Much larger impact and value –

organization versus individuals

3

Page 4: It's Time to Rethink Your Endpoint Strategy

Data Breaches Impact Your Bottom Line

4

Page 5: It's Time to Rethink Your Endpoint Strategy

No Longer a Microsoft World

» Then-Priority on patching servers and Windows O/S

» Now-PC and 3rd party apps are the biggest source of enterprise risk

5

Page 6: It's Time to Rethink Your Endpoint Strategy

Continued Increase of Cyber Crime

Rise in malicious attacks

» Root cause of 31% of the data breaches studied (up from 24% YoY)*

Cyber attacks impact business

» 97% of respondents consider cyber attacks as the most severe threat to their ability to carry out their missions

» Harder to detect and more difficult to contain and remediate

» Financially motivated cyber criminals

* Ponemon Institute, Annual Cost of Data Breach 2011

6

Page 7: It's Time to Rethink Your Endpoint Strategy

Rising Cyber Terrorism… Impact of WikiLeaks

7

Page 8: It's Time to Rethink Your Endpoint Strategy

The Reality of Advanced Persistent Threats

More Sophisticated Threats Leveraging Multiple Attack Vectors

» Zero-day and third party application vulnerabilities

» Physical access through data ports

» Web-based attacks through the browser

The Rise of APTs…

» Highly targeted, constantly evolving, custom-developed malware

» Sony

» Stuxnet

» RSA

8

Page 9: It's Time to Rethink Your Endpoint Strategy

APT Example… Stuxnet

9

Page 10: It's Time to Rethink Your Endpoint Strategy

Trusted Insiders Open the Door to Risk

» Negligence is root cause of 41% of the data breaches studied – the #1 cause*

» Social media opens the door to even more risk of social engineering

» The applications we use for productivity open networks and information to risk

» Removable devices provide easy access, data mobility and… risk if not managed

Negligence remains the most common threat - and an increasingly expensive one

* Ponemon Institute, Annual Cost of Data Breach 2011

10

Page 11: It's Time to Rethink Your Endpoint Strategy

Security Status Quo is No Longer Effective

Page 12: It's Time to Rethink Your Endpoint Strategy

Security Best Practices Still Not Universally Followed

» Patch and configuration management

» Data protection practices

» User rights management

Ineffectiveness of Anti-Virus

» Increasing malware sophistication

» Only19% of new malware is detected on first day

» 50% of IT professionals point to malware as the leading cause of rising endpoint TCO

The New Endpoint Reality

12

Page 13: It's Time to Rethink Your Endpoint Strategy

Traditional Endpoint Security Strategy

Traditional “Threat Centric” Endpoint SecurityIs No Longer Relevant

BlacklistingAs The Core

Endpoint Protection

Zero Day

3rd Party Application

Risk

MalwareAs a

Service

Volume of Malware

“Basic security protection is not good enough.” Rowan Trollope SVP

“You can’t just rely on antivirus software – and we’re an antivirus company.” George Kurtz Worldwide CTO

13

Page 14: It's Time to Rethink Your Endpoint Strategy

Challenges of Endpoint Management

IT Operations

Challenges

IT Security

» Lack of common management console

» Increasing agent bloat

» Increasing and costly back-end Integration

» Lack of visibility and collaboration with IT security

Challenges» Need for better accuracy

» User access rights (Local Admin)

» Lack of scalability

» Silos and insufficient collaboration between IT and business operations*

Lack of integration across technologies

is the

#1 IT security

risk*

*Worldwide State of The Endpoint Report 2009

14

Page 15: It's Time to Rethink Your Endpoint Strategy

What’s the Impact to Your Business?

Page 16: It's Time to Rethink Your Endpoint Strategy

Complex IT Environment is Costly to Manage

Lumension Global State of The Worldwide Endpoint 2009

16

Multiple Consoles

» 3-6 different consoles on average

Agent Bloat

» Increasing malware sophistication

Lack of Control

» 54% of IT security pros cite managing security complexity as #1 challenge

» Decreasing visibility – disparate data

» Ad-hoc monitoring of security posture

Increasing TCO of Point Technologies

» Integration and maintenance

Page 17: It's Time to Rethink Your Endpoint Strategy

Lack of Enterprise-Wide Visibility

Management and visibility in silos hurts effectiveness and efficiency

» What endpoints are online/offline?

» What apps are being used?

» What devices are being used?

» What user actions are concerning?

» How is data being used?

17

Page 18: It's Time to Rethink Your Endpoint Strategy

Increased Complexity & Risk. Increasing CostMalware

Signatures

Endpoint TCO

Current Endpoint Security

Effectiveness

2007: 250K Monthly

Malware Signatures Identified

2011: 2M Monthly

Malware Signatures Identified

Increasing Malware

Fractured Visibility

Complex Technology

18

Page 19: It's Time to Rethink Your Endpoint Strategy

Traditional Balancing Act

19

security Vs. productivity

Page 20: It's Time to Rethink Your Endpoint Strategy

Shift to a New Endpoint Security Approach

Page 21: It's Time to Rethink Your Endpoint Strategy

Key Strategies

1. Rethink Endpoint Security from the Outside In

2. Shift from “Threat-Centric” to “Trust-Centric” Approach

3. Implement Defense-in-Depth Strategy

4. Reduce Complexity through Integration and Standardization

5. People, Policy and Technology Must All Play a Role in Your Strategy

…to improve endpoint security and reduce complexity

21

Page 22: It's Time to Rethink Your Endpoint Strategy

Strategy 1: Rethink Endpoint Security

Data has effectively moved away from the data- center to a borderless endpoint

Corporate HQ

Mobile EndpointsRemote Offices & Subsidiaries

WAN

Internet

Cloud-based Computing

Data Center

22

Start to view your IT security requirements from the outside-in and not the inside-out

Page 23: It's Time to Rethink Your Endpoint Strategy

Strategy 2: Shift to Trust-Centric Security

THREATCENTRIC

TRUSTCENTRIC

Page 24: It's Time to Rethink Your Endpoint Strategy

Strategy 3: Implement Defense-in-Depth

24

BlacklistingAs The Core

Zero Day

3rd Party Application Risk

MalwareAs a Service

Volume of Malware

Traditional Endpoint Security

Patch & Configuration

Mgmt.

Defense-in-Depth

Page 25: It's Time to Rethink Your Endpoint Strategy

Strategy 4: Reduce Endpoint Complexity

SingleConsole

Agile architecture

Single Promotable Agent

25

Many Consoles

Disparate Architecture

ManyAgents

IT ControlMade Simple

» Agile platform architecture

» Reduced integration and maintenance costs

» Improved endpoint performance

» Holistic endpoint visibility

Effective but not Efficient

Effective AND Efficient

Page 26: It's Time to Rethink Your Endpoint Strategy

All three are dependent on each other for

effective and operational endpoint security.

Strategy 5: People, Policy and Technology

26

policy

technologypeople

Page 27: It's Time to Rethink Your Endpoint Strategy

Summary

Page 28: It's Time to Rethink Your Endpoint Strategy

Shift to New Endpoint Management Approach

28

Threat centric

Point products

Multiple consoles

Multiple agents

Ad hoc processes

Reactive signatures

Ad hoc auditing

Compliance

» Trust centric

» Integrated platform

» Single console

» Single agent

» Standardized processes

» Proactive, real time

» Continuous monitoring

» IT Risk management

Page 29: It's Time to Rethink Your Endpoint Strategy

Lumension: Leading the IT Security Shift

» Market Leader

» Agile Platform Architecture

» Best-of-Breed Functionality

» Global Footprint

» Strong Customer and Partner Ecosystem

» Deloitte 500 & Inc. Magazine 500 Fast Growth Leader

29

Page 30: It's Time to Rethink Your Endpoint Strategy

Q&AFor more information come visit us at Booth #19 during these show

hours:Tuesday, June 21

11:45 a.m. – 1:45 p.m. Wednesday, June 22 12:00 p.m. – 1:30 p.m.

Page 31: It's Time to Rethink Your Endpoint Strategy

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

[email protected]