lumension security - state of endpoint and security dss @vilnius 2010

50
PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION The Evolving State of Endpoint Management & Security Maik Bockelmann VP EMEA

Upload: andris-soroka

Post on 08-Jun-2015

429 views

Category:

Technology


0 download

DESCRIPTION

Lumension Security is making the revolution in Endpoint Security by enabling one agent one platform solution to answer all the endpoint security related questions.

TRANSCRIPT

Page 1: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

The Evolving State of Endpoint Management

& Security

Maik Bockelmann VP EMEA

Page 2: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

He told me … what’s happen today morning!

Devices Nodes

Page 3: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

I think I know … where he really is!

Devices Nodes

Page 4: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

What is an Endpoint?

The Endpoint: Any device with a URL specifying where the endpoint can be accessed, and binding properties that specify how the data will be transferred. -Wikipedia

Devices Nodes

Page 5: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

5 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Do you remember? … how easy it was!

Page 6: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

… and it was IT’s Job to Say NO!

6

Page 7: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

IT Networks 2000: Static Networks

7

Corporate HQ

Remote Offices & Subsidiaries

WAN

Corporate Data Center

….. And data centers used to house a company’s data inside a safe and

well-defined perimeter

Page 8: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

That Was Yesterday!

8 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Today’s Endpoint Management & Security

Landscape has Fundamentally Changed

Page 9: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

9 9

Forces Impacting Today's Endpoint Environment

9 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

New Threat Landscape

Compliance

Consumerization

of IT

Total Cost of Ownership

Page 10: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Total Economic Impact From Data Loss & Security Breaches

Page 11: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Well Funded. Well Organized.

Financially Motivated.

Today We Deal with a Growing Cyber Mafia

Page 12: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

* information provided by Interior Ministry on losses from card fraud - comparison with those of payment systems REMA (mio RUB)

Losses from card fraud

Page 13: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Losings: Russia in 2009

Page 14: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Камера на ПИН-ПАД

Wincor ProCash Wincor, Diebold

Page 15: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

New types of devices

NCR

Насадка для кражи треков

Diebold

Через отверстие проводится подключение к штатной головке считывателя магнитной полосы

Page 16: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

…or just shopping … and the story starts

Page 17: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

…or just shopping … welcome surprise

Page 18: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

…or just shopping … and please block your card

Page 19: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

…or just shopping … what’s happen

Page 20: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

…or just shopping … analysis

Page 21: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

21 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Ponemon Institute, 2009

60% of your employees would take confidential information if they left your organization.

Page 22: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Consumerization of IT

Page 23: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Consumerization of IT

23 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

An adoption trend led by a technology savvy workforce that self-provisions collaborative tools, information sources, and human networks — requiring minimal or no ongoing support from a central IT organization.

Employee provisioned laptop programs can lead to greater user satisfaction and reduce total ownership costs up to 44% percent. Gartner 2008

Page 24: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

If Facebook were a country:

24 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

It would be the 4th largest country in the world

1.  China 2.  India 3.  US 4.  Facebook 5.  Indonesia 6.  Brazil 7.  Pakistan 8.  Bangladesh

Page 25: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Age of Mobile Computing

25 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Netbook

Terminals

3GS

Cellular

Speed & Flexibility

Mobility & Power

Page 26: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Changing IT Role: Enables the Use of New Technology

26

Major Shift For IT Security

It’s now IT’s job to say YES!

Page 27: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Growing Compliance

Page 28: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Mounting External Compliance Regulations

28 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

EU Directive

Basel II

HIPAA

Sarbanes-Oxley, Section 404

PCI Data Security Standards (DSS)

PII Security Standards

21CFR11

Gramm Leach Bliley (GLBA)

USA Patriot Act

SB1386 (CA Privacy Act)

EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive EU Directive

HIPAA HIPAA HIPAA HIPAA HIPAA HIPAA

21CFR11 21CFR11 21CFR11 21CFR11 21CFR11

Gramm Leach Bliley (GLBA)

Gramm Leach Bliley (GLBA)

Gramm Leach Bliley (GLBA)

Gramm Leach Bliley (GLBA)

USA Patriot Act USA Patriot Act USA Patriot Act

SB1386 (CA Privacy Act)

SB1386 (CA Privacy Act)

Basel II

PCI Data Security Standards (DSS)

Time *The Struggle to Manage Security Compliance for Multiple Regulations”..SecurityCompliance.com

3 out 4 organizations must comply with two or more regulations and corresponding audits.

43% of organizations comply with 3 or more regulations.

Page 29: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Our IT Networks Were Never Designed With Compliance In Mind

Today Organizations Spend 30-50% More On Compliance Than They Should

Page 30: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Total Cost of Ownership

Page 31: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

31 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

TCO Pressures Will Drive IT To Even Greater Distributed and Virtual Solutions

Page 32: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

The average company has intellectual property worth $ xx million

stored, accessed and managed overseas.

Unsecured Economies report 2009

Page 33: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

IT Networks 2009: Highly Distributed

33

Corporate HQ

Mobile Endpoints

Remote Offices & Subsidiaries

WAN Internet

Data Center

Data has effectively moved away from the data center to a borderless endpoint

Page 34: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Cloud Computing is a REALITY

Page 35: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

…but which cloud will it be?

Page 36: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

So What Does All This Mean For Endpoint Security?

Page 37: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Our approach to IT security remains the same:

Threat Centric

While the Endpoint & Networks are changing…

Page 38: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

There will always be ways to breakdown walls!

Page 39: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Break with the Old Approach

It’s No Longer Relevant

Page 40: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

1.  Think Differently About the Endpoint

2.  Converge our Silos

3.  Adopt a Trust-Centric Approach

Page 41: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

People are “The New Perimeter”

41 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Page 42: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Need For Optimized IT Risk Management

42

In a world where nothing can be 100% secure the game organizations play is “optimization” – How do I mitigate the most amount of IT risk with the lowest investment of time and money?

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION 42

PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Nodes Devices Applications Business Processes

People Compliance Regulations

Limited IT Resources and Investment Budget | Personnel | Technology

Growing complexity and external pressure

Page 43: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

43

Functional Silos

Operational IT

Lifecycle Management, Remove Risk from Technology

IT Security

Stopping Threats, & Protecting Data

Page 44: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

We need to start thinking differently

We need a Trust-Centric Approach to Endpoint Management & Security

Page 45: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Trust Stack of the Future

45

Today’s Trust Stack

New application New application

Is this known bad? Is this known good? Is this known bad? Is this unwanted? Do I trust the Vendor? What program introduced it? Do I trust where it came from? Do I trust the user installing it? Am I licensed for this?

Allow / Block / Remove

Trust Stack of the Future

? ?

Allow / Block / Restrict / Remove

Page 46: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

Challenges with Today's Technology Approaches?

Page 47: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

47 47

Compliance & IT Risk Management

Console

47

Visibility: Disparate Data

Vulnerability Assesment

Systems Mgt Patching AV/Malware Data Protection Compliance

Limited visibility Disparate workflows across ops & security Limited relational insight Limited user productivity across multiple management consoles

Data Data Data Data Data Data

Page 48: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

48

Inefficient Scalability

• Network and endpoint resources are not scalable and require high server to endpoint ratios and cannot meet changing needs without additional costs • Network resources are taxed as higher levels of bandwidth, storage and processing are required to manage multiple and disparate systems • Existing security and operations platforms are rarely open and extensible • Multiple agents are required to perform related tasks leading to increased agent bloat

Page 49: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

49 49

Lumension Endpoint Management and Security Suite

49

Lumension® Patch and Remediation

Lumension® Scan

Lumension® Security Configuration Management

Lumension® Asset Manager

Lumension® Power Mgmt Reporting

Lumension® Content Wizard

Lumension® Risk Manager

Lumension® Enterprise Reporting

Compliance Endpoint Operations Endpoint Security

Lumension® AntiVirus

Lumension® Application Control

Lumension® Endpoint Integrity Service [IWL]

Lumension® Device Control

Lumension® Data Loss Prevention

PGP® Whole Disk Encryption

IT Risk M

anagement

Intelligent Whitelisting

49

CTP

CTP

Page 50: Lumension Security - State of Endpoint and Security DSS @Vilnius 2010

L.E.M.S.S. - DEMO December 2nd 2010