SlideShare a Scribd company logo
1 of 19
E is for Endpoint:
6 Security Strategies
for Highly Effective IT
Professionals
Today’s Agenda




             Most Common Threats in Today’s Environment


             6 Steps to Improve Endpoint Security


             Secrets to Effective Defense-in-Depth Approach


             Q&A
Today’s Panelists




    Richard Stiennon         Paul Henry                     Jim Czyzewski
    Chief Research Analyst   Security & Forensics Analyst   Supervisor – Clinical Desktop
    IT-Harvest                                              Support
                                                            MidMichigan Medical Center




3
Most Common Threats
• Hard to dispute the fact that patching
  an underlying software flaw in most
  cases is the best defense
     • In the current environment 72% of
       vulnerabilities have a patch
       available within 24 hours of
       disclosure
     • In the current environment 77% of
       vulnerabilities have a patch
       available within 30 days of
       disclosure
• Microsoft data indicates that in the first
  half of 2011 Zero Day attacks
  amounted to less the 1% of the attack
  surface

Patch or get hacked the                        Source http://www.zdnet.com/blog/security/report-third-

choice is yours…
                                               party-programs-rather-than-microsoft-programs-
                                               responsible-for-most-vulnerabilities/10383?tag=nl.e539


 4
Most Common Threats
• Vulnerable software is not just a
  Microsoft problem…
• Third party software historically has
  had more unpatched vulnerabilities
  then Microsoft
• Java is your number one issue today
  followed by Adobe – the leader for the
  past couple of years
                                           Source http://www.zdnet.com/blog/security/report-third-party-programs-rather-than-microsoft-
                                           programs-responsible-for-most-vulnerabilities/10383?tag=nl.e539




Bottom line is WSUS is
not going to save you !
                                           Source: http://www.zdnet.com/blog/security/37-percent-of-users-browsing-the-web-with-
                                           insecure-java-versions/9541?tag=content;siu-container

 5
Most Common Threats
• Hackers are always going to take
  advantage of areas that simply are not
  properly handled by defenders
• Looking at the chart on the right is
  there any question why Java, Adobe
  and QuickTime are favored by the Bad
  Guys
     • In case you missed it the chart is
       showing the “Most Outdated Web
       Browser Plugins”




What did you really                         Source: http://www.zscaler.com/state-of-web-q3-2011.html




think was going to
happen?

 6
Most Common Threats
• It is important to remember that
  taking advantage of a vulnerability is
  not really the “End Game” for a bad
  guy
      • The Vulnerability only
         represents a “Delivery
         Mechanism”
      • The “End Game” is actually to
         allow them to Execute Malicious
         Code in your environment
• Why are we focusing on the delivery
  method not the end game
      • Duh - because everyone else is
• Hackers will always beat us in the
  delivery mechanism “Arms Race”
• Get ahead of the problem by
  focusing on the End Game


7
6 Steps to Improve Endpoint Security
1 - Think Different
               Traditional                                   Emerging Defense
                Endpoint                                     in Depth Endpoint
                Security                                       Security Stack




                 Blacklisting
                 As The Core


                                          Consumerization
    Zero                                       of IT          Patch &
    Day                                                     Configuration
                                                               Mgmt.
                                Malware
            3rd Party
                                 As a
           Application
                                Service
              Risk




9
2 – Eliminate Exploitable Surface Area

                                                         Areas of Risk
• Patch and configuration analysis and delivery are     at the Endpoint
  needed across all systems; operating systems
                                                               5%
  and applications.                                          Zero-Day

• Unmanaged endpoints on the network are
  unknown and unprotected.                                  30%
                                                       Missing Patches
• Application and operating system patching is not
  benchmarked or continuously enforced.

• Standard configurations are not assessed or
                                                             65%
  enforced.                                            Misconfigurations

• Un-patched browsers represent the highest risk
  for web-borne malware.
                                                      Source: John Pescatore Vice
                                                        President, Gartner Fellow



10
3: Defining a Trusted Environment




11
4 - Protect Your Data




     Targeted Attacks                         Malicious Insider      Negligent Insider




12
          PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
5 - Reduce Complexity and Cost
         Effective                                                              Effective
     but not Efficient                                                         And Efficient
         Many Consoles




                                                IT Control Made Simple
                                                                                     Single
                                                                                    Console


                                          • Agile platform architecture
                                          • Leverage existing endpoint
                                            technology
                                          • Reduced integration and
                                            maintenance costs                     Agile architecture
                      Disparate
                     Architecture         • Improved endpoint performance
                                          • More effective endpoint security




                                                                                 Single Promotable
                                                                                       Agent
                          Many
                         Agents


13
          PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
6 – Relating Risk to the Business
Strategic                                                                                           Tactical

 Business Impact           Compliance & IT Risk                     Compliance Audit   Operational Assessment
                               Exposure                               & Reporting

6 – Relating Risk to the Business




                                                               Compliance & IT Risk
                                                               Management Console




           Integrated strategic compliance and IT risk visibility with tactical assessment
       information to maintain continuous monitoring of organizational compliance & policy

  14
                   PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Best Practices: Lessons Learned From the Field

     • Virtualize the Endpoint
       » Security Management becomes easier since you are now only securing the
         virtual desktop pool instead of hundreds of endpoints
       » You remove the chance of any data residing on the endpoint
     • Scan Unmanaged Clients
       » Clients without security management software need to be identified,
         monitored and remediated (if possible)
     • Test, Test, Test
       » We have over 600 applications running
       » Patch, Remediation, and Configuration changes can have different effects
       » Utilize Production Testing
     • End User Education
       » Keep them aware of the threats
       » Inform them what it is you‟re are doing and why you‟re doing it


15
               PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Tips for Securing Endpoints
• Think „least privilege‟ when choosing platforms
  » While Microsoft‟s strategy of the same code everywhere serves their purpose, it is not
    the most secure strategy for an enterprise.
  » Kiosks, single purpose machines (medical equipment), mobile devices, and embedded
    systems should run on specialized Oos with reduced functionality to reduce exposed
    attack surface.
• NSA Approved Whitelisting for Most Critical Systems
  » Start the transition to whitelisting as the primary defense, and AV as the back-up.
• What Endpoint Security Strategy is Best for New Data Centers & Cloud
  Environments?
  » Virtualization makes cleanup (post infection) easier but exposes critical systems to wide
    spread attacks.
• Consider Virtual Desktops (VDI)
  » For tasks like call centers, data entry and accounting
• Server Lockdown: Neglected in Many Environments
  » Systems that do not change, often should have rigid controls.
A Secure endpoint should consider the network hostile, just as a secure
 network should consider the endpoints as hostile. (And secure apps
 should treat the user as hostile.)
More Information
• Quantify Your IT Risk with Free              E is for Endpoint: 6 Strategies for
  Scanners                                     Highly Effective IT Pros
 » http://www.lumension.com/special-offer/
   premium-security-tools.aspx                 http://www.lumension.com/E-is-for-Endpoint.aspx


• Lumension® Endpoint Management
  and Security Suite
 » Demo:
   http://www.lumension.com/endpoint-
   management-security-suite/demo.aspx
 » Evaluation:
   http://www.lumension.com/endpoint-
   management-security-suite/free-trial.aspx




17
Q&A
Global Headquarters
8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255

1.888.725.7828
info@lumension.com
http://blog.lumension.com

More Related Content

Viewers also liked

Basics of Machine Learning
Basics of Machine LearningBasics of Machine Learning
Basics of Machine Learning
butest
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
Lior Rokach
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business models
Vikram g b
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
Saif Ullah
 

Viewers also liked (17)

Basics of Machine Learning
Basics of Machine LearningBasics of Machine Learning
Basics of Machine Learning
 
E Commerce Presentation
E  Commerce  PresentationE  Commerce  Presentation
E Commerce Presentation
 
E commerce
E commerceE commerce
E commerce
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business models
 
Business Analysis Fundamentals
Business Analysis FundamentalsBusiness Analysis Fundamentals
Business Analysis Fundamentals
 
Business Analysis Techniques
Business Analysis TechniquesBusiness Analysis Techniques
Business Analysis Techniques
 
Data Mining Concepts
Data Mining ConceptsData Mining Concepts
Data Mining Concepts
 
Data mining
Data miningData mining
Data mining
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Mining
 
Introduction to Big Data/Machine Learning
Introduction to Big Data/Machine LearningIntroduction to Big Data/Machine Learning
Introduction to Big Data/Machine Learning
 
introduction to data mining tutorial
introduction to data mining tutorial introduction to data mining tutorial
introduction to data mining tutorial
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 
Machine Learning and Data Mining: 12 Classification Rules
Machine Learning and Data Mining: 12 Classification RulesMachine Learning and Data Mining: 12 Classification Rules
Machine Learning and Data Mining: 12 Classification Rules
 

More from Lumension

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 

More from Lumension (20)

Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and MacsUsing SCCM 2012 r2 to Patch Linux, UNIX and Macs
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
 
2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide2015 Endpoint and Mobile Security Buyers Guide
2015 Endpoint and Mobile Security Buyers Guide
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware Careto: Unmasking a New Level in APT-ware
Careto: Unmasking a New Level in APT-ware
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data TheftSecuring Your Point of Sale Systems: Stopping Malware and Data Theft
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

E is for Endpoint: 6 Security Strategies for High Effective IT Professionals

  • 1. E is for Endpoint: 6 Security Strategies for Highly Effective IT Professionals
  • 2. Today’s Agenda Most Common Threats in Today’s Environment 6 Steps to Improve Endpoint Security Secrets to Effective Defense-in-Depth Approach Q&A
  • 3. Today’s Panelists Richard Stiennon Paul Henry Jim Czyzewski Chief Research Analyst Security & Forensics Analyst Supervisor – Clinical Desktop IT-Harvest Support MidMichigan Medical Center 3
  • 4. Most Common Threats • Hard to dispute the fact that patching an underlying software flaw in most cases is the best defense • In the current environment 72% of vulnerabilities have a patch available within 24 hours of disclosure • In the current environment 77% of vulnerabilities have a patch available within 30 days of disclosure • Microsoft data indicates that in the first half of 2011 Zero Day attacks amounted to less the 1% of the attack surface Patch or get hacked the Source http://www.zdnet.com/blog/security/report-third- choice is yours… party-programs-rather-than-microsoft-programs- responsible-for-most-vulnerabilities/10383?tag=nl.e539 4
  • 5. Most Common Threats • Vulnerable software is not just a Microsoft problem… • Third party software historically has had more unpatched vulnerabilities then Microsoft • Java is your number one issue today followed by Adobe – the leader for the past couple of years Source http://www.zdnet.com/blog/security/report-third-party-programs-rather-than-microsoft- programs-responsible-for-most-vulnerabilities/10383?tag=nl.e539 Bottom line is WSUS is not going to save you ! Source: http://www.zdnet.com/blog/security/37-percent-of-users-browsing-the-web-with- insecure-java-versions/9541?tag=content;siu-container 5
  • 6. Most Common Threats • Hackers are always going to take advantage of areas that simply are not properly handled by defenders • Looking at the chart on the right is there any question why Java, Adobe and QuickTime are favored by the Bad Guys • In case you missed it the chart is showing the “Most Outdated Web Browser Plugins” What did you really Source: http://www.zscaler.com/state-of-web-q3-2011.html think was going to happen? 6
  • 7. Most Common Threats • It is important to remember that taking advantage of a vulnerability is not really the “End Game” for a bad guy • The Vulnerability only represents a “Delivery Mechanism” • The “End Game” is actually to allow them to Execute Malicious Code in your environment • Why are we focusing on the delivery method not the end game • Duh - because everyone else is • Hackers will always beat us in the delivery mechanism “Arms Race” • Get ahead of the problem by focusing on the End Game 7
  • 8. 6 Steps to Improve Endpoint Security
  • 9. 1 - Think Different Traditional Emerging Defense Endpoint in Depth Endpoint Security Security Stack Blacklisting As The Core Consumerization Zero of IT Patch & Day Configuration Mgmt. Malware 3rd Party As a Application Service Risk 9
  • 10. 2 – Eliminate Exploitable Surface Area Areas of Risk • Patch and configuration analysis and delivery are at the Endpoint needed across all systems; operating systems 5% and applications. Zero-Day • Unmanaged endpoints on the network are unknown and unprotected. 30% Missing Patches • Application and operating system patching is not benchmarked or continuously enforced. • Standard configurations are not assessed or 65% enforced. Misconfigurations • Un-patched browsers represent the highest risk for web-borne malware. Source: John Pescatore Vice President, Gartner Fellow 10
  • 11. 3: Defining a Trusted Environment 11
  • 12. 4 - Protect Your Data Targeted Attacks Malicious Insider Negligent Insider 12 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 13. 5 - Reduce Complexity and Cost Effective Effective but not Efficient And Efficient Many Consoles IT Control Made Simple Single Console • Agile platform architecture • Leverage existing endpoint technology • Reduced integration and maintenance costs Agile architecture Disparate Architecture • Improved endpoint performance • More effective endpoint security Single Promotable Agent Many Agents 13 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 14. 6 – Relating Risk to the Business Strategic Tactical Business Impact Compliance & IT Risk Compliance Audit Operational Assessment Exposure & Reporting 6 – Relating Risk to the Business Compliance & IT Risk Management Console Integrated strategic compliance and IT risk visibility with tactical assessment information to maintain continuous monitoring of organizational compliance & policy 14 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 15. Best Practices: Lessons Learned From the Field • Virtualize the Endpoint » Security Management becomes easier since you are now only securing the virtual desktop pool instead of hundreds of endpoints » You remove the chance of any data residing on the endpoint • Scan Unmanaged Clients » Clients without security management software need to be identified, monitored and remediated (if possible) • Test, Test, Test » We have over 600 applications running » Patch, Remediation, and Configuration changes can have different effects » Utilize Production Testing • End User Education » Keep them aware of the threats » Inform them what it is you‟re are doing and why you‟re doing it 15 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  • 16. Tips for Securing Endpoints • Think „least privilege‟ when choosing platforms » While Microsoft‟s strategy of the same code everywhere serves their purpose, it is not the most secure strategy for an enterprise. » Kiosks, single purpose machines (medical equipment), mobile devices, and embedded systems should run on specialized Oos with reduced functionality to reduce exposed attack surface. • NSA Approved Whitelisting for Most Critical Systems » Start the transition to whitelisting as the primary defense, and AV as the back-up. • What Endpoint Security Strategy is Best for New Data Centers & Cloud Environments? » Virtualization makes cleanup (post infection) easier but exposes critical systems to wide spread attacks. • Consider Virtual Desktops (VDI) » For tasks like call centers, data entry and accounting • Server Lockdown: Neglected in Many Environments » Systems that do not change, often should have rigid controls. A Secure endpoint should consider the network hostile, just as a secure network should consider the endpoints as hostile. (And secure apps should treat the user as hostile.)
  • 17. More Information • Quantify Your IT Risk with Free E is for Endpoint: 6 Strategies for Scanners Highly Effective IT Pros » http://www.lumension.com/special-offer/ premium-security-tools.aspx http://www.lumension.com/E-is-for-Endpoint.aspx • Lumension® Endpoint Management and Security Suite » Demo: http://www.lumension.com/endpoint- management-security-suite/demo.aspx » Evaluation: http://www.lumension.com/endpoint- management-security-suite/free-trial.aspx 17
  • 18. Q&A
  • 19. Global Headquarters 8660 East Hartford Drive Suite 300 Scottsdale, AZ 85255 1.888.725.7828 info@lumension.com http://blog.lumension.com