© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Computer Security Fundamentals
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
INTRODUCING F-SECURE POLICY MANAGER
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Putting Secure Information Sharing and Access Management Into Practice John Hewie Microsoft Canada Tim.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protection from internal threats: Evolution of DLP or Who sets trends.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Network security Product Group 2 McAfee Network Security Platform.
Small Business Security Keith Slagle April 24, 2007.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Trend Micro Consumer 2010 Easy. Fast. Smart.
Matt G change over point ?
McAfee Security Connected – Next Generation Security
Presentation transcript:

© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them

2 6/2/2015 Agenda What are “endpoints”? Securing the “endpoints” Managing access Securing the data Layers of protection

3 6/2/2015 What are “endpoints”?

4 6/2/2015 What are “endpoints”? More than just a desktop PC today Servers (application, web, storage) Laptops PDA’s/cellular phones VPN connected devices Vendors Contractors Virtual clients/services COOP sites Emergency communications Video/surveillance All IP enabled devices — Sensors — Meters

5 6/2/2015 Securing the endpoints Each type of device creates some level of specialized requirement Standard Anti-virus Host Intrusion Prevention Encryption Data Loss Prevention Compliance enforcement Security policy enforcement Mobile device controls Network Access control

6 6/2/2015 Securing the endpoints And why do we secure the endpoints? To protect the data!

7 6/2/2015 …against all threats Last 2 years vulnerabilities exceed the number of the 10 years before it 3 45% 2 increase of spam per message for the last 6 years 66% 1 increase for the last 5 years Over 685K+ 1 unique malware today and nearly 1M (est.) by end of 2008 HIPS Antivirus AntiSpyware AntiSpam Malware Spam Vulnerabilities Potentially Unwanted Programs 1 Avert Labs 2 Message Labs 3 National Vulnerability Database

8 6/2/2015 Managing access More than just NAC Is the person and the device allowed to connect? Does the device meet all of the defined security policies? Which policies apply to which types of devices? How do I remediate a device to comply to policy? What if the device is outside of my jurisdiction? Should NAC be based upon network policy or security policy?

9 6/2/2015 Network Access Control (InformationWeek 7-08) 23% of all respondents have no NAC plans. Everyone else is in some phase of planning #1 reason for NAC: compliance #2 reason for NAC: access to specific networked resources Source: NN2JVN?articleID= NN2JVN?articleID= Allowing access from what, to what, by whom and why?

10 6/2/2015 Managing access Requires a comprehensive network and security based framework Must follow specific security policies for the device and the end user Must bring value in the way of continuous compliance checks Should require no end user involvement

11 6/2/2015 Securing the data So, if the person and the device meet our policies, everything is good, right? Now data protection becomes critical… Just because someone is granted access doesn’t mean the will use that data according to policy! Should data be encrypted when at rest? And how should I protect it at the device level when in motion? How do I know when data is not being used properly?

12 6/2/2015 Data protection requires various considerations Data must be protected regardless of: Easy to LoseEnticing to StealEasy to Transfer Access Usage DeviceLocation Cybercrime “Black Market” Value $ 98 $490$147 ®

13 6/2/2015 Securing data may also require encryption… NETWORK SECURITY DEVICE SECURITY INTERNET SECURITY File and Folder Encryption Virtual Container Encryption Entire Harddisk Encryption Port & Device Management Application Management Secure USB Storage Gateway Encryption

14 6/2/2015 In closing The definition of endpoint has changed and will continue to do so. Protecting the data on each of these endpoints is critical. Compliance for security is also critical to protecting the devices holding the data. No single endpoint strategy will protect various devices. Endpoint security must be comprised of layers that support the overall requirements. Even with strong endpoint security and access controls, data must still be protected from misuse.

15 6/2/2015 Endpoint Security Thank you for your time and attention! John Bordwine McAfee, Inc.