19
Lumension Security Solutions

Lumension Security Solutions

Embed Size (px)

DESCRIPTION

Lumension Security Vulnerability Management, Endpoint and Data Protection Brief.

Citation preview

Page 1: Lumension Security Solutions

Lumension SecuritySolutions

Page 2: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Optimal Security Solutions

Optimal Security

Proactive Risk Management and Operational and

Security

Security & Compliance Reporting

Endpoint Protection

Vulnerability Management

Data Protection

Best Pra

ctice

s

Ope

n Sta

ndar

ds

Integrated Platform

Flexible Architecture

Page 3: Lumension Security Solutions

© Copyright 2008 - Lumension Security 3

Lumension Solutions

3

Vulnerability Management

Endpoint Protection

Data Protection

Security & Compliance Reporting

Page 4: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Effectiveness - Risk Reduction and Threat Elimination

VulnerabilityManagementRemoves risk from

technology

EndpointProtection

Filters threats from technology

IT Operations: IT SecurityThe Endpoint

Reduces attackable “surface area” Stops attacks

Optimal Security

Optimised securityLower support burdensIncreased user productivityLower TCO

Page 5: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Vulnerability Management Solution

Page 6: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Lumension Security Vulnerability Management Suite

DiscoverDiscover all network assets

AssessVulnerability and configuration assessmentNetwork + agent-based scanners with integrated view

PrioritisePrioritise threats and mitigation actions

RemediateDeploy Security patchesMitigate risk with custom remediations

ReportNumerous reporting optionsReporting across entire Enterprise Network

Lumension Security Vulnerability Management Suite is a process-driven solution:

Page 7: Lumension Security Solutions

© Copyright 2008 - Lumension Security

In-Depth Discovery

Provides visibility to the entire network environment to discover all assets, both managed and unmanaged

7

In-depth scans of heterogeneous networks to discover all computing assets

Flexible grouping and classification

Discover silent or hidden network nodes, even if not currently managed by agents

Page 8: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Assess against Lumension’s large pre-built vulnerability and configuration repositories as well as customized vulnerability policies.

Agent & agent-less assessment options provide complete enterprise visibility

Credentialed-based scanner performs deep analysis of endpoints to accurately discover & determine vulnerabilities without impacting production environments or network assets

8

Thorough Assessment

Assess OS, Application, and Security Configuration vulnerabilities that exist within the network environment to proactively identify and prioritise known issues before they can be exploited

Page 9: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Detailed Prioritisation

Multiple views of vulnerabilities grouped by vulnerability specifics or by computing assets (machines).

9

Prioritise vulnerability assessment information by vulnerability severity and/or organisational impact.

Page 10: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Intelligent Patch & Remediation

Agent-based patch & remediation tool simplifies the process of maintaining a secure environment by continuously monitoring, detecting and remediating policy-driven environments

Automatically and quickly deploys patches to an entire network across many different platforms (e.g. Windows, Linux, Unix, Mac) and across applications (e.g. Adobe, WinZip, Real Networks)

10

Lumension Vulnerability Management provides fully integrated agent-based remediation capabilities in heterogeneous environments.

Page 11: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Comprehensive Reporting

Single and consolidated management console provides a holistic view of environmental risk

Composite Reports combine the discovery and assessment information from both network and agent-based scanners to provide a more complete view of the environment

Role-based administration provides tailored information to the appropriate audiences.

11

Full range of operational and management reports

Page 12: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Benefits

12

Discover, assess, prioritise, remediate & report on the entire network environment from one solution.

Complete enterprise visibility and effective vulnerability assessment via network and agent-based scanners.

Single solution to patch and remediate a heterogeneous network with our scalable remediation tools and various deployment options.

Comprehensive and policy-based reporting capabilities for business analysis and compliance.

Page 13: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Endpoint Protection Solution

Page 14: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Lumension Security Endpoint Protection

white

grey

black

Trusted applications that serve a business purpose and are supported by the organisation

Unwanted applications that are not condoned by the organisation. These can be explicitly added to the black or automatically if not in grey or white.

Extended trust based on context:• Process• Publisher• Path• Person

Page 15: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Lumension Security Endpoint Protection Solution

Malware and threat protection without signature updates or

behavioral technologies

Authorises only trusted applications that serve a legitimate

business need

Lowers helpdesk burden and operational TCO by enforcing

supported software and eliminating system conflicts

Increases end-user productivity by preventing non-business

applications from being installed

Page 16: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Data Protection Solution

Page 17: Lumension Security Solutions

© Copyright 2008 - Lumension Security

17

Lumension Security Data Protection Solution

Protects data from theft or loss

Controls the flow of data to devices(inbound and outbound data including port access)

Encrypts data (moved onto removable devices)

Detailed forensics and auditing(of data moved to / from a device)

Enables Compliance(Data Protection Regulations and Standards)

Device Control

Integrated PGP Whole Disk Encryption

Page 18: Lumension Security Solutions

© Copyright 2008 - Lumension Security

Security & Compliance Reporting

Page 19: Lumension Security Solutions

© Copyright 2008 - Lumension Security

19

Security & Compliance Reporting

Measure and Ensure Network Security

Demonstrate Compliance to Security Policies and Regulations

Use or Extend Over Two-Dozen Sample Reports

Easily Create and Share Custom Reports

Open Reporting Schema Works With Existing Reporting Tools

Consolidated Analysis and Reporting of all Enterprise Vulnerability Management Information