End Point Security Patch Automation WP

End Point Security Patch Automation WP

Sponsor Gold © 2017 Security Current. All rights reserved. All trademarks and service marks are the property of their respective owners. CISOs INVESTIGATE: ENDPOINT SECURITY 2 Table of Contents INTRODUCTION.......................................................................................................................................................................................................4 A CISO LOOKS AT THE CONTINUING EVOLUTION OF ENDPOINT SECURITY......................................................................................................6 TECHNOLOGY OVERVIEW..............................................................................................................................................................................................10 Key Considerations........................................................................................................................................................................................10 Endpoint Security Core Features...........................................................................................................................................................11 A Deeper Dive Into Endpoint Security.....................................................................................................................................................12 What’s In Your Architecture Drawing?......................................................................................................................................................14 What Do Solution Vendors Provide?...........................................................................................................................................................15 What’s In Your Minimum Security Baseline?..........................................................................................................................................16 SELLING TO THE C-SUITE..............................................................................................................................................................................................19 Reducing Potential Losses From a Breach.............................................................................................................................................20 Endpoint Security’s Role in the Defense-In-Depth Approach.........................................................................................................20 Calculating Return on Investment..........................................................................................................................................................21 Staffing Implications.....................................................................................................................................................................................22 Maintaining Compliance through Endpoint Security......................................................................................................................24 Beyond Security: Other Business Cases...........................................................................................................................................25 To Deploy Or Not to Deploy.......................................................................................................................................................................26 Market Assessment........................................................................................................................................................................................28 KEY TAKEAWAYS...............................................................................................................................................................................................................30 IS NEXT GENERATION ENDPOINT SECURITY REALLY NECESSARY?...............................................................................................................32 SUMMARY........................................................................................................................................................................................................34 CISO CONTRIBUTIONS...................................................................................................................................................................................................35 ADP..............................................................................................................................................................................................................................35 American Bureau Of Shipping.......................................................................................................................................................................38 ASRC Federal....................................................................................................................................................................................................40 Freeport-McMoRan Inc..................................................................................................................................................................................42 National Life Group.......................................................................................................................................................................................44 The Ohio State University............................................................................................................................................................................46 Oppenheimer & Co.................................................................................................................................................................................................48 Perdue Farms...................................................................................................................................................................................................50 RWJBarnabas Health..................................................................................................................................................................................52 Western Digital Corporation.......................................................................................................................................................................55 Wisconsin Department of Health Services..........................................................................................................................................57 APPENDIX A – IBM RFI.....................................................................................................................................................................................................59 APPENDIX B – IBM SPONSORED ADDENDUM.........................................................................................................................................................63 APPENDIX C – SUPPLEMENTAL INFORMATION......................................................................................................................................................64 The views and opinions expressed in this report by the lead writer and each CISO (executive) Contributor are the author’s own views and opinions and do not reflect the views or opinions of any other person or entity, including any other author or any author’s associated organization. CISOs INVESTIGATE: ENDPOINT SECURITY 3 INTRODUCTION Introduction The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms. The result is a much larger attack surface, one that is hard to protect with traditional approaches – and one that is growing faster than ever before as users adopt new types of devices, new applications, and new services. Often, companies don’t even know all the tools that their employees are using. At the same time, the potential threats that enterprises are facing have grown significantly in variety, capabilities, and size. Today, companies are beset not only by hackers looking for a thrill, but also by nation-state actors, hacktivists, corporate spies, small time crooks, and large criminal organizations. These adversaries have at their disposal an ever-growing collection of open-source hacking tools and commercial software. There are also online services offering ready-to-go ransomware campaigns. Meanwhile, with zero-days and other stealthy attacks, enterprises have less and less time to spot intrusions and take steps to contain them. Today’s malware, once it gets a foothold, can spread quickly. Once in an enterprise, attackers can secretly infiltrate more and more systems and collect more and more data. Or they can quickly and immediately launch large-scale ransomware attacks that can take down large numbers of computers and and lock up enterprise data. As a result, the damage caused by the attacks has also been increasing at a staggering pace, with ransomware alone reportedly crossing the $1 billion revenue threshold in

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    66 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us