Documente Academic
Documente Profesional
Documente Cultură
Executive Summary
In todays increasingly collaborative and always-accessible working environment, organizations are challenged to balance the need to put information at the fingertips of productive workers with the responsibility to preserve the privacy and integrity of sensitive data stores. Balancing productivity with security is a fine line, but by taking advantage of the right best practices, your organization can go a long way toward minimizing insider risk and protecting data.
February 2010
WP-EN-02-24-10
place to keep the bad seeds honest and the good ones from slipping up. Because the fact of the matter is that security awareness training alone is not going to mitigate the risks. The most recent security research conducted by Ernst & Young found that though many organizations have some sort of awareness training, the bulk of these programs were missing important elements, and less than a quarter of organizations even had any kind of metrics in place to track their success anyway. And thats not even considering the fact that no amount of awareness training will stop a malicious insider who knows hes not being monitored.
No matter how much trust rests with a great team, responsible organizations need to put controls in
1. 2. 3.
U.S. Cost of a Data Breach Study, Feb. 2009, Ponemon Institute Ernst & Youngs 12th annual global information security survey Uncertainty of Data Breach Detection, Ponemon Institute
employees who leave or are asked to leave a company walk out the door with customer information. Only 15 percent7 of former employees reported any kind of audit in place to track their possession of data before leaving.
Consumerization of IT
Workers bring their own tools and toys to work, such as USB devices and Web 2.0 applications, that may improve productivity but also introduce new threats to your network. A recent study found that 40 percent 8 of organizations reported that employees are able to connect personal devices to the network unchecked, due to non-existent or unenforced policies.
4. 5. 6. 7. 8. 9.
U.S. Cost of a Data Breach Study, Feb. 2009, Ponemon Institute Ernst & Youngs 12th annual global information security survey Cyber-Ark Software, Ltd. Data Loss Risks During Downsizing, Ponemon Institute, 2009 State of the Endpoint, Ponemon Institute, 2009 U.S. Cost of a Data Breach Study, 2009, Ponemon Institute
Define a proactive policy that balances legitimate data access needs with proper risk management controls at any level of the organization.
Define a security policy with global and user- and/or machine-specific rules based on specific organizational needs using a whitelist approach. Force the encryption of any data being transferred onto removable devices (such as USB flash drives) and/or media (such as CDs/DVDs). Removable Device/Port Control: Implements forced-encryption policy using 256-bit AES standard ciphering for data flows onto removable devices and media, including USB sticks, CDs, DVDs and more. Controls inbound and outbound data transfers to removable devices and media, including port access such as USB, FireWire, WiFi, Bluetooth, etc. Prevents malware introduction via removable devices and media. Gives power to apply data transfer policy elements, including copy limits, scheduling per user or user group, and file type. Offers flexible enforcement by user or user group, machine or machine group, device or media type, file type, time of day and more. Delivers a whitelist of allowable devices at any level of granularity by device class (e.g., all USB flash drives), device group, device model and/or even specific ID levels. Application Control/Whitelisting: Allows only authorized applications to execute, preventing the execution of unwanted software that your users may download onto endpoints (intentionally or accidentally). Antivirus and Behavioral Analysis: Detects and removes malicious software that users may download onto endpoints and prevents zero-day threats from wreaking havoc.
Automate enforcement of your data, device and application usage policies across your entire network, and force encryption of sensitive data flows onto removable devices/media.
logging of all network events related to your data protection policy to provide visibility into policy compliance and violations.
Logs all network events related to data protection policies automatically, including endpoint status, device connection, user activity (e.g., data transfers) and file tracking (including full content shadowing). Automatically generates and sends standard and customized reports for auditing, compliance and forensics purposes, including tracking of administrative activities. Scalable client-server architecture with a central database facilitates load balancing and distributed control. Kernel-level, tamper-proof agents install on every endpoint on the network, and protect themselves against unauthorized removal. Fully supports both Windows Active Directory and Novell eDirectory/NDS structure.
5. Flexible/Scalable/Secure Design:
Control and enforce endpoint policies throughout the organization using tamperproof agents on every endpoint on the network and integration with existing directory services.
Policy-based enforcement of removable device use to control the flow of inbound and outbound data from your endpoints.
About Lumension
Lumension Security, Inc., a global leader in operational endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, and Compliance and IT Risk Management offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Ariz., Lumension has operations worldwide, including Virginia, Utah, Florida, Texas, Luxembourg, the United Kingdom, Germany, Ireland, Spain, France, Australia and Singapore. Lumension: IT Secured. Success Optimized. More information can be found at www.lumension.com.
Combines proven antivirus technologies and innovative application whitelisting to establish a trusted endpoint environment to stop unwanted change, neutralize security threats and prevent sensitive data from escaping.
Scan for and remove all known malware Define and enforce a trusted application
environment throughout the organization
Protect against known and unknown threats Reduce IT support volume and increase enduser productivity by eliminating unapproved applications