Real World Defense Strategies for Targeted Endpoint Threats
-
Upload
lumension -
Category
Technology
-
view
212 -
download
3
description
Transcript of Real World Defense Strategies for Targeted Endpoint Threats
Sponsored byReal World Defense
Strategies for Targeted Endpoint Threats
© 2013 Monterey Technology Group Inc.
Thanks to
© 2013 Monterey Technology Group Inc.
www.Lumension.com
Paul Zimski
Preview of Key Points
Phases of a targeted attack
How to disrupt, hinder, detect and prevent attackers at each phase
Endpoint security best practices Endpoint management processes Hardening steps Monitoring techniques Endpoint security technologies
Discover
Distribute
Exploit
Control
Execute
Discover
What it is Reconnaissance Casing the joint
How to fight it Human Difficult
Distribute
What it is Package Deliver the payload
How to fight it Web
Content scanning Website reputation
Email Scanning Filtering Training
Device control
Exploit
What it is Trigger the payload Exploit the vulnerability
How to fight it Configuration control
Attack surface reduction Fast patching Application control
Whitelisting Memory protection Anti-malware
Control
What it is Install persistent malware on system Connect back to command & control
How to fight it Application control
Whitelisting Anti-malware Configuration control Network egress scanning
Execute
What it is Spread-out Begin taking action against planned objectives
How to fight it Application control
Whitelisting Anti-malware Configuration control Network egress scanning Host monitoring
New EXEs New accounts Suspicious access patterns to critical information
Bottom line
Fight them every step of the way Defense-in-depth
Endpoint security is a many headed beast So many risk vectors So many security technologies
Integration between endp0int security techn0logies One agent One console
18
Defense-in-Depth with Lumension
Click to edit Master title style
Physical Access
Por
t / D
evic
e C
ontr
ol a
nd E
ncry
ptio
n
Full DiskEncryption
Fire
wal
l Man
agem
ent
Pat
ch a
nd C
onfig
urat
ion
Man
agem
ent
Ant
i-Mal
war
e
NetworkAccess
Sponsored by
Sponsored by
• Free Security Scanner Tools» Vulnerability Scanner – discover
all OS and application vulnerabilities on your network
» Application Scanner – discover all the apps being used in your network
» Device Scanner – discover all the devices being used in your network
http://www.lumension.com/Resources/Security-Tools.aspx
• Lumension® Endpoint Management and Security Suite» Online Demo Video:
http://www.lumension.com/Resources/Demo-Center/Vulnerability-Management.aspx
» Free Trial (virtual or download):http://www.lumension.com/endpoint-management-security-suite/free-trial.aspx
• Get a Quote (and more)http://www.lumension.com/endpoint-management-security-suite/buy-now.aspx#2
11