Académique Documents
Professionnel Documents
Culture Documents
Agenda
Challenges for Endpoint Security & Compliance Endpoint-specific Requirements Across The Regulations Endpoint Mgmt Architectures: Compared Continuous Compliance Recommendations Summary / Q&A
2
www.unifiedcompliance.com
5
5.1, 5.2 A12.6 2.1, A12.1, 2.2, 6.2 A15.2 6.1 11.2 1.1 1.4 A12.6 A12.6 A7.1 A11.4
Today
Auditors looking at distributed environment in much more detail Large # of roaming laptops, smart phones, tablets, etc. Some rarely access the network, use Salesforce.com, Outlook HTTP access, Google Docs, etc. Network security tools are a necessary layer, but no longer protect many endpoints
1. The security team develops compliance policies. 2. The security team runs an assessment tool (or tools) against that policy 3. The security team forwards findings to ops 4. Ops makes corrections as workload allows, one item at a time using different tools from security (which generates different answers to questions like how many endpoints do I have? 5. Users make changes causing endpoints to fall out of compliance again 6. Start assessment all over again 10 10
1. Security and ops work together to formulate policies and service-level agreements (SLAs) 2. Ops implements the baseline (patch, config, AV, etc.) across all endpoints in the organization 3. Policy compliance is continuously monitored and enforced at the endpoint, changes are reported immediately 4. The security team can check on the current state of security and compliance (i.e. no assessment necessary) 5. Security and operations teams work together to continually strengthen security and adjust to evolving requirements.
Todays Endpoint Management Requirements Apply and Confirm Critical Patches in Hours
95%+ first-pass success rate Confirmation is critical for proving compliance Spray and Pray no longer adequate
12
Todays Endpoint Management Requirements Automated, Closed Loop Patch Management and Policy Enforcement One Tool for a Wide Variety of Endpoint Operating Systems and Platforms
13
15
Key Take-aways
Traditional network perimeter controls are less relevant today because:
laptops enter hostile environments attack vectors such as end user documents and web surfing
Baking intelligence and policy enforcement into the endpoint is essential. Improved visibility, automation and control will improve security AND help us pass those audits!
18 18
To learn more
www.ibm.com/security www.instituteforadvancedsecurity.com www.youtube.com/ibmsecuritysolutions Twitter:
www.twitter.com/ibmsecurity www.twitter.com/ibmxforce
Questions?
Click on the questions tab on your screen, type in your question, name and e-mail address; then hit submit.