CLOUD SECURITY THROUGH ENDPOINT DEVICES

Similar documents
20 REASONS EVERYONE S NEXT PC SHOULD BE A THINKPAD OR THINKCENTRE THINKVANTAGE TECHNOLOGY AND DESIGN

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

WHERE DID ALL THE MANAGEMENT ISSUES GO?

Lenovo nomination Dutch IT Channel

Make security part of your client systems refresh

CDW.ca/lenovo

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

6 Vulnerabilities of the Retail Payment Ecosystem

Using Biometric Authentication to Elevate Enterprise Security

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

SECURE OFFICE OF THE FUTURE

Made for the way you work: Big ideas and innovation from Windows 10 and Lenovo

Solution. Imagine... a New World of Authentication.

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Data Protection in Practice

Integrated Access Management Solutions. Access Televentures

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

Combating Cyber Risk in the Supply Chain

Cisco Start. IT solutions designed to propel your business

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Lenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009

ModernBiz Day. Safeguard Your Business. Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific

Google Identity Services for work

Reduce costs and enhance user access with Lenovo Client Virtualization solutions

MOBILE TECHNOLOGY THAT MAKES A DIFFERENCE

The Problem with Privileged Users

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

A Commitment To Comprehensive

The security challenge in a mobile world

Securing the SMB Cloud Generation

Build Your Zero Trust Security Strategy With Microsegmentation

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Next Generation Authentication

IT & DATA SECURITY BREACH PREVENTION

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Teradata and Protegrity High-Value Protection for High-Value Data

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

AT&T Endpoint Security

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

Security Solutions for Mobile Users in the Workplace

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely

Mobile Devices prioritize User Experience

Effective Data Security Takes More Than Just Technology

Whitepaper. Advanced Threat Hunting with Carbon Black Enterprise Response

Understanding the Changing Cybersecurity Problem

A Guide to Closing All Potential VDI Security Gaps

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them

Carbon Black PCI Compliance Mapping Checklist

2018 Mobile Security Report

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Modern Database Architectures Demand Modern Data Security Measures

WHITE PAPER Migrating to Windows 10: a practical guide

THALES DATA THREAT REPORT

Retail Security in a World of Digital Touchpoint Complexity

Benefit from the breadth of innovative PC solutions available from Dell

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

for businesses with more than 25 seats

Train employees to avoid inadvertent cyber security breaches

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

PrecisionAccess Trusted Access Control

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

IT Security: Managing a New Reality

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Benefit from the breadth of innovative PC solutions available from Dell

Windows 10 Consumer Storybook v1.0_november update_partner-ready

Crash course in Azure Active Directory

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

Microsoft 365 Business FAQs

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Whitepaper on AuthShield Two Factor Authentication with SAP

Mobile Security / Mobile Payments

2017 Annual Meeting of Members and Board of Directors Meeting

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

5 KEY THINGS TO CONSIDER WHEN CHOOSING EDUCATION TECHNOLOGY

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

Securing Your Most Sensitive Data

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Operationalize Security To Secure Your Data Perimeter

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

THE LENOVO THINKCENTRE M73 DESKTOP

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Privileged Account Security: A Balanced Approach to Securing Unix Environments

for businesses with more than 25 seats

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Mastering The Endpoint

Cyber Security: It s all about TRUST

10 FOCUS AREAS FOR BREACH PREVENTION

Artificial Intelligence Drives the next Generation of Internet Security

Secure Government Computing Initiatives & SecureZIP

Transcription:

CLOUD SECURITY THROUGH ENDPOINT DEVICES Big Data Internet of Things Cloud Ecosystem Artificial Intelligence Robotics www.lenovo.com

Most of the upcoming technologies like Big Data, cognitive computing, IoT, AI, and robotics are underpinned by Cloud. So, Cloud is one of the most critical investment decisions that any organization can make. Given that it's the foundation for so many of the technologies that any organization will eventually adapt (if they have not already), looking at a Cloud investment decision in silo can be detrimental to business. Artificial Intelligence (AI) IoT Big Data Robotics UPCOMING TECHNOLOGIES THREE ESSENTIALS OF AN EFFECTIVE CLOUD STRATEGY Endpoint devices are an important aspect of the Cloud ecosystem. Most organizations today are realizing the importance of providing endpoint devices specific to the job requirements. For example, for account executives who are on the move most of the time and need to get a lot accomplished on-the-go, devices which are lightweight, durable, flexible like convertibles are a good choice for them. But beyond choosing the right device for the jobs, the endpoint device strategy is critical because they also decide the security readiness of your organization. The Right Endpoint Devices: for your mobile, non-mobile, and specialist users. A Good Cloud Solution: choosing the right one for your business. Effective Device Management and Security: choosing the right one for your business. 02

DEVICES ARE DECISIVE Endpoint devices are the gateway into your organization's network. So, while investing in your security strategy, don't forget that your infrastructure is only as strong as its weakest link. And don't let that weakest link be the end user devices. Mobile Security Technology Adoption Mobile device management system to enforce device security policies, including data protection 34% 30% 27% Virtual desktop infrastructure for user access to corporate data from smartphones and tablets 31% 36% 32% Application container or wrapping technologies 30% 24% 23% General mobile application management infrastructure, including enterprise app store, app provisioning, and management 30% 28% 27% Device virtualization or dual persona technologies 24% 26% 23% Data rights management 22% 23% Mobile antivirus software 22% 26% Data wrapping 20% 24% 2017 2016 2015 Forrester Data Global Business Technographics Security survey, 2017-2015 03

The modern workforce needs to work from multiple locations such as airport, client site, cafe, etc. Cloud has become a huge enabler of productivity and efficiency. But along with that it has also opened avenues for security breaches. Unauthorized Device Access Using Public WiFi Downloading Applications/Software from Unauthorized Sources Accidental Damage Device Theft/Loss About 62% of security breaches today stem from employee error. 1 https://www.tektonikamag.com/index.php/2017/07/24/securi ty-breaches 04

Unauthorized Device Access Just trying to protect device access through passwords might not be the best way to secure endpoint devices from unauthorized access. Almost 40% of SMBs are planning on investing in two-factor authentication approaches in the next 12 months. Aspects to look for in your device to prevent unauthorized access: ThinkPad T480s Biometric Authentication Advanced multifactor user authentication like facial recognition and fingerprint reader technologies to protect users and their data. Keep Spies Away Technology that keeps prying eyes from getting access to sensitive data. Restricted Port Access Prevent data theft through USB ports by allowing access to only authorized users. Match on Chip Fingerprint Reader Powered by Intel Authenticate Protect your data with advanced biometric security solutions. Windows Hello and ThinkPad Glance This advanced facial recognition feature helps keep unwanted users at bay. Smart Card Access A highly secure way of storing login information in tamper-proof cards without using passwords. Smart USB Protect Prevent data compromise by restricting port access. 05

Unauthorized Device Access What are your firm s plans to adopt the following two-factor authentication approaches? (Expanded/expanding + Implemented/implementing Respondents Recode) 0% 20% 40% 60% 80% 100% Hardware one-time password token (e.g. RSA SecurID) Fingerprint biometrics Voiceprint biometrics SMS text message sent to a mobile device (bring your own token) Transaction or document signing token using a mobile device application Risk-based or context-based authentication leveraging mobile device or desktop or app details Facial recognition biometrics Certificate stored on a device for two-factor authentication One-time password generated by a mobile device application for two-factor authentication 0% 20% 40% 60% 80% 100% Not intrested/interested but no immediate plans (1 2) Planning to implement within the next 12 month (3) Implementing/ implemented/ Expanding/ upgrading implementation Don t know Forrester Data Global Business Technographics Security survey, 2017 06

Using Public WiFi Most of us don't think twice before connecting to public WiFi networks. Public networks pose multiple types of threats starting from Man-in-the-Middle (MitM) attacks where hackers intercept the data, to rogue WiFi networks where hackers set up WiFi networks that seem legitimate, endpoint attacks where hackers can access your laptop, and worms that transmit viruses to your device. ThinkPad X1 Carbon Whatever be the mode, Verizon s annual Data Breach Investigation Report has found that 89% of all cyber-attacks involve financial or espionage motives 2. Clearly no organization wants to fall victim to that. So, to prevent malicious attacks on your data, devices should have: Safe WiFi Access In-built solution to recognize secure WiFi networks. Contained Threats Apps which ensure that malware does not enter devices directly. Data Encryption Apps that encrypt data in the Cloud and provide secure authentication. Lenovo Vantage Monitor WiFi security real-time to keep away from risky and malicious networks. BUFFERZONE This feature creates a secure, isolated environment for accessing content from any potentially risky source*. Go-Trust Enable multifactor authentication with your fingerprint and phone to unlock your devices and Cloud accounts*. *not preloaded https://www.mishcon.com/news/firm_news/89_of_breache s_had_a_financial_or_espionage_motive_04_2016 07

Downloading Applications/ Software from Unauthorized Sources 80% of IT security professionals say their greatest threats are from rogue employees, malware exploits or unauthorized software. 3 An estimated 57% of employees install unauthorized software on company computers, and over two-thirds of that software brings viruses and other malware along with it. 4 Hence, it is important for endpoint devices to have: In-built Security Features Software that allows devices to recognize unsafe apps. IT Visibility and Control Improve security by allowing IT teams to have device and network visibility. Lenovo Vantage Enable IT to detect threats near the laptop and take necessary action. Coronet Secure your Cloud operations by allowing only trusted devices, networks, and Cloud services to access your data. Intel Active Management Technology (Intel AMT) Remotely access a device to discover, activate, monitor, protect, and manage it despite its power state. MobileIron Secure data-at-rest and data-in-motion on devices, networks, and in the Cloud. Mobile Device Management Ensure that data is always secure whether it is stored on a device or in the Cloud. 3: https://www.avecto.com/news-and-events/news/80-of-it-security-professionals-say-their-great est-threats-are-from-rogue-employees-malware-exploits-or-unauthorized-software 4: https://blog.samanage.com/it-asset-management/alert-unauthorized-software-on-network/ 08

Accidental Damage Data loss doesn't take place only because of theft or unsafe WiFi. Devices and liquids do not complement each other. Something as trivial as a sudden coffee spill can ruin your device and in turn, the data in it. Unforeseen drops can also damage your device. Thus, it is important for businesses to go that extra mile to ensure device safety. Complete device safety can be ensured with: Durable and Reliable Devices Devices that are tough to endure whatever comes their way. Automatic Backup Devices that backup data instantly to prevent downtime. Services for Unforeseen Damages A warranty service that covers for unintentional damages. OLDB MIL-SPEC Tested ThinkPads are tested against 12 military-grade requirements and pass more than 200 durability tests. Online Data Backup (OLDB) With this solution, ensure automatic backup and recovery of your data. Accidental Damage Protection (ADP) Enable device protection due to unintentional electrical surge, liquid spills, drops or bumps, and LCD damage. 09

Device Theft/Loss Modern CPUs are relatively smaller; a plus for users and thieves too. It is not just laptops, but desktops and HD drives are subject to theft too. Another challenge for organizations is loss of a device which in most cases happens for laptops and tablets. In such a situation, it is not only the device which is compromised, but your organization's data in the Cloud is also at risk if your device is not secure enough. According to a new survey by NetEnrich, 42% of IT pros said their organizations suffered key corporate data loss from a mobile device. 5 Thus, organizations can prevent data breach through: Data Encryption Technology to encrypt data to prevent hacking and theft. Physical Data Theft Device innovations that prevent hard drive theft. Remote Data Erase Technology that allows IT to control devices and erase data remotely. ThinkCentre M910 Tower Discrete Trusted Platform Module (dtpm) Encrypt your data, passwords, and more for better security. Removable HDD Physically remove your hard drive for enhanced security. Intel Active Management Technology (Intel AMT) Remotely erase data from a compromised device to prevent malware attack on other devices. https://blogs.absolute.com/the-impact-of-corporate-data-lo ss-from-mobile-devices/ 11

CONCLUSION The right endpoint device strategy can benefit your organization at multiple stages: Make sure that endpoint devices are not the vulnerable link to your organization's IT infrastructure. Complement the employees with the right tools and technology to help them do their jobs productively and efficiently. The modern workforce looks forward to technology and devices that complement their work style and isn't dated. According to a Microsoft survey, 93% of workers said technology helps them thrive at work and that having modern and up-to-date technology in the office is important. 6 So choose with care. https://toggl.com/employee-retention-strategi es-millennials 12

reasons why Lenovo is a difference maker Trusted around the world Expertise across categories Confidence in our products Business-boosting technology Flexible support network Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. www.lenovo.com 2018 Lenovo. All rights reserved. These products are available while supplies last. Prices shown are subject to change without notice. For any questions concerning price, please contact your Lenovo Account Executive. Lenovo is not responsible for photographic or typographic errors. Warranty: For a copy of applicable warranties, write to: Warranty Information, 500 Park Offices Drive, RTP, NC 27709, Attn: Dept. ZPYA/B600. Lenovo makes no representation or warranty regarding third-party products or services. Trademarks: Lenovo, the Lenovo logo, Rescue and Recovery, ThinkPad, ThinkCentre, ThinkStation, ThinkVantage, and ThinkVision are trademarks or registered trademarks of Lenovo. Microsoft, Windows, and Vista are registered trademarks of Microsoft Corporation. Intel, the Intel logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation in the U.S. and/or other countries. Other company, product, and service names may be trademarks or service marks of others.