SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY

Similar documents
AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER

PREVENTING PRIVILEGE CREEP

ADOPTING FIDO SearchSecurity

NETWORK-BASED CONTROLS: SECURING THE INTERNET OF THINGS

BRING SPEAR PHISHING PROTECTION TO THE MASSES

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY

MANAGING ENDPOINTS WITH DEFENSE- IN-DEPTH

SSL Certificate Management: Common Mistakes and How to Avoid Them

ADDRESSING TODAY S VULNERABILITIES

Desktop Virtualization: What Windows Managers Should Know

SECURITY MONITORING: BE EVERYWHERE AT ONCE

Utilizing Windows Server 2012 without the GUI Key workarounds for avoiding the Modern UI

AS ATTACKERS TARGET APPLICATION CODING ERRORS, ARE STATIC ANALYSIS TOOLS THE ANSWER?

E-guide Endpoint Protection Planning Guide

Storage Virtualization Explained

KNOW THE FEATURES OF WINDOWS SERVER 2012 R2

Identify and Eliminate Oracle Database Bottlenecks

Evaluating the Security of Software Defined Networking

BEST PRACTICES TO PROTECTING AWS CLOUD RESOURCES

Server Hardware for Virtualization: Exploring the Options

Best Practices for the Hybrid Cloud

Understanding the Value behind Enterprise Application-Aware Firewalls

E-Guide BENEFITS AND DRAWBACKS OF SSD, CACHING, AND PCIE BASED SSD

10 Cloud Storage Concepts to Master

Disaster Recovery Planning: Weighing your customer s options

WHAT NETWORK VIRTUALIZATION TECHNOLOGY CAN DO FOR YOUR NETWORK TODAY

An introduction to the VDI landscape

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS

LESSONS LEARNED FROM AN OFFICE 365 MIGRATION

E-Guide WHAT WINDOWS 10 ADOPTION MEANS FOR IT

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future

Requirements for virtualizing Exchange Server 2010

VMware vsphere Beginner s Guide

Disaster recovery planning for health care data and HIPAA compliance regulations

STORAGE NETWORKING TECHNOLOGY STEPS UP TO PERFORMANCE CHALLENGES

E-Guide DATABASE DESIGN HAS EVERYTHING TO DO WITH PERFORMANCE

BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE

The Evolution of Threat Detection and Management

SDN Technologies Primer: Revolution or Evolution in Architecture?

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

E-Guide UPDATE YOUR APPLICATION SECURITY POLICY AFTER HEARTBLEED

A primer to SQL Server 2012

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Question: 1 The NAC Agent uses which port and protocol to send discovery packets to an ISE Policy Service Node?

GUIDE. MetaDefender Kiosk Deployment Guide

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

E-guide Getting your CISSP Certification

Integrated Access Management Solutions. Access Televentures

Backup solutions for today s Data Center

Best Practices in Securing a Multicloud World

Google Cloud & the General Data Protection Regulation (GDPR)

Vista Deployment: What s in the Box and What s Not

Encryption Vision & Strategy

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

What It Takes to be a CISO in 2017

Building Resilience in a Digital Enterprise

Click to edit Master title style. DIY vs. Managed SIEM

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

Don t Be the Next Data Loss Story

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

CoreMax Consulting s Cyber Security Roadmap

Defense in Depth Security in the Enterprise

Five Essential Capabilities for Airtight Cloud Security

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

The Emergence of SDN in WLAN

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

MigrationWiz Security Overview

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

Combating today s Security Threats

Certified Cyber Security Specialist

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

BEYOND CJIS: ENHANCED SECURITY, NOT JUST COMPLIANCE

Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches

BETTER Mobile Threat Defense (BMTD)

ForeScout ControlFabric TM Architecture

An ICS Whitepaper Choosing the Right Security Assessment

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

SECURE DATA EXCHANGE

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Cyber security tips and self-assessment for business

GDPR: An Opportunity to Transform Your Security Operations

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

SACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

CAN MICROSOFT HELP MEET THE GDPR

Full file at

Managed Security Services - Endpoint Managed Security on Cloud

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

Cisco Self Defending Network

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

PowerSC AIX VUG. Stephen Dominguez June 2018

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

Transcription:

E-Guide SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY SearchSecurity

L earn how network access control, data loss prevention (DLP) and robust data destruction can secure endpoints and protect enterprise data. PAGE 2 OF 7

SUPPLEMENTARY DEFENSES FOR ENDPOINT SECURITY Mike Cobb Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, absolute endpoint protection is virtually impossible. There are various technologies, though, that can help safeguard data stored on endpoints while protecting the network from devices that may be vulnerable to attack or already compromised. This technical tip looks at how network access control (NAC), data loss prevention (DLP) and robust data destruction can help secure endpoints and prevent them from putting enterprise data at risk. WHAT NAC DOES NAC is a key technology for admission control based on the overall security posture of a user and his or her device. Pre-admission security policy checks, and the ability to automatically remediate non-compliant devices, ensures each endpoint meets a minimum level of compliance before it can connect fully connect to the network. This not only ensures that endpoints are capable PAGE 3 OF 7

of protecting themselves from attack by malware, but stops them from putting the rest of the network at risk. NAC can leverage user and device profiles in backend data stores, such as LDAP, RSA and Active Directory. This enables routers, switches and firewalls to work together to determine who and what is trying to connect to the network, and assign the appropriate access. This provides greater coordinated defense-in-depth with security controls able to share their knowledge of network and device behavior. NAC products can provide quite detailed information about the status of an endpoint s security: Are all necessary patches applied? Is hard-drive encryption enabled? Is the host-based firewall running? Which ports are open? While answering these concerns, and more, context-aware capabilities provide ongoing protection during each network session. Support for more specialized equipment -- such as point-of-sale systems, kiosks, supervisory control and data acquisition systems that may connect to the network -- is also important, as is integrating NAC with mobile device management technologies so that the security status of mobile devices can also be checked. PAGE 4 OF 7

WHERE DLP FITS IN While NAC can keep endpoints compliant and control their access to resources, DLP technologies can protect data on endpoints from unauthorized attempts by careless or malicious users to copy or share it. DLP tools use deep content filtering to inspect and control the data a user or device is trying to download, copy, print, share, or transfer to both prevent unauthorized use and stop sensitive data from leaving the network. This provides real-time data protection as user accounts can be automatically disabled, or devices quarantined as soon as a suspicious data (i.e. large uploads or downloads, odd login times, etc.) transfer begins. They can either be standalone or cloud-based tools, or integrated into existing suites. Extending data loss prevention to mobile devices, whether corporate- or user-owned, usually requires some form of mobile device management product. Many of these can also ensure data on mobile devices is always encrypted. REQUIRED: DATA DESTRUCTION POLICY Encryption should of course be used on all endpoints, but the less sensitive data left on endpoints, the better. The turnover of network endpoints has never been PAGE 5 OF 7

higher, and data destruction polices need to be applied to all devices that have the ability to store data. Correctly sanitizing an endpoint s drive or flash storage when it is reassigned or decommissioned is essential in order to destroy all the electronic data on it; normal file deletion commands only remove pointers to the data, which means it takes only a trivial effort, using common software tools, to recover the actual data. Reducing the number of endpoints holding forgotten copies of classified information reduces the chances of them leaking or exposing enterprise data. Combining robust data destruction with NAC and DLP technologies will greatly improve the overall security of endpoints and the data they store or process. Michael Cobb, CISSP-ISSAP, is a renowned security author with over 20 years of experience in the IT industry. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. He has also been a Microsoft Certified Database Manager and registered consultant with the CESG Listed Advisor Scheme (CLAS). Cobb has a passion for making IT security best practices easier to understand and achievable. His website www.hairyitdog.com offers free security posters to raise employee awareness of the importance of safeguarding company and client data, and of following good practices. PAGE 6 OF 7

FREE RESOURCES FOR TECHNOLOGY PROFESSIONALS TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. WHAT MAKES TECHTARGET UNIQUE? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. PAGE 7 OF 7