Lumension Security Solutions
May 28, 2015
Lumension SecuritySolutions
© Copyright 2008 - Lumension Security
Optimal Security Solutions
Optimal Security
Proactive Risk Management and Operational and
Security
Security & Compliance Reporting
Endpoint Protection
Vulnerability Management
Data Protection
Best Pra
ctice
s
Ope
n Sta
ndar
ds
Integrated Platform
Flexible Architecture
© Copyright 2008 - Lumension Security 3
Lumension Solutions
3
Vulnerability Management
Endpoint Protection
Data Protection
Security & Compliance Reporting
© Copyright 2008 - Lumension Security
Effectiveness - Risk Reduction and Threat Elimination
VulnerabilityManagementRemoves risk from
technology
EndpointProtection
Filters threats from technology
IT Operations: IT SecurityThe Endpoint
Reduces attackable “surface area” Stops attacks
Optimal Security
Optimised securityLower support burdensIncreased user productivityLower TCO
© Copyright 2008 - Lumension Security
Vulnerability Management Solution
© Copyright 2008 - Lumension Security
Lumension Security Vulnerability Management Suite
DiscoverDiscover all network assets
AssessVulnerability and configuration assessmentNetwork + agent-based scanners with integrated view
PrioritisePrioritise threats and mitigation actions
RemediateDeploy Security patchesMitigate risk with custom remediations
ReportNumerous reporting optionsReporting across entire Enterprise Network
Lumension Security Vulnerability Management Suite is a process-driven solution:
© Copyright 2008 - Lumension Security
In-Depth Discovery
Provides visibility to the entire network environment to discover all assets, both managed and unmanaged
7
In-depth scans of heterogeneous networks to discover all computing assets
Flexible grouping and classification
Discover silent or hidden network nodes, even if not currently managed by agents
© Copyright 2008 - Lumension Security
Assess against Lumension’s large pre-built vulnerability and configuration repositories as well as customized vulnerability policies.
Agent & agent-less assessment options provide complete enterprise visibility
Credentialed-based scanner performs deep analysis of endpoints to accurately discover & determine vulnerabilities without impacting production environments or network assets
8
Thorough Assessment
Assess OS, Application, and Security Configuration vulnerabilities that exist within the network environment to proactively identify and prioritise known issues before they can be exploited
© Copyright 2008 - Lumension Security
Detailed Prioritisation
Multiple views of vulnerabilities grouped by vulnerability specifics or by computing assets (machines).
9
Prioritise vulnerability assessment information by vulnerability severity and/or organisational impact.
© Copyright 2008 - Lumension Security
Intelligent Patch & Remediation
Agent-based patch & remediation tool simplifies the process of maintaining a secure environment by continuously monitoring, detecting and remediating policy-driven environments
Automatically and quickly deploys patches to an entire network across many different platforms (e.g. Windows, Linux, Unix, Mac) and across applications (e.g. Adobe, WinZip, Real Networks)
10
Lumension Vulnerability Management provides fully integrated agent-based remediation capabilities in heterogeneous environments.
© Copyright 2008 - Lumension Security
Comprehensive Reporting
Single and consolidated management console provides a holistic view of environmental risk
Composite Reports combine the discovery and assessment information from both network and agent-based scanners to provide a more complete view of the environment
Role-based administration provides tailored information to the appropriate audiences.
11
Full range of operational and management reports
© Copyright 2008 - Lumension Security
Benefits
12
Discover, assess, prioritise, remediate & report on the entire network environment from one solution.
Complete enterprise visibility and effective vulnerability assessment via network and agent-based scanners.
Single solution to patch and remediate a heterogeneous network with our scalable remediation tools and various deployment options.
Comprehensive and policy-based reporting capabilities for business analysis and compliance.
© Copyright 2008 - Lumension Security
Endpoint Protection Solution
© Copyright 2008 - Lumension Security
Lumension Security Endpoint Protection
white
grey
black
Trusted applications that serve a business purpose and are supported by the organisation
Unwanted applications that are not condoned by the organisation. These can be explicitly added to the black or automatically if not in grey or white.
Extended trust based on context:• Process• Publisher• Path• Person
© Copyright 2008 - Lumension Security
Lumension Security Endpoint Protection Solution
Malware and threat protection without signature updates or
behavioral technologies
Authorises only trusted applications that serve a legitimate
business need
Lowers helpdesk burden and operational TCO by enforcing
supported software and eliminating system conflicts
Increases end-user productivity by preventing non-business
applications from being installed
© Copyright 2008 - Lumension Security
Data Protection Solution
© Copyright 2008 - Lumension Security
17
Lumension Security Data Protection Solution
Protects data from theft or loss
Controls the flow of data to devices(inbound and outbound data including port access)
Encrypts data (moved onto removable devices)
Detailed forensics and auditing(of data moved to / from a device)
Enables Compliance(Data Protection Regulations and Standards)
Device Control
Integrated PGP Whole Disk Encryption
© Copyright 2008 - Lumension Security
Security & Compliance Reporting
© Copyright 2008 - Lumension Security
19
Security & Compliance Reporting
Measure and Ensure Network Security
Demonstrate Compliance to Security Policies and Regulations
Use or Extend Over Two-Dozen Sample Reports
Easily Create and Share Custom Reports
Open Reporting Schema Works With Existing Reporting Tools
Consolidated Analysis and Reporting of all Enterprise Vulnerability Management Information