1 / 20

Your Partner for Superior Cybersecurity

Protect your business from the rising risk of cyber attacks. Our integrated and easy-to-use endpoint security solutions offer comprehensive defense-in-depth strategies. Prevent breaches, detect threats, and secure your assets with our best-in-breed tools.

rayr
Download Presentation

Your Partner for Superior Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Rene Anthony Gonzalez, SE Manager, Endpoint Security Your Partner for Superior Cybersecurity

  2. Your security risk is higher than ever. $19.95/mo. 40% buys hackers easy-to-use “as-a-service” options for attacks. ZDNet of spam contains ransomware. IBM

  3. 2016 ransomware attacks were up  16% over 2015. Verizon 2016 DBIR

  4. 30% of recipients open phishing messages. click on attachments. 12% Verizon 2016 DBIR

  5. You can’t afford to be wrong on this one. 1 in 2 70% $1B USD executives experience a ransomware attack in ransom paid in 2016 of businesses hit pay the ransom IBM IBM FBI estimate

  6. Bring IT Ops and Security together. Privilege management Both Only Security Only IT Setting IT access control panels Server OS patching Application whitelisting Security alerts

  7. Feedback from a survey of 100 CIO/CSOs “We have to tear down the traditional view of what anIT operations entity is and whata security entity is.”

  8. Feedback from a survey of 100 CIO/CSOs “IT wants things to work smoothly, while security wants security. At the endpoint, they have to work together to maintain both.”

  9. Feedback from a survey of 100 CIO/CSOs “You do not need 15 best-in-breed productsfor a successful layered approach to cybersecurity.”

  10. Unfocused security strategies lead to Expense in Depth.

  11. Make sense of endpoint security. Forrester examined past research, surveyed experts, and experimented with endpoint security products to determine: • Current business value • Potential business value (overall trajectory, from minimal to significant success) • Current market maturity (“ecosystem phase”) • Time to next stage of maturity Key takeaways: • Endpoint security is critical to defend against data breaches. • Security pros seek to balance prevention and detection. • Consolidating technologies leads to more effective suites. Source: Forrester TechRadar™: Endpoint Security, Q1 2017, by Chris Sherman, January 27, 2017

  12. Focused strategies lead to strategic IT success. • Defense in depth • Integrate the environment to discover the breadth of risk. • Provide tech that reduces the attack surface. • Analyze data for insight into issues. • Help users take action to solve problems. • Sense in breadth • Learn about users and discover their needs. • Provide security without getting in the way of their jobs. • Silently service them through upgrades and risk evasion. • Increase productivity with the right tools.

  13. Our approach to security Discover Provide insight Integrated, easy-to-use security offering Take action Easily find and quantify the assets you need secured. Apply our integrated best practices to clearly identify risk. Use our best-in-breed tools to act swiftly.

  14. Our defense-in-depth solutions Patch & Vulnerability Management Secure Program Management Application Control & Privilege Management Endpoint Security Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Patch and secure the OSes and 3rd-party apps that you can. • Asset management • Service management • Secure configuration management • Patch management • Vulnerability management • Application control • Privilege management • Device control • Anti-malware • Threat alerting

  15. Our defense-in-depth products Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management • Ivanti Patch for Endpoints • Ivanti Patch for Servers • Ivanti Patch for SCCM • Ivanti Application Control for Endpoints • Ivanti Application Control for Servers • Ivanti Application control for SCCM • Ivanti Endpoint Security • Ivanti Server Security • Ivanti Service Manager • Ivanti Asset Manager

  16. Security Compliance

  17. Critical Security Controls (CSC) The Center for Internet Security Critical Security Controls ensure a more secure environment. • Prioritized list of focused actions • Compliant with all industry and government security requirements • Based on experience with actual attacks • Block initial compromises and detect compromised devices

  18. The first 5 controls CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly reduce security threats. Inventory of authorized and unauthorized devices Inventory of authorized and unauthorized software Secure configuration Controlled use of administration privileges Continuous vulnerability assessment and remediation

  19. Our defense-in-depth solutions Patch & Vulnerability Management Secure Program Management Application Control & Privilege Management Endpoint Security Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Patch and secure the OSes and 3rd-party apps that you can. • Asset management • Service management • Secure configuration management • Patch management • Vulnerability management • Application control • Privilege management • Device control • Anti-malware • Threat alerting

More Related