SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
Featuring:
A Buyer’s Guide to Endpoint Protection Platforms




In This Issue:                          The evolution of endpoint security
Examine the formula
                                        Welcome to this complimentary copy of Gartner’s Buyers
that fuels success in the
                                        Guide to Endpoint Protection Platforms. This newsletter
competitive security and data
                                        explores how the traditional methods for endpoint
protection market. . . . . . . . 2
                                        security should evolve. You’ll learn how Sophos’s recent integration of Utimaco affects the highly

Explore life without                    competitive security and data protection market. You’ll find out how the lack of data protection

comprehensive                           can affect your bottom line, and lastly, gain insight into the true costs involved in migrating and

data protection . . . . . . . . . . 3   managing an endpoint security product.


Understand the                          Traditional markets for dedicated endpoint security products — particularly anti-virus tools and
total cost of ownership for             personal firewalls — have been, according the report, eclipsed by endpoint protection platforms.
endpoint security solutions:            Sophos now offers a unique solution, Sophos Endpoint Security and Data Protection, which
A TCO white paper . . . . . . 4         provides simplified cross-platform security, centralized management, full-disk encryption and
                                        control of devices, applications and network access.
From the Gartner Files
A Buyer’s Guide
to Endpoint                             We invite you to learn more about simply securing your business at every level, and how to reduce

Protection Platforms . . . 10           the risks associated with non-compliant, unmanaged and unauthorized computers.


                                        Visit www.sophos.com for more information.




 Featuring research from
2



Examine the formula that fuels success in the
competitive security and data protection market
Sophos CEO in the spotlight with SearchSecurity.com
Sophos CEO Steve Munford recently sat         With the increase external and internal
down with SearchSecurity.com’s Senior         threats, limited IT staff, tighter budgets,   Sophos offers proven proactive

Technology Editor, Neil Roiter to discuss     and mounting industry and government          Genotype protection backed by

the formula behind Sophos’s success           compliance and regulatory mandates, it’s      SophosLabs™ expertise and our

in the competitive security and data          clear that businesses today are facing        HIPs technology. Here’s a snapshot of

protection market, and what the future        more security challenges than ever before.    what they have discovered in the past

holds for the company.                                                                      six months:
                                              However with the latest encryption
In this interview, Munford explained how      offerings post Utimaco acquisition, Sophos    •	 23,500	new	infected	webpages	are	

Sophos is aggressively taking market share    customers can further achieve regulatory         discovered every day. That’s one

away from Symantec and McAfee, and            and compliance mandates while getting            every 3.6 seconds, four times worse

examined how — even in the economic           more value for their budget.                     than the same period in 2007.

downturn — Sophos continues to experience                                                   •	 40,000	new	suspicious	files	are	

year-over-year growth and its channel                  Listen to the Newsmaker                 every day.
                                                          podcast with Sophos               •	 15	new	bogus	anti-virus	vendor	web-
partners are achieving double-digit growth.
                                                          CEO Steve Munford.
                                                                                               sites are discovered every day. This
                                                                                               number has tripled, up from an average
                                                                                               of five detected per day, during 2008.
                                                                                            •	 89.7%	of	all	business	email	is	spam.
                                                                                            •	 Approximately	6,500	new	spam-related	
                                                                                               websites are discovered every day —
                                                                                               accounting for one new website every
                                                                                               13 seconds, 24 hours a day. This fig-
                                                                                               ure is almost double the same period
                                                                                               in 2008.

                                                                                                 Source: Sophos mid-year threat report
3



Explore life without comprehensive data protection

                                                                                                    Hear from those that have
Sophos Endpoint Security and Data                     109,000	pension	holders	at	risk.	The	         gotten more with Sophos
Protection defends against data loss                  laptop contained names, addresses,
                                                                                                    “Selecting Sophos Endpoint Security
through full disk encryption and information          dates of birth, National Insurance num-       & Control just made sense as we were
security encryption for removable storage             bers, employer names, salary details          able to meet all of our needs and top
devices and portable media. Learn why                 and bank account information.                 security solution. Prior to Sophos, we
                                                                                                    were using a separate anti-adware
this is important, how data loss can affect        •	 June	530,000	Virginia	patients	were	          solution along with a security solution
your bottom line — and more importantly               individually notified that their Social       to stop viruses and spyware. This
                                                                                                    approach worked, but by consolidating
— what businesses can do to stop it:                  Security Numbers had potentially been
                                                                                                    into one solution, we improved the
Data leakage remains a top concern in                 exposed after a hacker gained access          efficiency of the workstation and
                                                      to the Virginia Prescription Monitoring       manageability for the administrators,
2009,	with	scandals	continuing	to	dominate	                                                         therefore lowering our TCO.”
the headlines. Many corporations and                  Program 14.                                       – Pramesh Naik, enterprise support
                                                   •	 June Authorities arrested a former                    manager at Kilpatrick Stockton
government institutions have failed to
protect their confidential information —              Goldman Sachs employee who upload-
                                                                                                    “From the Sophos console, you
including the identities of their workforce,          ed the company’s secret source code to        manage every aspect of security as
                                                      an FTP server based in Germany.               well as endpoint control. Any malware
customers and general public.
                                                                                                    detected shows an alert so you know
It is not only the threat of negative publicity    Encryption                                       which computer needs attention and
                                                   The most important step in stopping data         what to do. In many cases, you can
that is driving interest in data protection, but
                                                                                                    do it from within the console, and
also concern that the organization is failing to   leakage is to encrypt sensitive information,     if not, you know immediately which
comply with regulatory security standards.         laptops and removable storage devices.           machine to go to. During normal
                                                                                                    operation, the Anti-virus and Anti-
                                                   If data is encrypted with a password, it
A variety of techniques are being used by                                                           spyware is updated hourly — that’s
                                                   cannot be deciphered or used unless              right, hourly. In the event of an
corporations around the world to prevent
                                                   the password is known. This means that           outbreak somewhere in the world, it
data loss in a mobile connected world. These                                                        will update even more often.”
                                                   even if all other security measures fail               – Dave Coe, Independent Security
include anti-virus software, encryption and
                                                   to prevent a hacker from accessing your                     Specialist, Longmont Toyota
firewalls, access control, written policies and
                                                   most sensitive data, he or she will not be
improved employee training.                                                                         “The Sophos endpoint solution
                                                   able to read it and so compromise the
                                                                                                    simplified management for Ferrellgas,
Nevertheless, users are routinely using            confidentiality of your information.             enabling threats to be monitored at
and sharing data without giving enough                                                              the desktop level. Technicians can
                                                   The second step is controlling how users         automatically deploy and manage the
thought to confidentiality and regulatory
                                                   treat information. You want to stop any          assessment, control and protection
requirements. This has led to numerous                                                              from one console. This has enabled
                                                   risky behavior, such as transferring
incidents of data loss in the first six                                                             us to be proactive in confronting
                                                   unencrypted information onto USB sticks          issues, which in turn has increased
months	of	2009	—	some	accidental,	some	
                                                   and via email. Organizations should extend       end-user confidence in our abilities.”
malicious:                                                                                                    – Greenwood Leflore Hospital
                                                   their anti-malware infrastructure in order to:
•	 May Hackers broke into a Virginia gov-
                                                   •	 Protect	data	in	motion	and	data	in	use	       “Sophos has an intimate
   ernment website, stealing the details of
                                                   •	 Guarantee	efficient	operations	               understanding of the complexity of the
   almost 8.3 million patients, and threaten-                                                       university environment and the need
                                                   •	 Ensure	that	they	meet	regulatory	
   ing to auction them to the highest bidder.                                                       to manage multiple threats through an
                                                      requirements                                  integrated solution, while allowing a
•	 May The theft of a single laptop in
                                                                                                    high degree of user control.”
   the UK put the personal identities of                  Source: Sophos mid-year threat report             – University of British Columbia
4



Understand the total cost of ownership
for endpoint security solutions
A TCO white paper
Executive summary                             before switching to Sophos Endpoint       The results show that the value of
Organizations considering moving to an        Security and Control. Real data from      switching to and managing endpoint
endpoint security solution often assume       customers’ experiences was collected to   security with Sophos is immediate and
that the costs of switching from their        compare the true and complete costs of    significant. The overall TCO costs of
current anti-virus vendor will be greater     switching to and managing with Sophos     switching to Sophos are actually less
than upgrading with that vendor. To shed      versus upgrading and managing with the    than upgrading with the existing vendor.
some light on this issue, Sophos, a leading   current vendor.                           Moreover, there are no net new cost
endpoint security vendor, commissioned                                                  areas in switching to Sophos that would
                                              Companies interviewed in depth, and
an independent research study to uncover                                                not be still be incurred in upgrading with
                                              whose costs were analyzed, included:
and quantify all of the cost areas involved                                             the existing vendor. A sample company
                                              •	 Amica	Mutual	Life	Insurance
in migrating (upgrading or replacing) to an                                             with 3,400 users can save $110,000 in
                                              •	 Lincoln	Public	Schools
endpoint security product and managing                                                  Year	one	and	a	total	of	$504,000	over	
                                              •	 AW	Chesterton
the solution to gain a total cost of                                                    five years by switching to Sophos. The
                                              •	 British	Services	Company
ownership (TCO) comparison between the                                                  chart below shows the present value of
                                              •	 Central	Ohio	Primary	Care	Physicians
leaders in the field.                                                                   the total costs for Symantec and McAfee
                                              •	 US	Healthcare	Provider
                                                                                        (collectively referred to as the installed
The nine companies interviewed for            •	 CGH	Medical	Center
                                                                                        endpoint protection vendors in this study)
this study had previously been running        •	 German	Company
                                                                                        and Sophos over five years.
Symantec’s or McAfee’s anti-virus product     •	 Escambia	County	School	District
5


Key sources of cost                                Cost Example
The cost savings of switching to the                  COST AREA                                    SPECIFIC COSTS
Sophos Endpoint Security and Control                  Upgrade or replace                           •	 Licensing
solution rather than upgrading with an                                                             •	 Additional	Hardware	and	Software
installed endpoint protection vendor                                                               •	 Upgrade	or	replacement	effort	
(specifically Symantec Endpoint Protection
and McAfee Total Protection for Enterprise)           Manage / Ongoing operations                  •	 Infrastructure	management
are clear and compelling. Based on                                                                 •	 Help	desk	team
interviews with technical decision-makers                                                          •	 Escalation	team
and influencers at a number of corporate                                                           •	 End	user	productivity
and public sector organizations in the US
and Europe, the cost savings fall into two
                                                   These costs will be fully explained and        In addition, the sample company required
main categories:
                                                   supported in the next section.                 an extra physical server for both scenarios
•	 Upgrade	or	replace	(Year	1	costs)                                                              (upgrading with the current vendor and
                                                   The following TCO example illustrates
•	 Manage/	Ongoing	operations	(Annual	                                                            switching to Sophos). No other extra
                                                   the potential cost savings of switching to
   costs)                                                                                         hardware (physical or virtual servers) or
                                                   Sophos Endpoint Security and Control for
These two cost areas can be further                                                               software (server licenses) was needed for
                                                   a sample corporation with 3,400 users and
broken down into a set of specific costs.                                                         migration.
                                                   the expected operational statistics post
                                                   upgrade for one of the installed endpoint
                                                                                                  Cost source 1: Upgrade or
                                                   protection vendors:
                                                                                                  replace
TCO Example                                                                                       1. Licensing (software and technical
  Cost Element                                                Sample Company                         support). Interviewees consistently
  Time to manage endpoint security                            20 hours per week                      cited licensing costs as the key rea-
                                                                                                     son why they switched to Sophos
  Help Desk calls related to endpoint security                75	calls	per	month
                                                                                                     Endpoint Security and Control rather
  (Tier 1 issues)
                                                                                                     than upgrading to Symantec Endpoint
  # of endpoint security detections (spyware,                 20 detections per week
                                                                                                     Protection or McAfee Total Protection
  adware, viruses, etc.) prior to execution
                                                                                                     for Enterprise. However, licensing typi-
  Time to remediate Tier 2 issues                             3 hours per week                       cally	only	represents	20%	of	the	TCO	

  Time to remediate Tier 3 issues                             10 hours per week

  # of annual service interruptions due to                    1 interruption per year                 “McAfee proved to be
  endpoint security issues                                                                            more expensive from
  # of users affected per interruption                        10 users                               the point of view that it
  Hours of downtime per interruption                          6 hours                               charged for every module.
  Lost	productivity	due	to	downtime	and	                      15	minutes	per	user	per	week          When we reviewed Sophos
  bandwidth reduction                                                                                  it was all part of one
                                                                                                     purchase and the price
 Tier 1 issues have arisen before and the solutions have been documented for the help desk team
 to follow.                                                                                         was less than for McAfee.”
 Tier 2 issues are common threats that can be handled by internal technical staff.                     – Technical Services Manager,
 Tier 3 issues are new threats that require vendor support to remediate.                                 British Services Company
6


     (the labor costs were 3X to 4X more                                                            rely solely on their infrastructure manag-
     significant). The Sophos license price             “Sophos was the only                        er to do this work while others purchase
     was lower even for customers who                                                               professional services contracts with the
                                                      solution that didn’t care
     were comparing it against the upgrade                                                          vendor to alleviate the workload on the
                                                          if clients are Macs
     price for their current vendor (no new                                                         infrastructure manager. Interviewees
     licenses). Customers also mentioned              or PCs — it was the only                      described upgrading to an endpoint
     that the pricing was more straightfor-            cross platform solution                      security product with Symantec as a
     ward with Sophos because it included                     at the time.”                         daunting task. This was primarily due
     all six endpoint security components                   – Director of Technology,               to the difficulty in removing all of the
     (anti-malware, HIPS, application control,               Lincoln Public Schools                 old versions of the product, which is
     device control, client firewall and basic                                                      required before installing an endpoint
     network access control) in one price                                                           security solution.
                                                     management console centrally deploys
     whereas the installed endpoint protec-                                                      Customers found replacement easier than
                                                     and manages endpoint security for
     tion vendors charged separately for sev-                                                    upgrading because of the effectiveness of
                                                     Windows,	Mac	and	Linux	whereas	the	
     eral of these security components.                                                          Sophos’ client removal tool and the ability
                                                     installed endpoint protection vendors
     For the sample corporation with 3,400                                                       to deploy the solution automatically from
                                                     either require multiple consoles or do
     users, a three-year deal with Sophos                                                        a single console. Companies interviewed
                                                     not support these platforms. The com-
     cost	$117,300,	10%	less	than	the	cost	                                                      estimated that it would take 1 hour to
                                                     panies interviewed for this study did
     of upgrading with the current vendor.                                                       upgrade 10 endpoints with Symantec and
                                                     not meet these criteria so the additional
                                                                                                 McAfee. For medium to large enterprises
     Impact for sample company:                      hardware and software costs were not
                                                                                                 with 2,000 to 20,000 users that adds
     $12,648 Year 1 cost savings                     significant whether upgrading with the
                                                                                                 200 to 2,000 hours to the Infrastructure
     Standard technical support is included          current vendor or switching to Sophos.
                                                                                                 Manager’s workload. On the Sophos side,
     in the license price and there is an addi-      To calculate these costs in the model
                                                                                                 the	replacement	process	takes	35	hours	
     tional charge for a higher level of sup-        the following industry averages were
                                                                                                 regardless of the number of users.
     port for both Sophos and the installed          used: $8,000 for a physical server,
     endpoint protection vendors. The com-           $2,000 for a virtual server and $1,000      The infrastructure manager at the sample
     panies included in this study did not           for a server license.                       company	spent	35	hours	to	migrate	the	
     evaluate the higher levels of support so     The additional hardware and software           company’s 3,400 users to Sophos. This
     this cost was not a factor in the TCO.       cost was the same for the two options          same effort would have required 340 hours
2. Additional hardware and software.              (upgrading or replacing) for the sample        with Symantec or McAfee. With an annual
     For the companies interviewed the cost       company. In both cases one additional          salary of $80,000 this totaled $1,400 for
     of additional hardware and software to       virtual server was required at a cost of
     migrate to an endpoint security prod-        $8,000.
     uct was not significant. These costs
                                                  Impact for sample company:
                                                                                                      “Sophos has saved me
     include: console, messaging and updat-                                                            a lot of time with their
     ing servers as well as server licenses.      Year 1 cost is the same for the two options
                                                                                                    administration tools. The
     The cost of additional hardware and          3. Upgrade or replacement effort (inter-          deployment is easier and
     software can be significant for organiza-       nal and external professional ser-
     tions that need to manage platforms                                                            I’ve been impressed with
                                                     vices). Migrating to an endpoint security
     other than Windows (educational institu-        solution involves planning, building the
                                                                                                    the client removal tool, it
     tions) or multiple platforms as well as         infrastructure, deploying the new prod-        removes Symantec well.”
     large numbers of remote users.                  uct and post-deployment cleanup of any                   – IT Manager,
     With Sophos a single, automated                                                                        CGH Medical Center
                                                     remaining detections. Some companies
7


Sophos,	90%	less	than	the	cost	would	                                                           cost	was	$6,683,	which	was	66%	less	
have been to upgrade with the existing             “The Sophos console                          than the cost for the former vendor.
vendor.                                             provides a snapshot                       Impact for sample company:

This cost savings enabled the sample               of what’s going on at                      $13,567	annual	cost	savings

company to purchase onsite professional            a glance. Symantec is                      3. Escalation team. The companies
services from Sophos to assist the               definitely not easy to use.                    included in this study admitted they
infrastructure manager in this effort and                                                       had a false sense of security with the
                                                    We need to see at a
still resulted in a lower cost than if the                                                      installed endpoint protection vendors.
                                                      glance if there’s
company upgraded with its current vendor                                                        The first evidence of this was when
(with no professional services included).            something wrong.”                          Sophos detected issues during the
                                                     — Technical & Operations
Impact on sample company:                                                                       replacement process that the former
                                                      Security Administrator,
                                                      US Healthcare Provider                    vendor missed. A key reason for switch-
$1,600 Year 1 cost savings
                                                                                                ing to Sophos was better protection
Cost Source 2: Manage/ ongoing                   per	year	for	Sophos,	resulting	in	a	75%	       and companies have experienced a
operations                                       cost savings.                                  50%	increase	in	the	number	of	detec-
1. Infrastructure management. The key          Impact for sample company:                       tions prior to execution with Sophos.
   tasks that fall under managing endpoint                                                      Sophos detects viruses, spyware and
                                               $30,000 annual cost savings
   security are: adding new users, manag-                                                       adware, suspicious behavior and files,
                                               2. Help desk team. The help desk team
   ing policies, managing updates, manag-                                                       removable storage devices and unau-
                                                 is responsible for fielding user calls,
   ing upgrades, troubleshooting, reporting,                                                    thorized applications. Sophos definition
                                                 collecting user data and remediating
   managing multiple platforms and man-                                                         file updates are small and are released
                                                 issues. They deal with Tier 1 issues that
   aging remote users. Companies inter-                                                         as frequently as every five minutes for
                                                 have arisen before and the solutions
   viewed for this study universally agreed                                                     fast protection with low impact on net-
                                                 have been documented for the help
   that it is easier to do these tasks from                                                     work resources. Additionally, Sophos’s
                                                 desk team to follow. Interviewees have
   the Sophos management console than                                                           HIPS prevention provides detection
                                                 experienced a much smaller volume
   from Symantec or McAfee’s console.                                                           that automatically guards against new
                                                 of help desk calls related to endpoint
   The single Sophos console centralizes                                                        and emerging threats. In a 2007 study
                                                 security issues with Sophos compared
   and automates the key tasks involved                                                         conducted	by	Cascadia	Labs,	Sophos	
                                                 to Symantec and McAfee. With Sophos
   in managing endpoint security and the                                                        detected	86%	of	newer	threats	com-
                                                 the infrastructure manager has greater
   dashboard provides instant visibility of                                                     pared	to	43%	for	McAfee	and	51%	for	
                                                 central control and visibility into the
   the protection status for all Windows,                                                       Symantec. The Escalation Team deals
                                                 protection status of all users therefore
   Mac	and	Linux	users	so	that	it’s	easy	                                                       with Tier 2 and Tier 3 issues. Tier 2
                                                 potential security flaws, like out-of-date
   to identify machines that require atten-                                                     issues are ones that internal technical
                                                 anti-virus protection or a disabled fire-
   tion. If the infrastructure manager needs
                                                 wall, are addressed before they impact
   vendor support, Sophos offers unlimited
   access to in-house support experts
                                                 the user.                                      “The high volume of calls
                                                 The sample company’s help desk
   24x7x365.	                                                                                   to our IT Department with
                                                 team	was	used	to	getting	75	endpoint	
   The infrastructure manager at the                                                            McAfee was one of the key
                                                 security calls per month with one of
   sample	company	spent	5	hours	per	
                                                 the installed endpoint protection ven-         reasons why we switched
   week managing endpoint security with
                                                 dors. With Sophos that number has                     to Sophos.”
   Sophos. In comparison this would
                                                 decreased	to	25	calls	per	month.	The	                – Head of Global System
   require 20 hours per week with either
                                                                                                        & Security Solutions,
                                                 average	Tier	1	call	takes	45	minutes	to	
   Symantec or McAfee. With an annual                                                                    German Company
                                                 resolve	and	at	$25	per	hour	the	Sophos	
   salary of $80,000 this totaled $10,000
8


    experts can remediate on their own                                                           is smaller with Sophos than McAfee or
    while Tier 3 issues require vendor sup-            “The time I spent                         Symantec. As companies begin to track
    port to resolve. The breakdown of Tier          resolving spyware and                        this metric the magnitude of the cost
    2	and	Tier	3	issues	is	typically	75%	                                                        savings will likely grow.
                                                      adware issues with
    and	25%	respectively,	according	the	to	                                                      With 3,400 users and an average salary
    interviewees.
                                                   Symantec will be cut in
                                                                                                 of	$50,000	the	sample	company	saved	
    Not only does Sophos detect more              half or more with Sophos.”
                                                                                                 $1,500	a	year	since	it	did	not	experience	
    issues before they execute but it also         – IT Manager, CGH Medical Center
                                                                                                 any service interruptions with Sophos
    requires less effort to handle them.                                                         (compared to one annual interruption that
    The visibility provided by the Sophos          Sophos,	24%	less	than	the	cost	for	the	       affected 10 users for 6 hours with the
    management console enables the                 installed endpoint protection vendor.         former vendor).
    escalation team to easily find machines     Impact for sample company:
                                                                                                 The company’s 3,400 users also regained
    that need attention and in many cases       $39,725	annual	cost	savings
                                                                                                 5	minutes	per	week	in	lost	productivity	
    issues can be resolved remotely from
                                                For companies that are not large enough          with	Sophos.	The	cost	was	$10,625	with	
    the console. For Tier 3 issues, such as
                                                to have an escalation team this work is          Sophos	and	50%	less	than	the	cost	with	
    new threats that require a new definition
                                                handled by the infrastructure manager.           the installed endpoint protection vendor.
    file, Sophos’ in-house technical experts
    are	available	24x7x365	and	the	intervie-    4. End user productivity. While end user         Impact for sample company:
    wees	have	seen	a	50%	improvement	in	           productivity has not historically been        $12,125	annual	cost	saving
    response time with new definition files        measured, the companies interviewed

    with Sophos compared to Symantec               have seen an improvement with Sophos

    and McAfee.                                    in two areas: i) downtime due to infec-
                                                   tions and version upgrades, and ii) the
                                                                                                     “Right out of the gate
                                                   bandwidth reduction due to definition            Sophos was finding more
                                                   file updates and the memory required               vulnerabilities. There
    “With Sophos we’re
                                                   to run the endpoint security solution.            is the potential for less
   being proactive rather                          With the installed endpoint protection
                                                                                                    downtime at the individual
than reactive. We’re trying                        vendors companies typically experience
                                                                                                      desk. Sophos is finding
 to avoid infections so we                         one service interruption per year, which
                                                   affects 10 users for about 6 hours on              more things up front so
 don’t have to spend time
                                                   average. Companies did not have a                 there is less potential for
    cleaning them up.”
    – Network Administrator Manager,
                                                   single downtime event with Sophos due              issues at the endpoint.”
             AW Chesterton                         to its ability to catch more threats, espe-            – Network Operations
                                                   cially new and emerging threats with its                 Section Manager,
                                                                                                        Amica Mutual Life Insurance
                                                   HIPS technology.

    The number of endpoint security detec-      Sophos definition file updates are small

    tions	pre	execution	increased	50%	to	       (2K-70K)	and	frequent	(every	5	minutes)	
                                                                                                        “Sophos’s memory
    30 per week when the sample com-            so they provide more protection with less
                                                                                                      footprint and program
    pany switched to Sophos. Conversely,        impact on the end user. McAfee and
                                                Symantec updates are sent out once a day            footprint are much smaller
    the time to resolve these detections
    decreased	by	50%	to	1.5	hours	(Tier	2)	     so they are larger and expose the network               than Symantec’s.”
    and	5	hours	(Tier	3)	with	Sophos.	With	     to more potential threats. In addition to                – Network Administrator,
                                                the impact of the updates, the memory                    Central Ohio Primary Care
    an annual salary of $60,000 the total
                                                                                                                 Physicians
    escalation	team	cost	was	$129,675	with	 footprint when the program is running
9


Overall costs                                  was $1.3 million. In comparison, the         provided by the companies interviewed.
For the sample company, the present            total cost of switching to and managing      In	total	there	is	a	$504,000	cost	savings	
value of the total costs of upgrading to       Sophos Endpoint Security and Control         in switching to and managing Sophos
the endpoint security product for the          over five years was $880,000. The costs      Endpoint Security and Control.
installed endpoint protection vendors and      were calculated based on licensing,
managing the solution over five years          infrastructure and operational data




                                                                                                                     Source: Sophos




The chart below shows the extent to which      years. The labor and licensing costs were    of	the	TCO	at	3x	to	5x	the	licensing	fee	
each of the cost categories contributes to     the major costs and the Sophos costs are     for Sophos and the installed endpoint
the total costs for Sophos and the installed   2/3 of the costs for Symantec and McAfee.    protection vendors respectively.
endpoint protection vendors over five          The labor costs represent the lion’s share




                                                                                                                     Source: Sophos
10


From the Gartner Files

A Buyer’s Guide to Endpoint Protection Platforms
The traditional “point” markets for            •	 If	you	haven’t	already	instituted	a	full-      protection	technologies,	such	as	DLP	and	
antivirus (AV) tools and personal                 disk encryption program for mobile             full-disk encryption. The demand for holistic
firewalls have been eclipsed by broader           clients, then do so immediately for            NAC solutions and the management
suites of related security technologies,          notebook computers carrying sensitive          requirements of large enterprises are also
which Gartner has identified as                   data. Consider encryption from your            forcing EPP suite vendors to replicate
endpoint protection platforms                     incumbent end-node protection vendor,          some PC operations infrastructure, such
(EPPs). The choice of an EPP will                 because common management, estab-              as security configuration management,
depend heavily on enterprise-specific             lished client-side presence and suite          patching and software management. By
requirements, so chief information                pricing may make this option attractive.       combining multiple technologies into a
security officers (CISOs) and other            •	 Consider	the	need	for	data	loss	preven-        single management framework, EPPs offer
security professionals evaluating EPP             tion	(DLP)	capabilities	in	endpoint	pro-       the promise of increased security while
offerings should use Gartner’s guidance           tection. The ability to simplify client-side   simultaneously lowering complexity, cost
to identify their most-likely current and         agents with a common management                and administrative overhead.
future needs, and select the EPP that             framework is an advantage, but this
                                                                                                 1.0 Basic EPP Component
will most-effectively address them.               consideration will often be outweighed
                                                                                                 Features and Functionality
                                                  by	broader	enterprise	DLP	require-
Key Findings                                                                                     The basic components of an EPP are
                                                  ments.
•	 The	market	for	EPP	suites	is	marked	by	                                                       an anti-malware signature database
                                               •	 Resist	vendor	“packaging”	that	includes	
   a broad range of solutions, with signifi-                                                     (containing information on malicious code,
                                                  gateway protection with endpoint pro-
   cant differentiation among vendors and                                                        such as viruses, trojans and spyware),
                                                  tection. Focus on the client and server
   their offerings.                                                                              an HIPS and a personal firewall, linked
                                                  as one domain, and gateways as a
•	 No	single	vendor	leads	in	all	functional	                                                     by a common management and reporting
                                                  separate domain. Resource-constrained
   areas, so buyers need to prioritize their                                                     console. An EPP may also include full-disk
                                                  small and midsize businesses (SMBs)
   requirements to address the needs of                                                          encryption	and	DLP	tools.	Increasingly,	
                                                  may want to consider the advantages
   their specific business, technical and                                                        EPP management capabilities will
                                                  of centralized management of both
   regulatory environments.                                                                      emulate and integrate with operational
                                                  domains, but they must also place high-
                                                                                                 tools to provide security configuration
Recommendations                                   er priority on the unique requirements of
                                                                                                 management, vulnerability assessment,
•	 Make	plans	to	phase	out	point	products	        each domain.
                                                                                                 application control and remediation tools
   for AV and anti-spyware tools, host-
                                               ANALYSIS                                          for resilient infections. As data security
   based intrusion prevention systems
                                               The traditional markets for dedicated             and reimaging remediation become more
   (HIPSs) and personal firewalls, and
                                               endpoint security products — particularly         pervasive, EPP suites will begin offering
   replace them with an EPP suite as sup-
                                               AV tools and personal firewalls — have            managed backup services and tools.
   port contracts expire.
                                               been eclipsed by broader suites of related
•	 Demand	that	your	current	AV	technol-
                                               security technologies, which Gartner              2.0 Advanced EPP Component
   ogy vendor identify the HIPS techniques
                                               has	designated	as	“endpoint	protection	           Features and Functionality
   included in its base AV client and detail                                                     CISOs and other enterprise security
                                               platforms.”	An	EPP	suite	typically	includes	
   its road map. Deploy full-blown HIPS                                                          decision makers should consider advanced
                                               AV and anti-spyware tools, a personal
   capabilities for systems with high secu-                                                      component features, which are becoming
                                               firewall, and may also offer network
   rity requirements, but prepare for some                                                       available, when designing RFPs or
                                               access control (NAC) capabilities and data
   increases in administration requirements.
11


scorecards to differentiate products             boards to configurations of different           tor or help desk view), preferably with
under evaluation. No EPP will have all           elements. This is especially important          users’ ability to adjust their default
these features, and buyers must focus            because suite vendors often grow by             views.
on the specific features they consider           acquisition, and, as a result, the degree   •	 A	customizable	“toolbox”	element	that	
most important for their enterprises.            of management and reporting integra-            allows the consolidation of common
The following list isn’t intended to be          tion into a common, centralized man-            tasks into a single user-defined menu is
comprehensive, but rather representative of      agement console may vary.                       useful.
advanced functions that may compose part      •	 Granular	role-based	administration	         •	 “Globalization”	capabilities	—	including	
of a more-appropriate EPP solution.              should ideally include predefined roles         global support, centralized management

                                                 as well as the ability to customize and         and reporting, and necessary language
2.1 Manageability and Scalability                                                                support for the management interface
                                                 add/remove options.
Capabilities                                                                                     and the end-user interface — are impor-
                                              •	 The	EPP	should	offer	the	capability	to	
Reduced administration is one of the most-                                                       tant for enterprises with operations
                                                 create different management GUI work
critical concerns of EPP administrators,                                                         across multiple regions.
                                                 space views (for example, administra-
and improved manageability and greater
scalability will help reduce it and the
associated overhead. A well-designed,
task-oriented graphical user interface        Note 1
(GUI) and a comprehensive management          Examples of Common Tasks
interface will deliver lower total cost of    •	 Review	the	home	page	dashboard	and	pay	particular	attention	to	the	placement	of	
ownership (TCO). Gartner recommends              indicators	that	illustrate	negative	changes	in	the	security	posture	of	endpoints.	Look	
                                                 for direct links to more information, recommendations and action steps to resolve
that when security professionals evaluate
                                                 events.
EPPs, they should develop a list of the       •	 Tour	the	report	center,	create	a	custom	report,	and	schedule	it	for	delivery	to	an	
top 10 to 20 most-common or most-critical        e-mailbox or Web server/portal.
                                              •	 Show	alert	configuration	capability	and	integrate	an	alert	with	an	external	subscriber	
endpoint security tasks (see Note 1), and        identity module.
use this list as a guideline for comparison   •	 Show	real-time	data	that	lists	clients	on	a	network	that	doesn’t	have	an	EPP	agent	
                                                 installed.
testing and demonstration of solutions.
                                              •	 Create	or	edit	the	policy	elements	that	can	be	delegated	(or	restricted)	to	end	users.
The necessary management capabilities         •	 Create	or	edit	the	policy	for	client	update	distribution.
will depend heavily on enterprise-specific    •	 Create	or	edit	the	policy	to	automatically	push	the	EPP	client	to	an	endpoint	that	
                                                 doesn’t have it installed.
needs and available technical skills.         •	 Configure	scheduled	scans	for	endpoints.	Focus	on	the	ability	to	limit	CPU	use,	and	
The following representative list details        delegate the ability for end users to delay scan execution.
advanced EPP management capabilities as       •	 Create	or	edit	the	port	(that	is,	USB,	CD	or	infrared)	control	configuration,	and	pay	
                                                 particular attention to the granularity of the restrictions, the linkage to file types, and
well as the factors influencing them.            encryption, if any.
                                              •	 Create	or	edit	a	VPN	policy	(that	is,	deny	split	tunneling)	for	a	specific	Active	
2.1.1 Management GUI                             Directory group.
                                              •	 Create	or	edit	a	location-based	policy,	and	pay	attention	to	the	level	of	automation	in	
•	 A	task-oriented	(not	feature-based)	man-
                                                 selecting when a policy should be invoked.
   agement GUI can simplify management        •	 Create	or	edit	a	Wi-Fi-specific	policy.
   by hiding unnecessary complexity from      •	 Create	or	edit	a	whitelisting	and/or	lockdown	configuration	for	a	certain	group	of	PCs.	
                                                 Add a new executable program to the whitelist. Autogenerate a whitelist from the
   less-sophisticated users, but enable
                                                 installed applications on a PC. Authorize a software distribution method and directory
   more-technically skilled users to drill       as a whitelisted source of applications.
   down to granular details (see Note 2).     •	 Show	a	single-page	summary	of	client	configuration	information	and	print	it	for	
                                                 review.
•	 Management	pages	should	ideally	have	      •	 Review	the	HIPS	policy	configuration	and	step	through	the	false-positive	handling	
   a consistent look and feel, as well as        process, including deactivating a specific HIPS rule for a specific application.
                                              •	 Edit	role-based	administration	and	hierarchical	administration	to	add	a	new	role.
   the ability to switch over from dash-
12


                                                  endpoints may be useful, particularly for    •	 The	management	system	should	be	
Note 2
                                                  SMBs.                                           able to automatically detect new or
Task-Based System                              •	 The	ratio	of	management	servers	to	             rogue endpoints that don’t have an EPP
A task-based system can be evaluated              clients is an important consideration           client installed. This is a function that
by creating a list of common tasks and            for large enterprises, and one that will        may be integrated into the enterprise’s
comparing the number of steps required to         impact the TCO. For smaller business-           NAC system, but shouldn’t be depen-
complete each task.                               es, the management server should work           dent on NAC, and should be able to
                                                  on a shared server.                             detect clients that have already joined
                                                                                                  the domain.
•	 EPP	vendors	are	gradually	adding	PC	        2.1.3 Reporting and Dashboards
   life cycle tools (such as asset discovery, •	 Buyers	should	look	for	a	real-time	home	      2.1.4 Policy Management
   configuration management, vulnerability        page dashboard that enables rapid            •	 A	“wizard	type”	installation	mecha-
   assessment and software management)            troubleshooting of security events or           nism with optimal default settings for
   as a way to inoculate PCs against              server issues — ideally with actionable         different-size environments can reduce
   unknown threats that target known              dashboard elements that make it pos-            deployment complexity.
   vulnerabilities. Buyers should evaluate        sible to click on an event or graph and      •	 A	single-page	policy	with	intelligent	
   their needs with regard to the integra-        initiate steps that enable better under-        drop-down	“pick	lists”	and	fields	that	
   tion of these tools and consider the           standing of the issues involved and the         change based on previous optional
   strategic direction of prospective EPP         steps required for alert resolution.            selections (without multiple pop-up win-
   vendors.                                    •	 Threshold	alerting	capabilities	may	use	        dows or the need to visit several tabs
                                                  delivery mechanisms such as e-mail,             to create a single policy) make policy
2.1.2 Scalability
                                                  Short Message Service (SMS) and                 development easier and more intuitive.
•	 Centralized	management	with	automatic	
                                                  Simple Network Management Protocol           •	 There	should	be	an	option	to	view	or	
   configuration and policy synchronization
                                                  (SNMP), with threshold alerts for dash-         print a human-readable policy sum-
   among management servers may be
                                                  board statistics and policy thresholds.         mary that greatly simplifies auditing and
   particularly useful in large deployments.
                                               •	 The	appropriate	range	of	client	informa-        troubleshooting.
•	 Native	management-server	redun-
                                                  tion that can be collected and reported      •	 A	complete	audit	log	of	policy	changes	
   dancy — for example, using load bal-
                                                  to the management server is grow-               is essential, especially for organiza-
   ancing active/active clustering within
                                                  ing in importance as a differentiator.          tions that take advantage of extensive
   and	across	LANs,	or	automatic	active/
                                                  Most EPP suites collect information             role-based administration and delegated
   standby failover without a single point
                                                  only about the status of the EPP suite.         end-user administration to ensure audit
   of failure, such as a designated master/
                                                  However, as endpoint hygiene becomes            compliance.
   slave — can be a useful differentiator.
                                                  more critical, information about the         •	 The	ability	to	stage	signatures	or	poli-
•	 EPPs	should	include	multiple	directory	
                                                  status of patch levels, configurations,         cies and to quickly roll back changes is
   integration options — including Active
                                                  software inventories and vulnerabilities        increasingly important because fewer
   Directory	and	Lightweight	Directory	
                                                  is becoming more important.                     enterprises are testing signatures before
   Access	Protocol	(LDAP)	—	as	well	
                                               •	 The	management	server	should	be	                deploying them.
   as the ability to integrate with multiple
                                                  capable of collecting client status infor-   •	 The	EPP	suite	policy	must	allow	off-
   directories and traverse directories to
                                                  mation in real time, rather than in sched-      LAN	clients	to	automatically	update	from	
   find user groups and authentication
                                                  uled delta updates. The ability to collect      the EPP vendor’s primary database for
   information.
                                                  information from mobile endpoints that          signature and HIPS updates, when the
•	 A	software-as-a-service-	(SaaS-)	based	
                                                  aren’t connected to the network hosting         enterprise server is unreachable or oth-
   managed console that eliminates the
                                                  the management server can be a signifi-         erwise unavailable.
   need for a dedicated server to manage
                                                  cant competitive differentiator.
13


•	 A	configuration	backup	utility	and	con-           should seek clarity on what’s actually          Retrospective testing (that is, testing old
   figuration preservation between version           supported and what back-end process-            signature databases against new vari-
   upgrades can save administration time             es have been changed. It’s important            ants of old malware) is the best way to
   and resources.                                    to ensure that the vendor’s support per-        evaluate this capability.
                                                     sonnel are properly trained, that its labs   •	 Ideally,	EPP	solutions	should	provide	
2.1.5 Client Agents
                                                     are appropriately configured and that           much-faster identification and rapid dis-
•	 The	number	of	required	clients	and	the	
                                                     its software products are certified for         tribution of signatures for new threats.
   client disk and memory footprint are
                                                     virtualization. Most host-based software        However, this is a difficult benchmark
   good indicators of the level of integra-
                                                     provides no protection for the hypervi-         to test. Some solutions will have slower
   tion among EPP components and the
                                                     sor layer.                                      signature distribution for a new threat,
   efficiency of the client. Ideal solutions
                                                                                                     because their generic signatures or
   will provide a single consolidated agent       2.2 Malware Detection
                                                                                                     HIPS rules are already effective in
   with component parts that can be               Capabilities
                                                                                                     blocking that threat.
   remotely enabled and disabled.                 The quality of the malware scan engine
                                                                                                  •	 Signature	databases	should	include	all	
•	 The	ability	to	natively	distribute	the	full	   —	the	“anchor”	solution	of	an	EPP	suite	
                                                                                                     types of malware (including spyware,
   client agent and remove competing              — should be a major consideration in
                                                                                                     adware, viruses, trojans, keystroke log-
   products is a useful differentiator. Some      any RFP. The following are some of the
                                                                                                     gers, droppers, back doors and hacking
   solutions simply provide a multisourcing       advanced malware-oriented features of
                                                                                                     tools) in a single database, with a single
   service integrator (MSI) file (Windows         EPPs that buyers should be looking for:
                                                                                                     update mechanism and a single scan
   Installer package) for use by other soft-
                                                  •	 Most	enterprises’	IT	security	
                                                                                                     engine agent.
   ware distribution tools, while other solu-
                                                     organizations’ capability to accurately
                                                                                                  •	 The	capability	to	detect	rootkits	and	
   tions won’t remove other AV products,
                                                     test malware engines in real-world
                                                                                                     other forms of low-level malware, once
   which can create conflicts.
                                                     situations is limited, at best. Test
                                                                                                     they’re resident in enterprise systems,
•	 The	client	interface	should	be	adaptable	
                                                     results from organizations such as
                                                                                                     is a significant consideration. Some
   to allow for a full range of delegated
                                                     AV-Comparatives.org and AV-Test.org
                                                                                                     solutions’ functionality is limited to
   end-user control. Advanced solutions
                                                     are useful guides of scanning accuracy
                                                                                                     catching rootkits as they install, while
   enable administrators to delegate or
                                                     (including false positives) and scanning
                                                                                                     others have the ability to inspect raw
   restrict any client option.
                                                     speeds. In the absence of other infor-
                                                                                                     PC resources and compare them to
•	 Scheduled	scans	are	one	of	the	most-
                                                     mation, good test scores are better than
                                                                                                     Windows file tables, seeking discrepan-
   problematic aspects of signature-based
                                                     poor test scores, but buyers should be
                                                                                                     cies that will indicate the presence of
   anti-malware tools. Options that limit the
                                                     aware that these tests don’t accurately
                                                                                                     rootkits.
   client impact of scheduled scans are a
                                                     reflect how users encounter malware
                                                                                                  •	 Malware	engines	should	continuously	
   significant EPP differentiator. Advanced
                                                     in the real world. Moreover, they don’t
                                                                                                     monitor system resources (for example,
   features include the ability to delay
                                                     test all proactive techniques for blocking
                                                                                                     host file, registry, Internet Explorer set-
   scans based on battery life, running
                                                     malware, such as HIPS, vulnerability
                                                                                                     tings and dynamic-link-library changes)
   process or CPU usage. More rare is the
                                                     detection and configuration manage-
                                                                                                     for changes that might indicate the pres-
   ability	to	“wake	and	scan”	PCs	during	
                                                     ment. Buyers should be very wary of
                                                                                                     ence of suspicious code:
   off-hours. Scheduled memory scans
                                                     vendor-sponsored tests and not put too
                                                                                                     •	   Malware	removal	features	and	
   should be independent of disk scans.
                                                     much weight on specific test results.
                                                                                                          outbreak filters to stop propagation
•	 Specific	features	and	licensing	for	virtu-
                                                  •	 Signatures	should	be	as	broad	as	pos-
                                                                                                          are important differentiators among
   alized environments, such as VMware,
                                                     sible so they can detect new variants
                                                                                                          vendors and their offerings. These
   Citrix and Hyper-V, remain rare, but are
                                                     of old threats without new signatures,
                                                                                                          capabilities should be understood
   increasing in importance. EPP buyers
                                                     and, thus, avoid causing false positives.
                                                                                                          and tested, because modern mal-
14


       ware is significantly more complex         and to configure protection to reflect the      to	“buy	time”	to	propagate	patches	to	all	
       than that of previous generations,         enterprise’s overall tolerance for risk         endpoints.
       and often involves multiple compo-         and administrative overhead.                 •	 The	simulation	of	unknown	code	before	
       nents	with	sophisticated	“keep	alive”	 •	 Despite	the	need	for	fine-tuning	capa-           the code is executed to determine mali-
       routines.                                  bilities, the best solutions will provide       cious intent, without requiring end-user
•	 EPP	solutions	should	include	client-           preconfigured	“out	of	the	box”	templates	       interaction with the unknown code (for
   based	URL	filtering	to	block	clients	          for common application and system               example, using static analysis, simula-
   from visiting Web sites that are known         configurations, as well as a learning           tion or reverse compilation techniques)
   security risks, because malware is             mode for enterprise environments and            is another deterministic technique, but
   increasingly shifting to Web distribution      the ability to test policy in a log-only        it can be highly resource-intensive and
   methods.                                       mode.                                           should be used selectively.
                                               •	 HIPS	techniques	have	no	standard	            •	 Buffer	overflow	memory	protection	is	
2.3 Advanced HIPS Capabilities
                                                  terminology; therefore, it’s essential          common, and should address heap-
AV/anti-spyware	databases	are	90%	to	
                                                  that buyers ask vendors to list and             and-stack memory.
99%	effective	at	detecting	well-known,	
                                                  describe the HIPS techniques in detail,      •	 Application	control	capabilities	(for	
widely	circulated	threats,	but	only	20%	
                                                  so that buyers can create a standard-           example, application whitelisting, also
to	50%	are	effective	at	detecting	new	or	
                                                  ized list of techniques and compare             known as lockdown) are gaining signifi-
low-volume threats. Security effectiveness
                                                  their breadth and depth across vendors.         cant interest as the volume of malware
is significantly enhanced by HIPS, but
                                                  Buyers should also understand which             begins	to	surpass	the	volume	of	“good”	
there’s no generally accepted method of
                                                  techniques are included in the base cli-        corporate applications. There is signifi-
testing the HIPS effectiveness of different
                                                  ent, which are optional, and what other         cant R&D in this area, and this capabil-
solutions.
                                                  charges, if any, are required for addi-         ity will be an important differentiator in
EPP buyers should take the time to
                                                  tional protection styles.                       the future. Application control features
understand how many and which of the
                                               •	 Some	vendors	offer	only	binary	control	         that EPP buyers should investigate
nine HIPS protection styles are included in
                                                  over HIPS, which allows administra-             include:
the base malware signature engine that’s
                                                  tors to turn them on or off. Enterprise         •	   How	applications	are	identified	and	
used to detect and block unknown threats
                                                  IT organizations are unlikely to concern             prevented from executing (for exam-
(zero-day or targeted threats), and which
                                                  themselves with every setting in detail,             ple, do they block the installation of
are additional HIPS capabilities that can
                                                  but it’s important to have granular con-             applications or only the execution?)
often increase the administration burden
                                                  trol that makes it possible to turn off              is an important differentiator.
due to management of false positives.
                                                  certain rules for specific applications to      •	   The	mechanisms	available	for	cre-
For these reasons, Gartner recommends
                                                  accommodate false positives.                         ating a whitelist will be critical to
focusing on ease-of-management
                                               •	 One	very	effective	HIP	technique	is	                 lower the administration overhead.
functions, which make HIPS adaptable
                                                  “vulnerability	shielding”	—	the	ability	             Administrators should, for example,
enough for the enterprise network:
                                                  to inspect and drop attacks based on                 be able to automatically autho-
•	 The	HIPS	solution	must,	as	a	core	             knowledge of the specific vulnerabili-               rize applications that are properly
   principle, enable the administrator to         ties they exploit. This technique allows             signed, or come from trusted loca-
   choose and tune the styles of protection       protection against attacks and against               tions, processes or installers.
   that are needed, based on the require-         known vulnerabilities before the vendor         •	   Solutions	should	ideally	provide	
   ments and resources of the endpoint,           releases a patch, and makes it possible              signatures of known-good applica-
15


        tions as a service, similar to current      based on connection type — different        an encryption component of an EPP suite:
        malware databases.                          network interface cards (NICs) or dif-      •	 EPP	solutions	should	provide	the	ability	
   •	   Application	control	should	extend	          ferent networks — as well as the ability       to create policies to control the broadest
        to the execution of browser helper          to dynamically apply policies based on         range of devices and device formats —
        objects/controls within the context of      network location — for example, Wi-Fi          for example, CD, DVD, USB, Bluetooth,
        Internet Explorer and other browsers.       policy,	on-corporate-LAN	policy	and	           3G and general packet radio services
                                                    public Internet policy.
2.4 Personal Firewall Capabilities                                                                 — with policies defined, at minimum, by
                                                 •	 The	integration	of	a	client	(IPsec)	VPN	       device class.
Basic personal firewall functionality
                                                    is useful for enforcing remote access       •	 The	level	of	granularity	that	makes	it	
(inbound port defenses) are available in the
                                                    policies. Ideally, EPP solutions should        possible to distinguish among device
Windows XP Professional, Windows 2003
                                                    allow unfettered Internet authentication,      classes (for example, a mouse from a
and Windows Vista operating systems. The
                                                    and then enforce VPN startup to direct         data storage device), and potentially
Vista firewall has bidirectional capabilities,
                                                    remote	access	traffic	back	to	the	LAN.         to distinguish specific devices by serial
although outbound is turned off by default
                                                 •	 The	ability	to	enforce	a	“one	active	NIC	      number or manufacturer, is a worth-
and activation requires significant setup.
                                                    at	a	time”	policy	to	block	network	bridg-      while differentiator.
The Windows firewall is adequate for most
                                                    ing is a useful feature, and options that   •	 Policies	will	ideally	be	file-type-aware	
desktop PCs that also have the benefits
                                                    allow the disabling of inactive NICs are       so that they can allow or restrict access
of network firewalls and network-based
                                                    ideal.                                         based on file type and action (for
intrusion prevention. However, notebook
                                                 •	 Application	profiles	that	define	normal	       example,	allowing	“read	only”	access	
computers and PCs with higher security
                                                    application behavior, and can restrict         or allowing only document file types),
requirements require more-comprehensive,
                                                    network access for applications that           and so that they can restrict application
two-way protection that adapts to multiple
                                                    aren’t approved or are potentially com-        execution (for example, blocking auto-
network contexts. Personal firewalls are
                                                    promised, are useful application control       execute or all execution from a data
differentiated by the flexibility of their
                                                    features.                                      drive).
policies (for example, an autosensing
                                                 •	 A	firewall	must	have	the	ability	to	        •	 EPP	offerings,	when	combined	with	
location-based policy), the breadth of their
                                                    block malicious attacks and end users          encryption solutions, often allow policies
application profile policies (for example,
                                                    attempting to disable the firewall.            to force encryption — for example, with
the ability to prevent applications from
                                                 •	 Log	data	—	especially	related	to	secu-         “allow	write	but	encrypt”	and	“password-
exhibiting unusual network behaviors), the
                                                    rity incidents — should be extensive,          protect files written to USB or CD stor-
virtual private network (VPN) integration
                                                    searchable and accessible via the report       age”	provisions.
and the range of ports (for example,
                                                    engine to enable forensic investigation.    •	 To	minimize	help-desk	interaction,	it’s	
Universal Serial Bus [USB], FireWire,
infrared, Wi-Fi and Bluetooth) they can          2.5 Port Control                                  useful	to	enable	remote	workers	to	“self	
protect:                                         Enterprises are increasingly concerned            authorize”	device	usage,	and	to	allow	
                                                 about USB ports as a channel for                  privileged end users to use devices, but
•	 The	ability	to	manage	the	Windows	fire-
                                                 accidental or malicious data loss, or as          warning them that it’s against policy and
   wall and a more-advanced personal fire-
                                                 an access point for malware, such as the          that they should log their usage. At a
   wall in the same management console
                                                 recent Conflicker worm. For this reason,          minimum, EPP solutions should allow
   is a distinct advantage, because some
                                                 granular port control is becoming a               remote help desk activation of ports for
   enterprises will adopt the Windows fire-
                                                 common feature of the personal firewall or        users with administrator passwords.
   wall	for	on-LAN	PCs.
                                                                                                •	 Advanced	solutions	will	also	include	
•	 EPP	solutions	should	offer	the	abil-
   ity to create different firewall policies
16


   options for protecting data by blocking         information can be moved to the top of       •	 EPP	offerings	should	include	the	ability	to	
   the	“cut/copy/paste,”	“print	screen”	and	       the page. Display options (for example,         import or export data and alerts with secu-
   “print”	commands.                               pie charts, bar charts and tables) should       rity information and event management
                                                   also be configurable so that information        systems, or other reporting systems.
2.6 Reporting Capabilities
                                                   can be displayed in the format that spe-     •	 The	reporting	engine	should	have	the	
Reporting capabilities are a significant
                                                   cific administrators need.                      capability to run on-box for smaller solu-
differentiator for EPP offerings, and
                                                •	 Reports	and	dashboards	should	include	          tions, or move to a centralized reporting
can make a significant difference in the
                                                   trending information against customiz-          server for consolidation and storage of
administration overhead that’s associated
                                                   able parameters. For example, it should         multiple management servers’ log infor-
with	them.	Buyers	should	consider	“point	
                                                   be possible to create a dashboard view          mation, without changing the look and
in	time”	reporting,	as	well	as	“real	time”	
                                                   or a report that shows percentage com-          feel of the reports.
dashboard capabilities:
                                                   pliance against a specific configuration     •	 The	reporting	engine	should	also	have	
•	 The	dashboard	should	provide	a	real-
                                                   policy over time.                               the capability to create custom reports
   time graphical and table-based view of
                                                •	 Dashboards	should	be	configurable	for	          (in	the	HTML,	XML	comma-separated	
   system events, including system infor-
                                                   different roles so that each administra-        value and PDF output types), save
   mation, version information and action-
                                                   tor can create a role-specific view.            them and schedule them for distribution
   able alerts.
                                                •	 Information	should	be	aggregated,	and	          via e-mail or FTP, or by moving them to
•	 EPP	solutions	will	ideally	provide	holis-
                                                   should also allow single-management             the network directory.
   tic security information about the current
                                                   server,	cluster,	LAN,	geographical	          •	 The	database	must	enable	rapid	report	
   security status of endpoints, not simply
                                                   or global views in the same window,             queries and the ability to preserve his-
   the status of the EPP components. This
                                                   depending on administrator options and          torical data for long-term storage in a
   may, for example, include information
                                                   role limitations.                               standard format.
   about vulnerabilities, compliance viola-
                                                •	 Dashboard	information	should	always	         •	 Reporting	functionality	should	include	
   tions and unpatched machines, for man-
                                                   allow administrators to drill down to the       active filtering to narrow the results in
   aged and unmanaged machines on the
                                                   necessary level of detail with one click,       longer reports so that specific events
   network.
                                                   instead of forcing them to switch to the        can be identified.
•	 Dashboards	that	offer	Really	Simple	
                                                   reporting application, manually select       •	 Reporting	engines	should	facilitate	the	
   Syndication (RSS) feeds with relevant
                                                   the appropriate report and re-create the        creation of completely ad hoc reports,
   external news — for example, concern-
                                                   parameters that include the condition           similar	to	SQL	queries,	rather	than	just	
   ing global malware activities and vulner-
                                                   they want to investigate.                       modify the parameters of predeveloped
   abilities — are desirable. External trend-
                                                •	 Dashboards	should	also	offer	quick	             reports.
   ing information allows administrators to
                                                   links to remediation actions (for exam-      •	 Multiple	chart	types	(such	as	pie	charts	
   better understand internal activity levels
                                                   ple, clean quarantine, patching and soft-       and bar charts) should be supported, as
   and compare them to global events.
                                                   ware distribution), as well as quick links      well as summary data.
•	 The	dashboard	should	be	administrator-
                                                   to malware encyclopedia information to       •	 Summary	reports	should	include	active	
   configurable so that the most-relevant
                                                   resolve alerts.                                 links that allow drill-down into detailed
                                                                                                   reports, as well as back-navigation that
                                                                                                   makes it easy to return to the top-level
                                                                                                   view.
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms

Weitere ähnliche Inhalte

Was ist angesagt?

Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology ChallengesInfinity Technologies
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Alexander Decker
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsBooz Allen Hamilton
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 

Was ist angesagt? (18)

The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Perimeter Security is Failing
Perimeter Security is FailingPerimeter Security is Failing
Perimeter Security is Failing
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 

Ähnlich wie Buyers Guide to Endpoint Protection Platforms

dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...Black Duck by Synopsys
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxmeghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldforumdavignon
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecurePouria Ghatrenabi
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Information Security Awareness Group
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIOBulletin1
 

Ähnlich wie Buyers Guide to Endpoint Protection Platforms (20)

dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital world
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Security as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-SecureSecurity as as Service: Case Study of F-Secure
Security as as Service: Case Study of F-Secure
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
CIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security CompaniesCIO Bulletin - 10 Best Cyber Security Companies
CIO Bulletin - 10 Best Cyber Security Companies
 

Mehr von FindWhitePapers

VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...FindWhitePapers
 
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...FindWhitePapers
 
Geolocation and Application Delivery
Geolocation and Application DeliveryGeolocation and Application Delivery
Geolocation and Application DeliveryFindWhitePapers
 
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksFindWhitePapers
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...FindWhitePapers
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsFindWhitePapers
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceFindWhitePapers
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementFindWhitePapers
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseFindWhitePapers
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsFindWhitePapers
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesFindWhitePapers
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...FindWhitePapers
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...FindWhitePapers
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachFindWhitePapers
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchFindWhitePapers
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...FindWhitePapers
 
Asset Visibility: Seeing the Opportunity in Asset Management
Asset Visibility: Seeing the Opportunity in Asset ManagementAsset Visibility: Seeing the Opportunity in Asset Management
Asset Visibility: Seeing the Opportunity in Asset ManagementFindWhitePapers
 
All Information, All People, One Platform What's New in SAP BusinessObjects X...
All Information, All People, One Platform What's New in SAP BusinessObjects X...All Information, All People, One Platform What's New in SAP BusinessObjects X...
All Information, All People, One Platform What's New in SAP BusinessObjects X...FindWhitePapers
 
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...FindWhitePapers
 
A Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessA Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessFindWhitePapers
 

Mehr von FindWhitePapers (20)

VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
 
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
 
Geolocation and Application Delivery
Geolocation and Application DeliveryGeolocation and Application Delivery
Geolocation and Application Delivery
 
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS AttacksDNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business Intelligence
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk Management
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean Enterprise
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing Operations
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and Opportunities
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step Approach
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor Research
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
 
Asset Visibility: Seeing the Opportunity in Asset Management
Asset Visibility: Seeing the Opportunity in Asset ManagementAsset Visibility: Seeing the Opportunity in Asset Management
Asset Visibility: Seeing the Opportunity in Asset Management
 
All Information, All People, One Platform What's New in SAP BusinessObjects X...
All Information, All People, One Platform What's New in SAP BusinessObjects X...All Information, All People, One Platform What's New in SAP BusinessObjects X...
All Information, All People, One Platform What's New in SAP BusinessObjects X...
 
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
Advancing Return on Investment Analysis for Government IT: A Public Value Fra...
 
A Roadmap to Data Migration Success
A Roadmap to Data Migration SuccessA Roadmap to Data Migration Success
A Roadmap to Data Migration Success
 

Kürzlich hochgeladen

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 

Kürzlich hochgeladen (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Buyers Guide to Endpoint Protection Platforms

  • 1. Featuring: A Buyer’s Guide to Endpoint Protection Platforms In This Issue: The evolution of endpoint security Examine the formula Welcome to this complimentary copy of Gartner’s Buyers that fuels success in the Guide to Endpoint Protection Platforms. This newsletter competitive security and data explores how the traditional methods for endpoint protection market. . . . . . . . 2 security should evolve. You’ll learn how Sophos’s recent integration of Utimaco affects the highly Explore life without competitive security and data protection market. You’ll find out how the lack of data protection comprehensive can affect your bottom line, and lastly, gain insight into the true costs involved in migrating and data protection . . . . . . . . . . 3 managing an endpoint security product. Understand the Traditional markets for dedicated endpoint security products — particularly anti-virus tools and total cost of ownership for personal firewalls — have been, according the report, eclipsed by endpoint protection platforms. endpoint security solutions: Sophos now offers a unique solution, Sophos Endpoint Security and Data Protection, which A TCO white paper . . . . . . 4 provides simplified cross-platform security, centralized management, full-disk encryption and control of devices, applications and network access. From the Gartner Files A Buyer’s Guide to Endpoint We invite you to learn more about simply securing your business at every level, and how to reduce Protection Platforms . . . 10 the risks associated with non-compliant, unmanaged and unauthorized computers. Visit www.sophos.com for more information. Featuring research from
  • 2. 2 Examine the formula that fuels success in the competitive security and data protection market Sophos CEO in the spotlight with SearchSecurity.com Sophos CEO Steve Munford recently sat With the increase external and internal down with SearchSecurity.com’s Senior threats, limited IT staff, tighter budgets, Sophos offers proven proactive Technology Editor, Neil Roiter to discuss and mounting industry and government Genotype protection backed by the formula behind Sophos’s success compliance and regulatory mandates, it’s SophosLabs™ expertise and our in the competitive security and data clear that businesses today are facing HIPs technology. Here’s a snapshot of protection market, and what the future more security challenges than ever before. what they have discovered in the past holds for the company. six months: However with the latest encryption In this interview, Munford explained how offerings post Utimaco acquisition, Sophos • 23,500 new infected webpages are Sophos is aggressively taking market share customers can further achieve regulatory discovered every day. That’s one away from Symantec and McAfee, and and compliance mandates while getting every 3.6 seconds, four times worse examined how — even in the economic more value for their budget. than the same period in 2007. downturn — Sophos continues to experience • 40,000 new suspicious files are year-over-year growth and its channel Listen to the Newsmaker every day. podcast with Sophos • 15 new bogus anti-virus vendor web- partners are achieving double-digit growth. CEO Steve Munford. sites are discovered every day. This number has tripled, up from an average of five detected per day, during 2008. • 89.7% of all business email is spam. • Approximately 6,500 new spam-related websites are discovered every day — accounting for one new website every 13 seconds, 24 hours a day. This fig- ure is almost double the same period in 2008. Source: Sophos mid-year threat report
  • 3. 3 Explore life without comprehensive data protection Hear from those that have Sophos Endpoint Security and Data 109,000 pension holders at risk. The gotten more with Sophos Protection defends against data loss laptop contained names, addresses, “Selecting Sophos Endpoint Security through full disk encryption and information dates of birth, National Insurance num- & Control just made sense as we were security encryption for removable storage bers, employer names, salary details able to meet all of our needs and top devices and portable media. Learn why and bank account information. security solution. Prior to Sophos, we were using a separate anti-adware this is important, how data loss can affect • June 530,000 Virginia patients were solution along with a security solution your bottom line — and more importantly individually notified that their Social to stop viruses and spyware. This approach worked, but by consolidating — what businesses can do to stop it: Security Numbers had potentially been into one solution, we improved the Data leakage remains a top concern in exposed after a hacker gained access efficiency of the workstation and to the Virginia Prescription Monitoring manageability for the administrators, 2009, with scandals continuing to dominate therefore lowering our TCO.” the headlines. Many corporations and Program 14. – Pramesh Naik, enterprise support • June Authorities arrested a former manager at Kilpatrick Stockton government institutions have failed to protect their confidential information — Goldman Sachs employee who upload- “From the Sophos console, you including the identities of their workforce, ed the company’s secret source code to manage every aspect of security as an FTP server based in Germany. well as endpoint control. Any malware customers and general public. detected shows an alert so you know It is not only the threat of negative publicity Encryption which computer needs attention and The most important step in stopping data what to do. In many cases, you can that is driving interest in data protection, but do it from within the console, and also concern that the organization is failing to leakage is to encrypt sensitive information, if not, you know immediately which comply with regulatory security standards. laptops and removable storage devices. machine to go to. During normal operation, the Anti-virus and Anti- If data is encrypted with a password, it A variety of techniques are being used by spyware is updated hourly — that’s cannot be deciphered or used unless right, hourly. In the event of an corporations around the world to prevent the password is known. This means that outbreak somewhere in the world, it data loss in a mobile connected world. These will update even more often.” even if all other security measures fail – Dave Coe, Independent Security include anti-virus software, encryption and to prevent a hacker from accessing your Specialist, Longmont Toyota firewalls, access control, written policies and most sensitive data, he or she will not be improved employee training. “The Sophos endpoint solution able to read it and so compromise the simplified management for Ferrellgas, Nevertheless, users are routinely using confidentiality of your information. enabling threats to be monitored at and sharing data without giving enough the desktop level. Technicians can The second step is controlling how users automatically deploy and manage the thought to confidentiality and regulatory treat information. You want to stop any assessment, control and protection requirements. This has led to numerous from one console. This has enabled risky behavior, such as transferring incidents of data loss in the first six us to be proactive in confronting unencrypted information onto USB sticks issues, which in turn has increased months of 2009 — some accidental, some and via email. Organizations should extend end-user confidence in our abilities.” malicious: – Greenwood Leflore Hospital their anti-malware infrastructure in order to: • May Hackers broke into a Virginia gov- • Protect data in motion and data in use “Sophos has an intimate ernment website, stealing the details of • Guarantee efficient operations understanding of the complexity of the almost 8.3 million patients, and threaten- university environment and the need • Ensure that they meet regulatory ing to auction them to the highest bidder. to manage multiple threats through an requirements integrated solution, while allowing a • May The theft of a single laptop in high degree of user control.” the UK put the personal identities of Source: Sophos mid-year threat report – University of British Columbia
  • 4. 4 Understand the total cost of ownership for endpoint security solutions A TCO white paper Executive summary before switching to Sophos Endpoint The results show that the value of Organizations considering moving to an Security and Control. Real data from switching to and managing endpoint endpoint security solution often assume customers’ experiences was collected to security with Sophos is immediate and that the costs of switching from their compare the true and complete costs of significant. The overall TCO costs of current anti-virus vendor will be greater switching to and managing with Sophos switching to Sophos are actually less than upgrading with that vendor. To shed versus upgrading and managing with the than upgrading with the existing vendor. some light on this issue, Sophos, a leading current vendor. Moreover, there are no net new cost endpoint security vendor, commissioned areas in switching to Sophos that would Companies interviewed in depth, and an independent research study to uncover not be still be incurred in upgrading with whose costs were analyzed, included: and quantify all of the cost areas involved the existing vendor. A sample company • Amica Mutual Life Insurance in migrating (upgrading or replacing) to an with 3,400 users can save $110,000 in • Lincoln Public Schools endpoint security product and managing Year one and a total of $504,000 over • AW Chesterton the solution to gain a total cost of five years by switching to Sophos. The • British Services Company ownership (TCO) comparison between the chart below shows the present value of • Central Ohio Primary Care Physicians leaders in the field. the total costs for Symantec and McAfee • US Healthcare Provider (collectively referred to as the installed The nine companies interviewed for • CGH Medical Center endpoint protection vendors in this study) this study had previously been running • German Company and Sophos over five years. Symantec’s or McAfee’s anti-virus product • Escambia County School District
  • 5. 5 Key sources of cost Cost Example The cost savings of switching to the COST AREA SPECIFIC COSTS Sophos Endpoint Security and Control Upgrade or replace • Licensing solution rather than upgrading with an • Additional Hardware and Software installed endpoint protection vendor • Upgrade or replacement effort (specifically Symantec Endpoint Protection and McAfee Total Protection for Enterprise) Manage / Ongoing operations • Infrastructure management are clear and compelling. Based on • Help desk team interviews with technical decision-makers • Escalation team and influencers at a number of corporate • End user productivity and public sector organizations in the US and Europe, the cost savings fall into two These costs will be fully explained and In addition, the sample company required main categories: supported in the next section. an extra physical server for both scenarios • Upgrade or replace (Year 1 costs) (upgrading with the current vendor and The following TCO example illustrates • Manage/ Ongoing operations (Annual switching to Sophos). No other extra the potential cost savings of switching to costs) hardware (physical or virtual servers) or Sophos Endpoint Security and Control for These two cost areas can be further software (server licenses) was needed for a sample corporation with 3,400 users and broken down into a set of specific costs. migration. the expected operational statistics post upgrade for one of the installed endpoint Cost source 1: Upgrade or protection vendors: replace TCO Example 1. Licensing (software and technical Cost Element Sample Company support). Interviewees consistently Time to manage endpoint security 20 hours per week cited licensing costs as the key rea- son why they switched to Sophos Help Desk calls related to endpoint security 75 calls per month Endpoint Security and Control rather (Tier 1 issues) than upgrading to Symantec Endpoint # of endpoint security detections (spyware, 20 detections per week Protection or McAfee Total Protection adware, viruses, etc.) prior to execution for Enterprise. However, licensing typi- Time to remediate Tier 2 issues 3 hours per week cally only represents 20% of the TCO Time to remediate Tier 3 issues 10 hours per week # of annual service interruptions due to 1 interruption per year “McAfee proved to be endpoint security issues more expensive from # of users affected per interruption 10 users the point of view that it Hours of downtime per interruption 6 hours charged for every module. Lost productivity due to downtime and 15 minutes per user per week When we reviewed Sophos bandwidth reduction it was all part of one purchase and the price Tier 1 issues have arisen before and the solutions have been documented for the help desk team to follow. was less than for McAfee.” Tier 2 issues are common threats that can be handled by internal technical staff. – Technical Services Manager, Tier 3 issues are new threats that require vendor support to remediate. British Services Company
  • 6. 6 (the labor costs were 3X to 4X more rely solely on their infrastructure manag- significant). The Sophos license price “Sophos was the only er to do this work while others purchase was lower even for customers who professional services contracts with the solution that didn’t care were comparing it against the upgrade vendor to alleviate the workload on the if clients are Macs price for their current vendor (no new infrastructure manager. Interviewees licenses). Customers also mentioned or PCs — it was the only described upgrading to an endpoint that the pricing was more straightfor- cross platform solution security product with Symantec as a ward with Sophos because it included at the time.” daunting task. This was primarily due all six endpoint security components – Director of Technology, to the difficulty in removing all of the (anti-malware, HIPS, application control, Lincoln Public Schools old versions of the product, which is device control, client firewall and basic required before installing an endpoint network access control) in one price security solution. management console centrally deploys whereas the installed endpoint protec- Customers found replacement easier than and manages endpoint security for tion vendors charged separately for sev- upgrading because of the effectiveness of Windows, Mac and Linux whereas the eral of these security components. Sophos’ client removal tool and the ability installed endpoint protection vendors For the sample corporation with 3,400 to deploy the solution automatically from either require multiple consoles or do users, a three-year deal with Sophos a single console. Companies interviewed not support these platforms. The com- cost $117,300, 10% less than the cost estimated that it would take 1 hour to panies interviewed for this study did of upgrading with the current vendor. upgrade 10 endpoints with Symantec and not meet these criteria so the additional McAfee. For medium to large enterprises Impact for sample company: hardware and software costs were not with 2,000 to 20,000 users that adds $12,648 Year 1 cost savings significant whether upgrading with the 200 to 2,000 hours to the Infrastructure Standard technical support is included current vendor or switching to Sophos. Manager’s workload. On the Sophos side, in the license price and there is an addi- To calculate these costs in the model the replacement process takes 35 hours tional charge for a higher level of sup- the following industry averages were regardless of the number of users. port for both Sophos and the installed used: $8,000 for a physical server, endpoint protection vendors. The com- $2,000 for a virtual server and $1,000 The infrastructure manager at the sample panies included in this study did not for a server license. company spent 35 hours to migrate the evaluate the higher levels of support so The additional hardware and software company’s 3,400 users to Sophos. This this cost was not a factor in the TCO. cost was the same for the two options same effort would have required 340 hours 2. Additional hardware and software. (upgrading or replacing) for the sample with Symantec or McAfee. With an annual For the companies interviewed the cost company. In both cases one additional salary of $80,000 this totaled $1,400 for of additional hardware and software to virtual server was required at a cost of migrate to an endpoint security prod- $8,000. uct was not significant. These costs Impact for sample company: “Sophos has saved me include: console, messaging and updat- a lot of time with their ing servers as well as server licenses. Year 1 cost is the same for the two options administration tools. The The cost of additional hardware and 3. Upgrade or replacement effort (inter- deployment is easier and software can be significant for organiza- nal and external professional ser- tions that need to manage platforms I’ve been impressed with vices). Migrating to an endpoint security other than Windows (educational institu- solution involves planning, building the the client removal tool, it tions) or multiple platforms as well as infrastructure, deploying the new prod- removes Symantec well.” large numbers of remote users. uct and post-deployment cleanup of any – IT Manager, With Sophos a single, automated CGH Medical Center remaining detections. Some companies
  • 7. 7 Sophos, 90% less than the cost would cost was $6,683, which was 66% less have been to upgrade with the existing “The Sophos console than the cost for the former vendor. vendor. provides a snapshot Impact for sample company: This cost savings enabled the sample of what’s going on at $13,567 annual cost savings company to purchase onsite professional a glance. Symantec is 3. Escalation team. The companies services from Sophos to assist the definitely not easy to use. included in this study admitted they infrastructure manager in this effort and had a false sense of security with the We need to see at a still resulted in a lower cost than if the installed endpoint protection vendors. glance if there’s company upgraded with its current vendor The first evidence of this was when (with no professional services included). something wrong.” Sophos detected issues during the — Technical & Operations Impact on sample company: replacement process that the former Security Administrator, US Healthcare Provider vendor missed. A key reason for switch- $1,600 Year 1 cost savings ing to Sophos was better protection Cost Source 2: Manage/ ongoing per year for Sophos, resulting in a 75% and companies have experienced a operations cost savings. 50% increase in the number of detec- 1. Infrastructure management. The key Impact for sample company: tions prior to execution with Sophos. tasks that fall under managing endpoint Sophos detects viruses, spyware and $30,000 annual cost savings security are: adding new users, manag- adware, suspicious behavior and files, 2. Help desk team. The help desk team ing policies, managing updates, manag- removable storage devices and unau- is responsible for fielding user calls, ing upgrades, troubleshooting, reporting, thorized applications. Sophos definition collecting user data and remediating managing multiple platforms and man- file updates are small and are released issues. They deal with Tier 1 issues that aging remote users. Companies inter- as frequently as every five minutes for have arisen before and the solutions viewed for this study universally agreed fast protection with low impact on net- have been documented for the help that it is easier to do these tasks from work resources. Additionally, Sophos’s desk team to follow. Interviewees have the Sophos management console than HIPS prevention provides detection experienced a much smaller volume from Symantec or McAfee’s console. that automatically guards against new of help desk calls related to endpoint The single Sophos console centralizes and emerging threats. In a 2007 study security issues with Sophos compared and automates the key tasks involved conducted by Cascadia Labs, Sophos to Symantec and McAfee. With Sophos in managing endpoint security and the detected 86% of newer threats com- the infrastructure manager has greater dashboard provides instant visibility of pared to 43% for McAfee and 51% for central control and visibility into the the protection status for all Windows, Symantec. The Escalation Team deals protection status of all users therefore Mac and Linux users so that it’s easy with Tier 2 and Tier 3 issues. Tier 2 potential security flaws, like out-of-date to identify machines that require atten- issues are ones that internal technical anti-virus protection or a disabled fire- tion. If the infrastructure manager needs wall, are addressed before they impact vendor support, Sophos offers unlimited access to in-house support experts the user. “The high volume of calls The sample company’s help desk 24x7x365. to our IT Department with team was used to getting 75 endpoint The infrastructure manager at the McAfee was one of the key security calls per month with one of sample company spent 5 hours per the installed endpoint protection ven- reasons why we switched week managing endpoint security with dors. With Sophos that number has to Sophos.” Sophos. In comparison this would decreased to 25 calls per month. The – Head of Global System require 20 hours per week with either & Security Solutions, average Tier 1 call takes 45 minutes to Symantec or McAfee. With an annual German Company resolve and at $25 per hour the Sophos salary of $80,000 this totaled $10,000
  • 8. 8 experts can remediate on their own is smaller with Sophos than McAfee or while Tier 3 issues require vendor sup- “The time I spent Symantec. As companies begin to track port to resolve. The breakdown of Tier resolving spyware and this metric the magnitude of the cost 2 and Tier 3 issues is typically 75% savings will likely grow. adware issues with and 25% respectively, according the to With 3,400 users and an average salary interviewees. Symantec will be cut in of $50,000 the sample company saved Not only does Sophos detect more half or more with Sophos.” $1,500 a year since it did not experience issues before they execute but it also – IT Manager, CGH Medical Center any service interruptions with Sophos requires less effort to handle them. (compared to one annual interruption that The visibility provided by the Sophos Sophos, 24% less than the cost for the affected 10 users for 6 hours with the management console enables the installed endpoint protection vendor. former vendor). escalation team to easily find machines Impact for sample company: The company’s 3,400 users also regained that need attention and in many cases $39,725 annual cost savings 5 minutes per week in lost productivity issues can be resolved remotely from For companies that are not large enough with Sophos. The cost was $10,625 with the console. For Tier 3 issues, such as to have an escalation team this work is Sophos and 50% less than the cost with new threats that require a new definition handled by the infrastructure manager. the installed endpoint protection vendor. file, Sophos’ in-house technical experts are available 24x7x365 and the intervie- 4. End user productivity. While end user Impact for sample company: wees have seen a 50% improvement in productivity has not historically been $12,125 annual cost saving response time with new definition files measured, the companies interviewed with Sophos compared to Symantec have seen an improvement with Sophos and McAfee. in two areas: i) downtime due to infec- tions and version upgrades, and ii) the “Right out of the gate bandwidth reduction due to definition Sophos was finding more file updates and the memory required vulnerabilities. There “With Sophos we’re to run the endpoint security solution. is the potential for less being proactive rather With the installed endpoint protection downtime at the individual than reactive. We’re trying vendors companies typically experience desk. Sophos is finding to avoid infections so we one service interruption per year, which affects 10 users for about 6 hours on more things up front so don’t have to spend time average. Companies did not have a there is less potential for cleaning them up.” – Network Administrator Manager, single downtime event with Sophos due issues at the endpoint.” AW Chesterton to its ability to catch more threats, espe- – Network Operations cially new and emerging threats with its Section Manager, Amica Mutual Life Insurance HIPS technology. The number of endpoint security detec- Sophos definition file updates are small tions pre execution increased 50% to (2K-70K) and frequent (every 5 minutes) “Sophos’s memory 30 per week when the sample com- so they provide more protection with less footprint and program pany switched to Sophos. Conversely, impact on the end user. McAfee and Symantec updates are sent out once a day footprint are much smaller the time to resolve these detections decreased by 50% to 1.5 hours (Tier 2) so they are larger and expose the network than Symantec’s.” and 5 hours (Tier 3) with Sophos. With to more potential threats. In addition to – Network Administrator, the impact of the updates, the memory Central Ohio Primary Care an annual salary of $60,000 the total Physicians escalation team cost was $129,675 with footprint when the program is running
  • 9. 9 Overall costs was $1.3 million. In comparison, the provided by the companies interviewed. For the sample company, the present total cost of switching to and managing In total there is a $504,000 cost savings value of the total costs of upgrading to Sophos Endpoint Security and Control in switching to and managing Sophos the endpoint security product for the over five years was $880,000. The costs Endpoint Security and Control. installed endpoint protection vendors and were calculated based on licensing, managing the solution over five years infrastructure and operational data Source: Sophos The chart below shows the extent to which years. The labor and licensing costs were of the TCO at 3x to 5x the licensing fee each of the cost categories contributes to the major costs and the Sophos costs are for Sophos and the installed endpoint the total costs for Sophos and the installed 2/3 of the costs for Symantec and McAfee. protection vendors respectively. endpoint protection vendors over five The labor costs represent the lion’s share Source: Sophos
  • 10. 10 From the Gartner Files A Buyer’s Guide to Endpoint Protection Platforms The traditional “point” markets for • If you haven’t already instituted a full- protection technologies, such as DLP and antivirus (AV) tools and personal disk encryption program for mobile full-disk encryption. The demand for holistic firewalls have been eclipsed by broader clients, then do so immediately for NAC solutions and the management suites of related security technologies, notebook computers carrying sensitive requirements of large enterprises are also which Gartner has identified as data. Consider encryption from your forcing EPP suite vendors to replicate endpoint protection platforms incumbent end-node protection vendor, some PC operations infrastructure, such (EPPs). The choice of an EPP will because common management, estab- as security configuration management, depend heavily on enterprise-specific lished client-side presence and suite patching and software management. By requirements, so chief information pricing may make this option attractive. combining multiple technologies into a security officers (CISOs) and other • Consider the need for data loss preven- single management framework, EPPs offer security professionals evaluating EPP tion (DLP) capabilities in endpoint pro- the promise of increased security while offerings should use Gartner’s guidance tection. The ability to simplify client-side simultaneously lowering complexity, cost to identify their most-likely current and agents with a common management and administrative overhead. future needs, and select the EPP that framework is an advantage, but this 1.0 Basic EPP Component will most-effectively address them. consideration will often be outweighed Features and Functionality by broader enterprise DLP require- Key Findings The basic components of an EPP are ments. • The market for EPP suites is marked by an anti-malware signature database • Resist vendor “packaging” that includes a broad range of solutions, with signifi- (containing information on malicious code, gateway protection with endpoint pro- cant differentiation among vendors and such as viruses, trojans and spyware), tection. Focus on the client and server their offerings. an HIPS and a personal firewall, linked as one domain, and gateways as a • No single vendor leads in all functional by a common management and reporting separate domain. Resource-constrained areas, so buyers need to prioritize their console. An EPP may also include full-disk small and midsize businesses (SMBs) requirements to address the needs of encryption and DLP tools. Increasingly, may want to consider the advantages their specific business, technical and EPP management capabilities will of centralized management of both regulatory environments. emulate and integrate with operational domains, but they must also place high- tools to provide security configuration Recommendations er priority on the unique requirements of management, vulnerability assessment, • Make plans to phase out point products each domain. application control and remediation tools for AV and anti-spyware tools, host- ANALYSIS for resilient infections. As data security based intrusion prevention systems The traditional markets for dedicated and reimaging remediation become more (HIPSs) and personal firewalls, and endpoint security products — particularly pervasive, EPP suites will begin offering replace them with an EPP suite as sup- AV tools and personal firewalls — have managed backup services and tools. port contracts expire. been eclipsed by broader suites of related • Demand that your current AV technol- security technologies, which Gartner 2.0 Advanced EPP Component ogy vendor identify the HIPS techniques has designated as “endpoint protection Features and Functionality included in its base AV client and detail CISOs and other enterprise security platforms.” An EPP suite typically includes its road map. Deploy full-blown HIPS decision makers should consider advanced AV and anti-spyware tools, a personal capabilities for systems with high secu- component features, which are becoming firewall, and may also offer network rity requirements, but prepare for some available, when designing RFPs or access control (NAC) capabilities and data increases in administration requirements.
  • 11. 11 scorecards to differentiate products boards to configurations of different tor or help desk view), preferably with under evaluation. No EPP will have all elements. This is especially important users’ ability to adjust their default these features, and buyers must focus because suite vendors often grow by views. on the specific features they consider acquisition, and, as a result, the degree • A customizable “toolbox” element that most important for their enterprises. of management and reporting integra- allows the consolidation of common The following list isn’t intended to be tion into a common, centralized man- tasks into a single user-defined menu is comprehensive, but rather representative of agement console may vary. useful. advanced functions that may compose part • Granular role-based administration • “Globalization” capabilities — including of a more-appropriate EPP solution. should ideally include predefined roles global support, centralized management as well as the ability to customize and and reporting, and necessary language 2.1 Manageability and Scalability support for the management interface add/remove options. Capabilities and the end-user interface — are impor- • The EPP should offer the capability to Reduced administration is one of the most- tant for enterprises with operations create different management GUI work critical concerns of EPP administrators, across multiple regions. space views (for example, administra- and improved manageability and greater scalability will help reduce it and the associated overhead. A well-designed, task-oriented graphical user interface Note 1 (GUI) and a comprehensive management Examples of Common Tasks interface will deliver lower total cost of • Review the home page dashboard and pay particular attention to the placement of ownership (TCO). Gartner recommends indicators that illustrate negative changes in the security posture of endpoints. Look for direct links to more information, recommendations and action steps to resolve that when security professionals evaluate events. EPPs, they should develop a list of the • Tour the report center, create a custom report, and schedule it for delivery to an top 10 to 20 most-common or most-critical e-mailbox or Web server/portal. • Show alert configuration capability and integrate an alert with an external subscriber endpoint security tasks (see Note 1), and identity module. use this list as a guideline for comparison • Show real-time data that lists clients on a network that doesn’t have an EPP agent installed. testing and demonstration of solutions. • Create or edit the policy elements that can be delegated (or restricted) to end users. The necessary management capabilities • Create or edit the policy for client update distribution. will depend heavily on enterprise-specific • Create or edit the policy to automatically push the EPP client to an endpoint that doesn’t have it installed. needs and available technical skills. • Configure scheduled scans for endpoints. Focus on the ability to limit CPU use, and The following representative list details delegate the ability for end users to delay scan execution. advanced EPP management capabilities as • Create or edit the port (that is, USB, CD or infrared) control configuration, and pay particular attention to the granularity of the restrictions, the linkage to file types, and well as the factors influencing them. encryption, if any. • Create or edit a VPN policy (that is, deny split tunneling) for a specific Active 2.1.1 Management GUI Directory group. • Create or edit a location-based policy, and pay attention to the level of automation in • A task-oriented (not feature-based) man- selecting when a policy should be invoked. agement GUI can simplify management • Create or edit a Wi-Fi-specific policy. by hiding unnecessary complexity from • Create or edit a whitelisting and/or lockdown configuration for a certain group of PCs. Add a new executable program to the whitelist. Autogenerate a whitelist from the less-sophisticated users, but enable installed applications on a PC. Authorize a software distribution method and directory more-technically skilled users to drill as a whitelisted source of applications. down to granular details (see Note 2). • Show a single-page summary of client configuration information and print it for review. • Management pages should ideally have • Review the HIPS policy configuration and step through the false-positive handling a consistent look and feel, as well as process, including deactivating a specific HIPS rule for a specific application. • Edit role-based administration and hierarchical administration to add a new role. the ability to switch over from dash-
  • 12. 12 endpoints may be useful, particularly for • The management system should be Note 2 SMBs. able to automatically detect new or Task-Based System • The ratio of management servers to rogue endpoints that don’t have an EPP A task-based system can be evaluated clients is an important consideration client installed. This is a function that by creating a list of common tasks and for large enterprises, and one that will may be integrated into the enterprise’s comparing the number of steps required to impact the TCO. For smaller business- NAC system, but shouldn’t be depen- complete each task. es, the management server should work dent on NAC, and should be able to on a shared server. detect clients that have already joined the domain. • EPP vendors are gradually adding PC 2.1.3 Reporting and Dashboards life cycle tools (such as asset discovery, • Buyers should look for a real-time home 2.1.4 Policy Management configuration management, vulnerability page dashboard that enables rapid • A “wizard type” installation mecha- assessment and software management) troubleshooting of security events or nism with optimal default settings for as a way to inoculate PCs against server issues — ideally with actionable different-size environments can reduce unknown threats that target known dashboard elements that make it pos- deployment complexity. vulnerabilities. Buyers should evaluate sible to click on an event or graph and • A single-page policy with intelligent their needs with regard to the integra- initiate steps that enable better under- drop-down “pick lists” and fields that tion of these tools and consider the standing of the issues involved and the change based on previous optional strategic direction of prospective EPP steps required for alert resolution. selections (without multiple pop-up win- vendors. • Threshold alerting capabilities may use dows or the need to visit several tabs delivery mechanisms such as e-mail, to create a single policy) make policy 2.1.2 Scalability Short Message Service (SMS) and development easier and more intuitive. • Centralized management with automatic Simple Network Management Protocol • There should be an option to view or configuration and policy synchronization (SNMP), with threshold alerts for dash- print a human-readable policy sum- among management servers may be board statistics and policy thresholds. mary that greatly simplifies auditing and particularly useful in large deployments. • The appropriate range of client informa- troubleshooting. • Native management-server redun- tion that can be collected and reported • A complete audit log of policy changes dancy — for example, using load bal- to the management server is grow- is essential, especially for organiza- ancing active/active clustering within ing in importance as a differentiator. tions that take advantage of extensive and across LANs, or automatic active/ Most EPP suites collect information role-based administration and delegated standby failover without a single point only about the status of the EPP suite. end-user administration to ensure audit of failure, such as a designated master/ However, as endpoint hygiene becomes compliance. slave — can be a useful differentiator. more critical, information about the • The ability to stage signatures or poli- • EPPs should include multiple directory status of patch levels, configurations, cies and to quickly roll back changes is integration options — including Active software inventories and vulnerabilities increasingly important because fewer Directory and Lightweight Directory is becoming more important. enterprises are testing signatures before Access Protocol (LDAP) — as well • The management server should be deploying them. as the ability to integrate with multiple capable of collecting client status infor- • The EPP suite policy must allow off- directories and traverse directories to mation in real time, rather than in sched- LAN clients to automatically update from find user groups and authentication uled delta updates. The ability to collect the EPP vendor’s primary database for information. information from mobile endpoints that signature and HIPS updates, when the • A software-as-a-service- (SaaS-) based aren’t connected to the network hosting enterprise server is unreachable or oth- managed console that eliminates the the management server can be a signifi- erwise unavailable. need for a dedicated server to manage cant competitive differentiator.
  • 13. 13 • A configuration backup utility and con- should seek clarity on what’s actually Retrospective testing (that is, testing old figuration preservation between version supported and what back-end process- signature databases against new vari- upgrades can save administration time es have been changed. It’s important ants of old malware) is the best way to and resources. to ensure that the vendor’s support per- evaluate this capability. sonnel are properly trained, that its labs • Ideally, EPP solutions should provide 2.1.5 Client Agents are appropriately configured and that much-faster identification and rapid dis- • The number of required clients and the its software products are certified for tribution of signatures for new threats. client disk and memory footprint are virtualization. Most host-based software However, this is a difficult benchmark good indicators of the level of integra- provides no protection for the hypervi- to test. Some solutions will have slower tion among EPP components and the sor layer. signature distribution for a new threat, efficiency of the client. Ideal solutions because their generic signatures or will provide a single consolidated agent 2.2 Malware Detection HIPS rules are already effective in with component parts that can be Capabilities blocking that threat. remotely enabled and disabled. The quality of the malware scan engine • Signature databases should include all • The ability to natively distribute the full — the “anchor” solution of an EPP suite types of malware (including spyware, client agent and remove competing — should be a major consideration in adware, viruses, trojans, keystroke log- products is a useful differentiator. Some any RFP. The following are some of the gers, droppers, back doors and hacking solutions simply provide a multisourcing advanced malware-oriented features of tools) in a single database, with a single service integrator (MSI) file (Windows EPPs that buyers should be looking for: update mechanism and a single scan Installer package) for use by other soft- • Most enterprises’ IT security engine agent. ware distribution tools, while other solu- organizations’ capability to accurately • The capability to detect rootkits and tions won’t remove other AV products, test malware engines in real-world other forms of low-level malware, once which can create conflicts. situations is limited, at best. Test they’re resident in enterprise systems, • The client interface should be adaptable results from organizations such as is a significant consideration. Some to allow for a full range of delegated AV-Comparatives.org and AV-Test.org solutions’ functionality is limited to end-user control. Advanced solutions are useful guides of scanning accuracy catching rootkits as they install, while enable administrators to delegate or (including false positives) and scanning others have the ability to inspect raw restrict any client option. speeds. In the absence of other infor- PC resources and compare them to • Scheduled scans are one of the most- mation, good test scores are better than Windows file tables, seeking discrepan- problematic aspects of signature-based poor test scores, but buyers should be cies that will indicate the presence of anti-malware tools. Options that limit the aware that these tests don’t accurately rootkits. client impact of scheduled scans are a reflect how users encounter malware • Malware engines should continuously significant EPP differentiator. Advanced in the real world. Moreover, they don’t monitor system resources (for example, features include the ability to delay test all proactive techniques for blocking host file, registry, Internet Explorer set- scans based on battery life, running malware, such as HIPS, vulnerability tings and dynamic-link-library changes) process or CPU usage. More rare is the detection and configuration manage- for changes that might indicate the pres- ability to “wake and scan” PCs during ment. Buyers should be very wary of ence of suspicious code: off-hours. Scheduled memory scans vendor-sponsored tests and not put too • Malware removal features and should be independent of disk scans. much weight on specific test results. outbreak filters to stop propagation • Specific features and licensing for virtu- • Signatures should be as broad as pos- are important differentiators among alized environments, such as VMware, sible so they can detect new variants vendors and their offerings. These Citrix and Hyper-V, remain rare, but are of old threats without new signatures, capabilities should be understood increasing in importance. EPP buyers and, thus, avoid causing false positives. and tested, because modern mal-
  • 14. 14 ware is significantly more complex and to configure protection to reflect the to “buy time” to propagate patches to all than that of previous generations, enterprise’s overall tolerance for risk endpoints. and often involves multiple compo- and administrative overhead. • The simulation of unknown code before nents with sophisticated “keep alive” • Despite the need for fine-tuning capa- the code is executed to determine mali- routines. bilities, the best solutions will provide cious intent, without requiring end-user • EPP solutions should include client- preconfigured “out of the box” templates interaction with the unknown code (for based URL filtering to block clients for common application and system example, using static analysis, simula- from visiting Web sites that are known configurations, as well as a learning tion or reverse compilation techniques) security risks, because malware is mode for enterprise environments and is another deterministic technique, but increasingly shifting to Web distribution the ability to test policy in a log-only it can be highly resource-intensive and methods. mode. should be used selectively. • HIPS techniques have no standard • Buffer overflow memory protection is 2.3 Advanced HIPS Capabilities terminology; therefore, it’s essential common, and should address heap- AV/anti-spyware databases are 90% to that buyers ask vendors to list and and-stack memory. 99% effective at detecting well-known, describe the HIPS techniques in detail, • Application control capabilities (for widely circulated threats, but only 20% so that buyers can create a standard- example, application whitelisting, also to 50% are effective at detecting new or ized list of techniques and compare known as lockdown) are gaining signifi- low-volume threats. Security effectiveness their breadth and depth across vendors. cant interest as the volume of malware is significantly enhanced by HIPS, but Buyers should also understand which begins to surpass the volume of “good” there’s no generally accepted method of techniques are included in the base cli- corporate applications. There is signifi- testing the HIPS effectiveness of different ent, which are optional, and what other cant R&D in this area, and this capabil- solutions. charges, if any, are required for addi- ity will be an important differentiator in EPP buyers should take the time to tional protection styles. the future. Application control features understand how many and which of the • Some vendors offer only binary control that EPP buyers should investigate nine HIPS protection styles are included in over HIPS, which allows administra- include: the base malware signature engine that’s tors to turn them on or off. Enterprise • How applications are identified and used to detect and block unknown threats IT organizations are unlikely to concern prevented from executing (for exam- (zero-day or targeted threats), and which themselves with every setting in detail, ple, do they block the installation of are additional HIPS capabilities that can but it’s important to have granular con- applications or only the execution?) often increase the administration burden trol that makes it possible to turn off is an important differentiator. due to management of false positives. certain rules for specific applications to • The mechanisms available for cre- For these reasons, Gartner recommends accommodate false positives. ating a whitelist will be critical to focusing on ease-of-management • One very effective HIP technique is lower the administration overhead. functions, which make HIPS adaptable “vulnerability shielding” — the ability Administrators should, for example, enough for the enterprise network: to inspect and drop attacks based on be able to automatically autho- • The HIPS solution must, as a core knowledge of the specific vulnerabili- rize applications that are properly principle, enable the administrator to ties they exploit. This technique allows signed, or come from trusted loca- choose and tune the styles of protection protection against attacks and against tions, processes or installers. that are needed, based on the require- known vulnerabilities before the vendor • Solutions should ideally provide ments and resources of the endpoint, releases a patch, and makes it possible signatures of known-good applica-
  • 15. 15 tions as a service, similar to current based on connection type — different an encryption component of an EPP suite: malware databases. network interface cards (NICs) or dif- • EPP solutions should provide the ability • Application control should extend ferent networks — as well as the ability to create policies to control the broadest to the execution of browser helper to dynamically apply policies based on range of devices and device formats — objects/controls within the context of network location — for example, Wi-Fi for example, CD, DVD, USB, Bluetooth, Internet Explorer and other browsers. policy, on-corporate-LAN policy and 3G and general packet radio services public Internet policy. 2.4 Personal Firewall Capabilities — with policies defined, at minimum, by • The integration of a client (IPsec) VPN device class. Basic personal firewall functionality is useful for enforcing remote access • The level of granularity that makes it (inbound port defenses) are available in the policies. Ideally, EPP solutions should possible to distinguish among device Windows XP Professional, Windows 2003 allow unfettered Internet authentication, classes (for example, a mouse from a and Windows Vista operating systems. The and then enforce VPN startup to direct data storage device), and potentially Vista firewall has bidirectional capabilities, remote access traffic back to the LAN. to distinguish specific devices by serial although outbound is turned off by default • The ability to enforce a “one active NIC number or manufacturer, is a worth- and activation requires significant setup. at a time” policy to block network bridg- while differentiator. The Windows firewall is adequate for most ing is a useful feature, and options that • Policies will ideally be file-type-aware desktop PCs that also have the benefits allow the disabling of inactive NICs are so that they can allow or restrict access of network firewalls and network-based ideal. based on file type and action (for intrusion prevention. However, notebook • Application profiles that define normal example, allowing “read only” access computers and PCs with higher security application behavior, and can restrict or allowing only document file types), requirements require more-comprehensive, network access for applications that and so that they can restrict application two-way protection that adapts to multiple aren’t approved or are potentially com- execution (for example, blocking auto- network contexts. Personal firewalls are promised, are useful application control execute or all execution from a data differentiated by the flexibility of their features. drive). policies (for example, an autosensing • A firewall must have the ability to • EPP offerings, when combined with location-based policy), the breadth of their block malicious attacks and end users encryption solutions, often allow policies application profile policies (for example, attempting to disable the firewall. to force encryption — for example, with the ability to prevent applications from • Log data — especially related to secu- “allow write but encrypt” and “password- exhibiting unusual network behaviors), the rity incidents — should be extensive, protect files written to USB or CD stor- virtual private network (VPN) integration searchable and accessible via the report age” provisions. and the range of ports (for example, engine to enable forensic investigation. • To minimize help-desk interaction, it’s Universal Serial Bus [USB], FireWire, infrared, Wi-Fi and Bluetooth) they can 2.5 Port Control useful to enable remote workers to “self protect: Enterprises are increasingly concerned authorize” device usage, and to allow about USB ports as a channel for privileged end users to use devices, but • The ability to manage the Windows fire- accidental or malicious data loss, or as warning them that it’s against policy and wall and a more-advanced personal fire- an access point for malware, such as the that they should log their usage. At a wall in the same management console recent Conflicker worm. For this reason, minimum, EPP solutions should allow is a distinct advantage, because some granular port control is becoming a remote help desk activation of ports for enterprises will adopt the Windows fire- common feature of the personal firewall or users with administrator passwords. wall for on-LAN PCs. • Advanced solutions will also include • EPP solutions should offer the abil- ity to create different firewall policies
  • 16. 16 options for protecting data by blocking information can be moved to the top of • EPP offerings should include the ability to the “cut/copy/paste,” “print screen” and the page. Display options (for example, import or export data and alerts with secu- “print” commands. pie charts, bar charts and tables) should rity information and event management also be configurable so that information systems, or other reporting systems. 2.6 Reporting Capabilities can be displayed in the format that spe- • The reporting engine should have the Reporting capabilities are a significant cific administrators need. capability to run on-box for smaller solu- differentiator for EPP offerings, and • Reports and dashboards should include tions, or move to a centralized reporting can make a significant difference in the trending information against customiz- server for consolidation and storage of administration overhead that’s associated able parameters. For example, it should multiple management servers’ log infor- with them. Buyers should consider “point be possible to create a dashboard view mation, without changing the look and in time” reporting, as well as “real time” or a report that shows percentage com- feel of the reports. dashboard capabilities: pliance against a specific configuration • The reporting engine should also have • The dashboard should provide a real- policy over time. the capability to create custom reports time graphical and table-based view of • Dashboards should be configurable for (in the HTML, XML comma-separated system events, including system infor- different roles so that each administra- value and PDF output types), save mation, version information and action- tor can create a role-specific view. them and schedule them for distribution able alerts. • Information should be aggregated, and via e-mail or FTP, or by moving them to • EPP solutions will ideally provide holis- should also allow single-management the network directory. tic security information about the current server, cluster, LAN, geographical • The database must enable rapid report security status of endpoints, not simply or global views in the same window, queries and the ability to preserve his- the status of the EPP components. This depending on administrator options and torical data for long-term storage in a may, for example, include information role limitations. standard format. about vulnerabilities, compliance viola- • Dashboard information should always • Reporting functionality should include tions and unpatched machines, for man- allow administrators to drill down to the active filtering to narrow the results in aged and unmanaged machines on the necessary level of detail with one click, longer reports so that specific events network. instead of forcing them to switch to the can be identified. • Dashboards that offer Really Simple reporting application, manually select • Reporting engines should facilitate the Syndication (RSS) feeds with relevant the appropriate report and re-create the creation of completely ad hoc reports, external news — for example, concern- parameters that include the condition similar to SQL queries, rather than just ing global malware activities and vulner- they want to investigate. modify the parameters of predeveloped abilities — are desirable. External trend- • Dashboards should also offer quick reports. ing information allows administrators to links to remediation actions (for exam- • Multiple chart types (such as pie charts better understand internal activity levels ple, clean quarantine, patching and soft- and bar charts) should be supported, as and compare them to global events. ware distribution), as well as quick links well as summary data. • The dashboard should be administrator- to malware encyclopedia information to • Summary reports should include active configurable so that the most-relevant resolve alerts. links that allow drill-down into detailed reports, as well as back-navigation that makes it easy to return to the top-level view.