SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Mitigating Risk for the Mobile
Worker:
Novell ZENworks Endpoint Security Management Overview
        ®               ®




Ross Chevalier
CTO Americas, President Novell Canada
Novell, Inc / rchevalier@novell.ca
Agenda

       What is Endpoint Security Management?

       How are you handling the market reality?

       Use cases

       What's in ZENworks Endpoint Security
                                          ®



       Management today

       Discussion around how to get started

2   © Novell, Inc. All rights reserved.
Endpoint Security Management
It's All About Balance




    Flexibility                           Control




4   © Novell, Inc. All rights reserved.
Seeing Reality

    •   The workforce has become mobile
         –   At the enterprise level, laptops have
             surpassed desktop deployments
         –   Wireless NICs are standard on new PCs
             and wireless networks have proliferated
         –   Mobility increases productivity and agility

                                                           •   What is the key requirement
                                                               to enable mobility?
                                                                –   Remote access to data, which
                                                                    can be either locally stored or
                                                                    accessed via the Internet
                                          •   A polar relationship
                                              –   Increased agility and productivity requires
                                                  moving data to the endpoint or providing
                                                  remote access to the data, which increases
                                                  risks and their associated costs.
5   © Novell, Inc. All rights reserved.
Are Your Endpoints Secure?

                                          of organizations said they would never
      83%                                 be able to prove if contents of a laptop
                                          were encrypted if a data breach occurred.1

             Percentage of employees who say they
             copy sensitive or confidential information
             onto a USB memory stick.1                                                         69%
                                           How much more expensive it can be to
       20X                                 fix a data breach than it is to invest in PCI
                                           compliance from the very start.3

    Cost to replace a lost laptop (e.g., cost
    of data breach, lost IP, lost productivity,
    and legal and regulatory expenses).1                                           $49,000
    1 – Ponemon, “The Human Factor in Laptop Encryption”, December 2009
    2 – Ponemon, “Trends in Insider Compliance with Data Security Policies”, June 2009
    3 – Solidcore Systems, Emagined Security, Fortrex, “PCI Compliance Cost Analysis”, December 2007
    4 – Ponemon, “The Cost of a Lost Laptop”, April 2009
6   © Novell, Inc. All rights reserved.
Data Breach Sources




7   © Novell, Inc. All rights reserved.
Endpoint Security Considerations

    •   Data - Information that is stored on and/or accessed by a computer
    •   Access - The methods and controls for an
        endpoint’s communications
    •   Device - The settings and states of the endpoint
           Data Protection + Access Control + Device Health = Endpoint Security




8   © Novell, Inc. All rights reserved.
The Pieces to Consider




9   © Novell, Inc. All rights reserved.
Mitigating Risk Case 1

     •   You have mobile users who use a variety of different
         network services to connect back to head office

     •   Wireless security training is “unheard”

     •   You need to be able to control both connection and
         in-stream security when many of these
         networks are not secure

     •   The corporate firewalls don't exist
         when people are remote

10   © Novell, Inc. All rights reserved.
11   © Novell, Inc. All rights reserved.
12   © Novell, Inc. All rights reserved.
13   © Novell, Inc. All rights reserved.
14   © Novell, Inc. All rights reserved.
15   © Novell, Inc. All rights reserved.
Mitigating Risk Case 2

     •   The removable storage conundrum
     •   Users get access readily to all kinds of storage options
          –   Most are “invisible”
     •   Could result in data leakage or external infections
     •   Turning off the USB ports is a non-starter
     •   Need to be able to control which USB devices can be
         connected and active




16   © Novell, Inc. All rights reserved.   http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208803634
17   © Novell, Inc. All rights reserved.
18   © Novell, Inc. All rights reserved.
Mitigating Risk Case 3

     •   Mobile user may install or “get installed” applications
         that you don't want to gain access to the system or
         applications you don't want to run at all


     •   User must retain some level of administrative authority,
         because it's Windows and too many things break when
         administrative authority is removed


     •   User may “help” by disabling or uninstalling critical
         software required by the company

19   © Novell, Inc. All rights reserved.
20   © Novell, Inc. All rights reserved.
21   © Novell, Inc. All rights reserved.
22   © Novell, Inc. All rights reserved.
23   © Novell, Inc. All rights reserved.
24   © Novell, Inc. All rights reserved.
Looking at ZENworks®



Endpoint Security Management
ZENworks Endpoint Security Management:
                                       ®


     Unparalleled Security

                        AD // eDirectory Integrated Central Control and Reporting
                                                    ™




          Application                      Connectivity    Storage/Copy      Integrity Control      Advanced
           Control                           Control          Control                            Firewall Control




      Deny:                          Control:             Allow / deny use   Ensure anti-        NDIS-layer
                                                          of thumb drives,   virus, anti-        Firewall
      –Undesired                     –All hw ports        etc.               spyware, etc.
      apps                           –Wi-fi access                                               Stateful with
                                                          Allow only         Enforce any
      –Network                                                                                   ACL support
                                     Enforce VPN          approved           custom VB or
      access for                                          thumbdrives        Java Script         No end-user
      specific apps                                       Encrypt                                input req’d
                                                                             Quarantine via
                                                          thumbdrive         firewall block
                                                          and/or disk
                                                          folder

                             Location-Aware, Self-Defending, Online/Offline Client
26   © Novell, Inc. All rights reserved.
Certifications

     •   The only endpoint security enforcement solution with
         both patented technology and key U.S. government
         and industry certifications:
          –   FIPS 140-2 Certified Cryptomodule
          –   AES Encryption
          –   Common Criteria EAL 4+ Certification (strongest in the space)
          –   IPv6 Compliant
          –   Microsoft WHQL Certified
               >   Windows Hardware Quality Labs




27   © Novell, Inc. All rights reserved.
Summary of Benefits

     •   Increase agility and productivity while managing associated
         risk
     •   Protect data on the endpoint and accessed by the device
     •   Protect system health–increase user up time
         and productivity
     •   Decrease overhead
          –   single console for configuration, management,
              reporting/alerts
          –   single agent for security enforcement
     •   Targeted enforcement to address specific issues
     •   Centralize security decisions
     •   Enforcement can not be circumvented
28   © Novell, Inc. All rights reserved.
The Other Piece of the Puzzle
           Network Access Control
Also For Consideration:
     ZENworks Network Access Control
                                  ®




     •   Purpose-built network access control engine
          –   Fast endpoint testing; minimal impact on network
     •   Tests all categories of end users
          –   Internal, visitors, contractors, home and mobile users, range of
              OSs and versions
     •   Multiple endpoint testing options
          –   Agent-less (via RPC), ActiveX, Persistent agent
     •   Multiple enforcement options
          –   802.1x, DHCP, Endpoint-based, Inline, Cisco NAC
     •   Testing depth: hundreds of off-the-shelf tests
     •   Enterprise scalable
          –   Hundreds of thousands of endpoints

30   © Novell, Inc. All rights reserved.
Network Access Control:
     Internal, Pre-connect Security is The Priority
     •    The majority of security incidents are the result of internal actions
     •    For the majority of respondents, pre-connect NAC is a priority
          over post-connect NAC
                          Security Incidents                                 High Priority NAC
     100%                                                          100%

         90%                                                       90%

         80%                                                       80%

         70%                                                       70%

         60%                                                       60%

         50%                                                       50%

         40%                                                       40%     80%
         30%         61%                                           30%
                                                                          Pre-Connect

         20%
                       Internal
                                             39%                   20%

         10%
                                             Perimeter             10%                    20%
         0%                                                         0%
                                                                                        Post-Connect
                                  Source: PricewaterhouseCoopers                            Source: Gartner
31   © Novell, Inc. All rights reserved.
Flexible Testing + Flexible Enforcement
     = Full Coverage

            Testing and Enforcement Options for Coverage of all Endpoints
                                                             Your Network




      LAN Connected                        Branch Office     Remote-VPN, RAS         Wireless         Visitor/Contractor




                                                           Novell NAC
                                                                ®

                      Testing Options                                             Enforcement Options



                                                                                                               Enforcement

       Agent-less              ActiveX            Agent                  Inline   Endpoint   802.1x   DCHP
                                                                                                              Through Cisco's
                                                                                                              NAC architecture
                               Control                                  (VPN)      Based

32   © Novell, Inc. All rights reserved.
Where to Start?
Questions and Answers
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...elisasson
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedSHC
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAdvantec Distribution
 
Intel® V Pro™ Technology
Intel® V Pro™ TechnologyIntel® V Pro™ Technology
Intel® V Pro™ TechnologySHC
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetIxia
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify PillarEd Wong
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-usPelos TCHIKAYA
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.Michal Jarski
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5Irsandi Hasan
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product InformationZeeshan Humayun
 
Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2lamcindoe
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing KeynoteDigital Bond
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Ixia NVS Group
 

Was ist angesagt? (20)

Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
Air defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheetAir defense wireless_vulnerability_assessement_module_spec_sheet
Air defense wireless_vulnerability_assessement_module_spec_sheet
 
Intel® V Pro™ Technology
Intel® V Pro™ TechnologyIntel® V Pro™ Technology
Intel® V Pro™ Technology
 
BreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data SheetBreakingPoint 3G Testing Data Sheet
BreakingPoint 3G Testing Data Sheet
 
Apani EpiForce Security Software Brochure
Apani EpiForce Security Software BrochureApani EpiForce Security Software Brochure
Apani EpiForce Security Software Brochure
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
B sep ds-21194634.en-us
B sep ds-21194634.en-usB sep ds-21194634.en-us
B sep ds-21194634.en-us
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.
 
Hh 2012-mberman-sds2
Hh 2012-mberman-sds2Hh 2012-mberman-sds2
Hh 2012-mberman-sds2
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
Total Defense Product Information
Total Defense Product InformationTotal Defense Product Information
Total Defense Product Information
 
Cyber Security C2
Cyber Security C2Cyber Security C2
Cyber Security C2
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
Use Your IDS Appliance, presented by Kate Brew, Product Marketing Manager at ...
 

Ähnlich wie Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Management Overview

IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael FirstenbergTI Safe
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Digital Bond
 
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Novell
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfImamBahrudin5
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Controlzayedalji
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1Andris Soroka
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityIntel IT Center
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
[2010] Advanced infrastructure as foundation of e-Democracy solutions - Danie...
[2010] Advanced infrastructure as foundation of e-Democracy solutions - Danie...[2010] Advanced infrastructure as foundation of e-Democracy solutions - Danie...
[2010] Advanced infrastructure as foundation of e-Democracy solutions - Danie...e-Democracy Conference
 
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...e-Democracy Conference
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablementresponsedatacomms
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 

Ähnlich wie Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Management Overview (20)

IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 
W8 client management
W8 client managementW8 client management
W8 client management
 
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
Integrated Endpoint Security Management in Novell ZENworks 11 Configuration M...
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
 
Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
[2010] Advanced infrastructure as foundation of e-Democracy solutions - Danie...
[2010] Advanced infrastructure as foundation of e-Democracy solutions - Danie...[2010] Advanced infrastructure as foundation of e-Democracy solutions - Danie...
[2010] Advanced infrastructure as foundation of e-Democracy solutions - Danie...
 
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
Advanced infrastructure as foundation for e-democracy solutions - Daniel Dani...
 
Palo alto safe application enablement
Palo alto   safe application enablementPalo alto   safe application enablement
Palo alto safe application enablement
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 

Mehr von Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Mehr von Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Management Overview

  • 1. Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Management Overview ® ® Ross Chevalier CTO Americas, President Novell Canada Novell, Inc / rchevalier@novell.ca
  • 2. Agenda What is Endpoint Security Management? How are you handling the market reality? Use cases What's in ZENworks Endpoint Security ® Management today Discussion around how to get started 2 © Novell, Inc. All rights reserved.
  • 4. It's All About Balance Flexibility Control 4 © Novell, Inc. All rights reserved.
  • 5. Seeing Reality • The workforce has become mobile – At the enterprise level, laptops have surpassed desktop deployments – Wireless NICs are standard on new PCs and wireless networks have proliferated – Mobility increases productivity and agility • What is the key requirement to enable mobility? – Remote access to data, which can be either locally stored or accessed via the Internet • A polar relationship – Increased agility and productivity requires moving data to the endpoint or providing remote access to the data, which increases risks and their associated costs. 5 © Novell, Inc. All rights reserved.
  • 6. Are Your Endpoints Secure? of organizations said they would never 83% be able to prove if contents of a laptop were encrypted if a data breach occurred.1 Percentage of employees who say they copy sensitive or confidential information onto a USB memory stick.1 69% How much more expensive it can be to 20X fix a data breach than it is to invest in PCI compliance from the very start.3 Cost to replace a lost laptop (e.g., cost of data breach, lost IP, lost productivity, and legal and regulatory expenses).1 $49,000 1 – Ponemon, “The Human Factor in Laptop Encryption”, December 2009 2 – Ponemon, “Trends in Insider Compliance with Data Security Policies”, June 2009 3 – Solidcore Systems, Emagined Security, Fortrex, “PCI Compliance Cost Analysis”, December 2007 4 – Ponemon, “The Cost of a Lost Laptop”, April 2009 6 © Novell, Inc. All rights reserved.
  • 7. Data Breach Sources 7 © Novell, Inc. All rights reserved.
  • 8. Endpoint Security Considerations • Data - Information that is stored on and/or accessed by a computer • Access - The methods and controls for an endpoint’s communications • Device - The settings and states of the endpoint Data Protection + Access Control + Device Health = Endpoint Security 8 © Novell, Inc. All rights reserved.
  • 9. The Pieces to Consider 9 © Novell, Inc. All rights reserved.
  • 10. Mitigating Risk Case 1 • You have mobile users who use a variety of different network services to connect back to head office • Wireless security training is “unheard” • You need to be able to control both connection and in-stream security when many of these networks are not secure • The corporate firewalls don't exist when people are remote 10 © Novell, Inc. All rights reserved.
  • 11. 11 © Novell, Inc. All rights reserved.
  • 12. 12 © Novell, Inc. All rights reserved.
  • 13. 13 © Novell, Inc. All rights reserved.
  • 14. 14 © Novell, Inc. All rights reserved.
  • 15. 15 © Novell, Inc. All rights reserved.
  • 16. Mitigating Risk Case 2 • The removable storage conundrum • Users get access readily to all kinds of storage options – Most are “invisible” • Could result in data leakage or external infections • Turning off the USB ports is a non-starter • Need to be able to control which USB devices can be connected and active 16 © Novell, Inc. All rights reserved. http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208803634
  • 17. 17 © Novell, Inc. All rights reserved.
  • 18. 18 © Novell, Inc. All rights reserved.
  • 19. Mitigating Risk Case 3 • Mobile user may install or “get installed” applications that you don't want to gain access to the system or applications you don't want to run at all • User must retain some level of administrative authority, because it's Windows and too many things break when administrative authority is removed • User may “help” by disabling or uninstalling critical software required by the company 19 © Novell, Inc. All rights reserved.
  • 20. 20 © Novell, Inc. All rights reserved.
  • 21. 21 © Novell, Inc. All rights reserved.
  • 22. 22 © Novell, Inc. All rights reserved.
  • 23. 23 © Novell, Inc. All rights reserved.
  • 24. 24 © Novell, Inc. All rights reserved.
  • 25. Looking at ZENworks® Endpoint Security Management
  • 26. ZENworks Endpoint Security Management: ® Unparalleled Security AD // eDirectory Integrated Central Control and Reporting ™ Application Connectivity Storage/Copy Integrity Control Advanced Control Control Control Firewall Control Deny: Control: Allow / deny use Ensure anti- NDIS-layer of thumb drives, virus, anti- Firewall –Undesired –All hw ports etc. spyware, etc. apps –Wi-fi access Stateful with Allow only Enforce any –Network ACL support Enforce VPN approved custom VB or access for thumbdrives Java Script No end-user specific apps Encrypt input req’d Quarantine via thumbdrive firewall block and/or disk folder Location-Aware, Self-Defending, Online/Offline Client 26 © Novell, Inc. All rights reserved.
  • 27. Certifications • The only endpoint security enforcement solution with both patented technology and key U.S. government and industry certifications: – FIPS 140-2 Certified Cryptomodule – AES Encryption – Common Criteria EAL 4+ Certification (strongest in the space) – IPv6 Compliant – Microsoft WHQL Certified > Windows Hardware Quality Labs 27 © Novell, Inc. All rights reserved.
  • 28. Summary of Benefits • Increase agility and productivity while managing associated risk • Protect data on the endpoint and accessed by the device • Protect system health–increase user up time and productivity • Decrease overhead – single console for configuration, management, reporting/alerts – single agent for security enforcement • Targeted enforcement to address specific issues • Centralize security decisions • Enforcement can not be circumvented 28 © Novell, Inc. All rights reserved.
  • 29. The Other Piece of the Puzzle Network Access Control
  • 30. Also For Consideration: ZENworks Network Access Control ® • Purpose-built network access control engine – Fast endpoint testing; minimal impact on network • Tests all categories of end users – Internal, visitors, contractors, home and mobile users, range of OSs and versions • Multiple endpoint testing options – Agent-less (via RPC), ActiveX, Persistent agent • Multiple enforcement options – 802.1x, DHCP, Endpoint-based, Inline, Cisco NAC • Testing depth: hundreds of off-the-shelf tests • Enterprise scalable – Hundreds of thousands of endpoints 30 © Novell, Inc. All rights reserved.
  • 31. Network Access Control: Internal, Pre-connect Security is The Priority • The majority of security incidents are the result of internal actions • For the majority of respondents, pre-connect NAC is a priority over post-connect NAC Security Incidents High Priority NAC 100% 100% 90% 90% 80% 80% 70% 70% 60% 60% 50% 50% 40% 40% 80% 30% 61% 30% Pre-Connect 20% Internal 39% 20% 10% Perimeter 10% 20% 0% 0% Post-Connect Source: PricewaterhouseCoopers Source: Gartner 31 © Novell, Inc. All rights reserved.
  • 32. Flexible Testing + Flexible Enforcement = Full Coverage Testing and Enforcement Options for Coverage of all Endpoints Your Network LAN Connected Branch Office Remote-VPN, RAS Wireless Visitor/Contractor Novell NAC ® Testing Options Enforcement Options Enforcement Agent-less ActiveX Agent Inline Endpoint 802.1x DCHP Through Cisco's NAC architecture Control (VPN) Based 32 © Novell, Inc. All rights reserved.
  • 35.
  • 36. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.