SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential1
SAM and Security Teams Must Join Forces to
Enhance Security
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential2
Speakers and Agenda
Agenda
• SAM and Security Team
Responsibilities
• Security Process
• SAM Impact on Security
• Vulnerability Management
• Integrated Solutions
Marcelo Pereira
Product Marketing Manager
Flexera Software
John Emmitt
Manager, Enterprise Marketing
Flexera Software
>>Click here to Watch this Webinar On Demand Now<<
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential3
SAM Team Responsibilities
• License Compliance and Audit Defense
• Software License Agreements, Renewals and
Annual True-ups
• License Reharvesting and Reuse
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential4
IT Security Team Responsibilities
• Implementation of Security Policies and Processes
• Mitigate Risk of Breaches
• Maintain Compliance with Corporate and Industry
Regulatory Policies
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential5
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential6
Incidents WILL happen – Build resilience
Prevent
Processes and
technologies to close
holes and cracks
through which hackers
launch their attacks
Detect and Respond
Processes and
technologies to identify
attacks, stop them and
address the issues
associated with the
attack
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential7
Reduce the Attack Surface – Prevention
Software Deployed
Software Deployed
Software
Deployed
Unpatched, vulnerable software End-of-life, unsupported software
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential8
• Foundation
– Privilege control
– Segregation of duties
– Security training
– Patch Management
– Vulnerability Assessment
• Hardening
– Penetration testing
– Configuration Hardening
– SIEM
• Advanced
– Advanced Threat Detection
– Network Behavior Analysis
– Network forensics
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential9
Infrastructure Management
Security outside security functions
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential10
SAM Team Impact on Security
You can provide software inventory data
You own processes and tools to introduce and retire
applications
You help manage software upgrades
You have visibility over software usage
1
2
3
4
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential11
“Organizations that do not have complete software
inventories are unable to find systems running vulnerable or
malicious software to mitigate problems or root out
attackers.”
– SANS
“Enterprise patch management is dependent on having a
current and complete inventory of the patchable software
(applications and operating systems) installed on each host.”
– NIST
Sources:
SANS: ‘Critical Controls for Effective Cyber Defense’. Version 4.1. Page 12. http://www.sans.org/critical-security-controls/
NIST: Special Publication 800-40 Revision 3: ‘Guide to Enterprise Patch Management Technologies.’ Page 6 . http://www.nist.gov/itl/csd/guides-082013.cfm
Visibility – Inventory
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential12
Normalized Inventory Data is the Common Foundation
Normalized
Inventory Data
SAM Tool
Software
Vulnerability
Management
License
Entitlements
Vulnerability Data
Raw Discovery & Inventory Data
Asset
List
>>Click here to Watch this Webinar On Demand Now<<
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential13
Reduce the Introduction of Unauthorized Software
“By 2017, 25 percent of enterprises will have an
Enterprise App Store for Managing Corporate-
Sanctioned Apps on PCs and Mobile Devices.”
- Gartner
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential14
Reduce the Attack Surface by Eliminating Redundant and
Outdated Software
Source: Deloitte 2015
Rationalize & Consolidate Software
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential15
“Organizations need to plan for regular
upgrades and recognize the value of taking
control of their critical infrastructure proactively
– before an adversary does.”
- Cisco
Source: “Cisco Annual Security Report 2016” http://www.cisco.com/c/m/en_us/offers/sc04/2016-annual-security-report/index.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential16
Remove Unused Software to Reduce the Software Footprint
Enterprise App Store
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential17
How does Software Asset Management Relate to the
Software Vulnerability Management Lifecycle?
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential18
Software Vulnerability Management – Mitigate Risk
SOFTWARE
VULNERABILITIES
are an entry point for hackers or
work as enablers of privilege
escalation.
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential19
Vulnerabilities In All Products In 2015: 16,081
A 39% Increase In Vulnerabilities (5 Year Trend)
Source: “Flexera Software Vulnerability Review 2016.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/
16,081 vulnerabilities were discovered in 2,484 vulnerable products.
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential20
Time To Patch!
Patch Availability On The Day A Vulnerability Is Disclosed Is Improving
84% of all registered vulnerabilities had patches available on the day of disclosure.
You can patch most vulnerabilities – the trick is knowing what to patch.
Source: “Flexera Software Vulnerability Review 2016.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential21
What You Are Up Against
Time to first-known exploitation
Source: “2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential22
Vulnerability Management in today’s world
Security intelligence and management platforms to manage volume
“The increasing volume (of patches and upgrades)
is a main driver for organizations automating their
vulnerability management through the use of
security intelligence and management platforms
that help manage the volume of system and
software inventory, vulnerability, and threat
information.” - Cisco
Source: “Cisco Annual Security Report 2016”
http://www.cisco.com/c/m/en_us/offers/sc04/2016-annual-security-report/index.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential23
Our SAM and Security Vision
Enhanced Risk Management
Enhanced Vendor Management
Enhanced Application Portfolio
Management
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential24
Leverage Common Inventory for Software Vulnerability
Management – Maintain the Asset List
Data Feeds
Agent & Agent-less
Discovery for
Windows, UNIX,
Linux, MAC,
VMs, etc.
More easily monitor a
complete list of
applications for software
vulnerability advisories
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential25
Software Vulnerability Management Products
Reliable, Transparent, Integrated, Cloud-deployed Solutions
• Tactical handling of
vulnerability threats
• Risk assessment and
prioritization based on
vulnerability
intelligence from in-
house research
• Customer base
includes Financial
organizations, Energy
& Utilities and MSSPs
supporting customers
in highly regulated
industries
• Intelligent Security
Patching for the
Enterprise
• Closes the gap
between IT Operations
and Security
Secunia
Research
Vulnerability Database
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential26
SAM & Security Teams Must Work Together
• Leverage Common Inventory Data
• Reduce Software Footprint and
Attack Surface
• Increase Operational Efficiency
SAM Security
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential27
Resources
• Video: Vulnerability Intelligence Q&A
• Datasheet: Flexera Software Solutions for Enterprises
• White Paper: Normalized Inventory Data: The Foundation for Software Asset
Management. IT Service and Security
• White Paper: Vulnerability Intelligence: Incorporating the Most Critical
Component of a Full Compliance Solution
• Contact us
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential28
Contact Information:
Marcelo Pereira
Mpereira@flexerasoftware.com
For more information go to:
www.flexerasoftware.com/Enterprise
John Emmitt
JEmmitt@flexerasoftware.com
>>Click here to Watch this Webinar On Demand Now<<

Weitere ähnliche Inhalte

Was ist angesagt?

Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleSecuring Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
DevOps.com
 

Was ist angesagt? (20)

2015 Customer Choice Awards Infographic
2015 Customer Choice Awards Infographic2015 Customer Choice Awards Infographic
2015 Customer Choice Awards Infographic
 
Flexera Software's Why
Flexera Software's Why Flexera Software's Why
Flexera Software's Why
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
 
BDNA joins Flexera
BDNA joins FlexeraBDNA joins Flexera
BDNA joins Flexera
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
It Budget Tips
It Budget TipsIt Budget Tips
It Budget Tips
 
Enterprise Application Deployment Strategies for Windows 10
Enterprise Application Deployment Strategies for Windows 10Enterprise Application Deployment Strategies for Windows 10
Enterprise Application Deployment Strategies for Windows 10
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
 
Best Practices for Certificate Management
Best Practices for Certificate ManagementBest Practices for Certificate Management
Best Practices for Certificate Management
 
Introduction to Cobalt
Introduction to CobaltIntroduction to Cobalt
Introduction to Cobalt
 
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
What the Internet of Things means for the mobile enterprise - Ian Evans, AirW...
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise ScaleSecuring Red Hat OpenShift Containerized Applications At Enterprise Scale
Securing Red Hat OpenShift Containerized Applications At Enterprise Scale
 
The Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud WorldThe Future of the Data Center Network in a Multi-Cloud World
The Future of the Data Center Network in a Multi-Cloud World
 

Ähnlich wie SAM and Security Teams Must Join Forces to Enhance Security

Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
Andrew Kanikuru
 

Ähnlich wie SAM and Security Teams Must Join Forces to Enhance Security (20)

Desktop Software Asset Management – Today and Tomorrow
Desktop Software Asset Management – Today and TomorrowDesktop Software Asset Management – Today and Tomorrow
Desktop Software Asset Management – Today and Tomorrow
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 
SIG-product-overview.pdf
SIG-product-overview.pdfSIG-product-overview.pdf
SIG-product-overview.pdf
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware Protection
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Flexera Software Solutions for Enterprises
Flexera Software Solutions for EnterprisesFlexera Software Solutions for Enterprises
Flexera Software Solutions for Enterprises
 
Next-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approachNext-level mobile app security: A programmatic approach
Next-level mobile app security: A programmatic approach
 
Veracode - Overview
Veracode - OverviewVeracode - Overview
Veracode - Overview
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Security that Scales with Cloud Native Development
Security that Scales with Cloud Native DevelopmentSecurity that Scales with Cloud Native Development
Security that Scales with Cloud Native Development
 

Mehr von Flexera

Mehr von Flexera (16)

Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
 
Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
 
Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?Flexera Event - The Game Has Changed - Are You Ready?
Flexera Event - The Game Has Changed - Are You Ready?
 
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS ApplicationsKeeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
 
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsWebinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
Webinar: What's New in FlexNet Manager Suite 2016
Webinar: What's New in FlexNet Manager Suite 2016Webinar: What's New in FlexNet Manager Suite 2016
Webinar: What's New in FlexNet Manager Suite 2016
 

Kürzlich hochgeladen

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Kürzlich hochgeladen (20)

SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 

SAM and Security Teams Must Join Forces to Enhance Security

  • 1. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential1 SAM and Security Teams Must Join Forces to Enhance Security
  • 2. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential2 Speakers and Agenda Agenda • SAM and Security Team Responsibilities • Security Process • SAM Impact on Security • Vulnerability Management • Integrated Solutions Marcelo Pereira Product Marketing Manager Flexera Software John Emmitt Manager, Enterprise Marketing Flexera Software >>Click here to Watch this Webinar On Demand Now<<
  • 3. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential3 SAM Team Responsibilities • License Compliance and Audit Defense • Software License Agreements, Renewals and Annual True-ups • License Reharvesting and Reuse
  • 4. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential4 IT Security Team Responsibilities • Implementation of Security Policies and Processes • Mitigate Risk of Breaches • Maintain Compliance with Corporate and Industry Regulatory Policies
  • 5. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential5
  • 6. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential6 Incidents WILL happen – Build resilience Prevent Processes and technologies to close holes and cracks through which hackers launch their attacks Detect and Respond Processes and technologies to identify attacks, stop them and address the issues associated with the attack
  • 7. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential7 Reduce the Attack Surface – Prevention Software Deployed Software Deployed Software Deployed Unpatched, vulnerable software End-of-life, unsupported software
  • 8. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential8 • Foundation – Privilege control – Segregation of duties – Security training – Patch Management – Vulnerability Assessment • Hardening – Penetration testing – Configuration Hardening – SIEM • Advanced – Advanced Threat Detection – Network Behavior Analysis – Network forensics
  • 9. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential9 Infrastructure Management Security outside security functions
  • 10. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential10 SAM Team Impact on Security You can provide software inventory data You own processes and tools to introduce and retire applications You help manage software upgrades You have visibility over software usage 1 2 3 4
  • 11. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential11 “Organizations that do not have complete software inventories are unable to find systems running vulnerable or malicious software to mitigate problems or root out attackers.” – SANS “Enterprise patch management is dependent on having a current and complete inventory of the patchable software (applications and operating systems) installed on each host.” – NIST Sources: SANS: ‘Critical Controls for Effective Cyber Defense’. Version 4.1. Page 12. http://www.sans.org/critical-security-controls/ NIST: Special Publication 800-40 Revision 3: ‘Guide to Enterprise Patch Management Technologies.’ Page 6 . http://www.nist.gov/itl/csd/guides-082013.cfm Visibility – Inventory
  • 12. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential12 Normalized Inventory Data is the Common Foundation Normalized Inventory Data SAM Tool Software Vulnerability Management License Entitlements Vulnerability Data Raw Discovery & Inventory Data Asset List >>Click here to Watch this Webinar On Demand Now<<
  • 13. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential13 Reduce the Introduction of Unauthorized Software “By 2017, 25 percent of enterprises will have an Enterprise App Store for Managing Corporate- Sanctioned Apps on PCs and Mobile Devices.” - Gartner
  • 14. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential14 Reduce the Attack Surface by Eliminating Redundant and Outdated Software Source: Deloitte 2015 Rationalize & Consolidate Software
  • 15. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential15 “Organizations need to plan for regular upgrades and recognize the value of taking control of their critical infrastructure proactively – before an adversary does.” - Cisco Source: “Cisco Annual Security Report 2016” http://www.cisco.com/c/m/en_us/offers/sc04/2016-annual-security-report/index.html
  • 16. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential16 Remove Unused Software to Reduce the Software Footprint Enterprise App Store
  • 17. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential17 How does Software Asset Management Relate to the Software Vulnerability Management Lifecycle?
  • 18. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential18 Software Vulnerability Management – Mitigate Risk SOFTWARE VULNERABILITIES are an entry point for hackers or work as enablers of privilege escalation.
  • 19. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential19 Vulnerabilities In All Products In 2015: 16,081 A 39% Increase In Vulnerabilities (5 Year Trend) Source: “Flexera Software Vulnerability Review 2016.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/ 16,081 vulnerabilities were discovered in 2,484 vulnerable products.
  • 20. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential20 Time To Patch! Patch Availability On The Day A Vulnerability Is Disclosed Is Improving 84% of all registered vulnerabilities had patches available on the day of disclosure. You can patch most vulnerabilities – the trick is knowing what to patch. Source: “Flexera Software Vulnerability Review 2016.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/
  • 21. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential21 What You Are Up Against Time to first-known exploitation Source: “2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
  • 22. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential22 Vulnerability Management in today’s world Security intelligence and management platforms to manage volume “The increasing volume (of patches and upgrades) is a main driver for organizations automating their vulnerability management through the use of security intelligence and management platforms that help manage the volume of system and software inventory, vulnerability, and threat information.” - Cisco Source: “Cisco Annual Security Report 2016” http://www.cisco.com/c/m/en_us/offers/sc04/2016-annual-security-report/index.html
  • 23. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential23 Our SAM and Security Vision Enhanced Risk Management Enhanced Vendor Management Enhanced Application Portfolio Management
  • 24. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential24 Leverage Common Inventory for Software Vulnerability Management – Maintain the Asset List Data Feeds Agent & Agent-less Discovery for Windows, UNIX, Linux, MAC, VMs, etc. More easily monitor a complete list of applications for software vulnerability advisories
  • 25. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential25 Software Vulnerability Management Products Reliable, Transparent, Integrated, Cloud-deployed Solutions • Tactical handling of vulnerability threats • Risk assessment and prioritization based on vulnerability intelligence from in- house research • Customer base includes Financial organizations, Energy & Utilities and MSSPs supporting customers in highly regulated industries • Intelligent Security Patching for the Enterprise • Closes the gap between IT Operations and Security Secunia Research Vulnerability Database
  • 26. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential26 SAM & Security Teams Must Work Together • Leverage Common Inventory Data • Reduce Software Footprint and Attack Surface • Increase Operational Efficiency SAM Security
  • 27. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential27 Resources • Video: Vulnerability Intelligence Q&A • Datasheet: Flexera Software Solutions for Enterprises • White Paper: Normalized Inventory Data: The Foundation for Software Asset Management. IT Service and Security • White Paper: Vulnerability Intelligence: Incorporating the Most Critical Component of a Full Compliance Solution • Contact us
  • 28. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential28 Contact Information: Marcelo Pereira Mpereira@flexerasoftware.com For more information go to: www.flexerasoftware.com/Enterprise John Emmitt JEmmitt@flexerasoftware.com >>Click here to Watch this Webinar On Demand Now<<