endpoint protection project 2014 presentation to ctsc 5 february 2015
TRANSCRIPT
![Page 1: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/1.jpg)
ENDPOINT PROTECTIONPROJECT
2014
P r esen t a t i o n t o CTS C
5 Feb r u a r y 2 0 1 5
![Page 2: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/2.jpg)
WHY ARE WE DOING THIS?
• Antivirus is not top priority industry-wideCCIRC does not list endpoint or antivirus:https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/tp-strtgs-eng.aspx
• Our numbers reflect poor detection & cleanup
![Page 3: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/3.jpg)
GARTNER HYPE CYCLE
![Page 4: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/4.jpg)
CCIRC ADVICE
![Page 5: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/5.jpg)
![Page 6: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/6.jpg)
![Page 7: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/7.jpg)
JAN 2015 MEETINGTOPICS COVERED
• Introduction of Brad Krane, Adam Savage• Deployment update (podium)• Technology selection criteria• Are we really getting our money’s worth with
SEP?• Contents of report back to CTSC• https://uwaterloo.ca/information-systems-tec
hnology/about/organizational-structure/information-security-services/wnag-ep-subgroup-meetings
![Page 8: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/8.jpg)
FORMAL REPORT BACK TO CTSC:TOPICS
• Concerns related to moving away from SEP for general users
• Advice to FACCUS with respect to a/v for students
• Recommendations/requirements for deployment strategies, regardless of technology
![Page 9: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/9.jpg)
TO RFP OR NOT TO RFP?
• No: 5• Yes: 3• Abstain: 3
![Page 10: ENDPOINT PROTECTION PROJECT 2014 Presentation to CTSC 5 February 2015](https://reader036.vdocuments.net/reader036/viewer/2022070410/56649ed85503460f94be63f3/html5/thumbnails/10.jpg)
REMINDER OF:QUESTIONS FOR CTSC
Does campus:• Rely on off-host protection exclusively• Combine on-host protection with off-host• All-in with on-host protection• All-in on vendor “single pane of glass” type
solutions
And does it need to be one size fits all?
Also, work-from-home?