lumension security solutions
DESCRIPTION
Lumension Security Vulnerability Management, Endpoint and Data Protection Brief.TRANSCRIPT
![Page 1: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/1.jpg)
Lumension SecuritySolutions
![Page 2: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/2.jpg)
© Copyright 2008 - Lumension Security
Optimal Security Solutions
Optimal Security
Proactive Risk Management and Operational and
Security
Security & Compliance Reporting
Endpoint Protection
Vulnerability Management
Data Protection
Best Pra
ctice
s
Ope
n Sta
ndar
ds
Integrated Platform
Flexible Architecture
![Page 3: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/3.jpg)
© Copyright 2008 - Lumension Security 3
Lumension Solutions
3
Vulnerability Management
Endpoint Protection
Data Protection
Security & Compliance Reporting
![Page 4: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/4.jpg)
© Copyright 2008 - Lumension Security
Effectiveness - Risk Reduction and Threat Elimination
VulnerabilityManagementRemoves risk from
technology
EndpointProtection
Filters threats from technology
IT Operations: IT SecurityThe Endpoint
Reduces attackable “surface area” Stops attacks
Optimal Security
Optimised securityLower support burdensIncreased user productivityLower TCO
![Page 5: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/5.jpg)
© Copyright 2008 - Lumension Security
Vulnerability Management Solution
![Page 6: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/6.jpg)
© Copyright 2008 - Lumension Security
Lumension Security Vulnerability Management Suite
DiscoverDiscover all network assets
AssessVulnerability and configuration assessmentNetwork + agent-based scanners with integrated view
PrioritisePrioritise threats and mitigation actions
RemediateDeploy Security patchesMitigate risk with custom remediations
ReportNumerous reporting optionsReporting across entire Enterprise Network
Lumension Security Vulnerability Management Suite is a process-driven solution:
![Page 7: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/7.jpg)
© Copyright 2008 - Lumension Security
In-Depth Discovery
Provides visibility to the entire network environment to discover all assets, both managed and unmanaged
7
In-depth scans of heterogeneous networks to discover all computing assets
Flexible grouping and classification
Discover silent or hidden network nodes, even if not currently managed by agents
![Page 8: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/8.jpg)
© Copyright 2008 - Lumension Security
Assess against Lumension’s large pre-built vulnerability and configuration repositories as well as customized vulnerability policies.
Agent & agent-less assessment options provide complete enterprise visibility
Credentialed-based scanner performs deep analysis of endpoints to accurately discover & determine vulnerabilities without impacting production environments or network assets
8
Thorough Assessment
Assess OS, Application, and Security Configuration vulnerabilities that exist within the network environment to proactively identify and prioritise known issues before they can be exploited
![Page 9: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/9.jpg)
© Copyright 2008 - Lumension Security
Detailed Prioritisation
Multiple views of vulnerabilities grouped by vulnerability specifics or by computing assets (machines).
9
Prioritise vulnerability assessment information by vulnerability severity and/or organisational impact.
![Page 10: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/10.jpg)
© Copyright 2008 - Lumension Security
Intelligent Patch & Remediation
Agent-based patch & remediation tool simplifies the process of maintaining a secure environment by continuously monitoring, detecting and remediating policy-driven environments
Automatically and quickly deploys patches to an entire network across many different platforms (e.g. Windows, Linux, Unix, Mac) and across applications (e.g. Adobe, WinZip, Real Networks)
10
Lumension Vulnerability Management provides fully integrated agent-based remediation capabilities in heterogeneous environments.
![Page 11: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/11.jpg)
© Copyright 2008 - Lumension Security
Comprehensive Reporting
Single and consolidated management console provides a holistic view of environmental risk
Composite Reports combine the discovery and assessment information from both network and agent-based scanners to provide a more complete view of the environment
Role-based administration provides tailored information to the appropriate audiences.
11
Full range of operational and management reports
![Page 12: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/12.jpg)
© Copyright 2008 - Lumension Security
Benefits
12
Discover, assess, prioritise, remediate & report on the entire network environment from one solution.
Complete enterprise visibility and effective vulnerability assessment via network and agent-based scanners.
Single solution to patch and remediate a heterogeneous network with our scalable remediation tools and various deployment options.
Comprehensive and policy-based reporting capabilities for business analysis and compliance.
![Page 13: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/13.jpg)
© Copyright 2008 - Lumension Security
Endpoint Protection Solution
![Page 14: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/14.jpg)
© Copyright 2008 - Lumension Security
Lumension Security Endpoint Protection
white
grey
black
Trusted applications that serve a business purpose and are supported by the organisation
Unwanted applications that are not condoned by the organisation. These can be explicitly added to the black or automatically if not in grey or white.
Extended trust based on context:• Process• Publisher• Path• Person
![Page 15: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/15.jpg)
© Copyright 2008 - Lumension Security
Lumension Security Endpoint Protection Solution
Malware and threat protection without signature updates or
behavioral technologies
Authorises only trusted applications that serve a legitimate
business need
Lowers helpdesk burden and operational TCO by enforcing
supported software and eliminating system conflicts
Increases end-user productivity by preventing non-business
applications from being installed
![Page 16: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/16.jpg)
© Copyright 2008 - Lumension Security
Data Protection Solution
![Page 17: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/17.jpg)
© Copyright 2008 - Lumension Security
17
Lumension Security Data Protection Solution
Protects data from theft or loss
Controls the flow of data to devices(inbound and outbound data including port access)
Encrypts data (moved onto removable devices)
Detailed forensics and auditing(of data moved to / from a device)
Enables Compliance(Data Protection Regulations and Standards)
Device Control
Integrated PGP Whole Disk Encryption
![Page 18: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/18.jpg)
© Copyright 2008 - Lumension Security
Security & Compliance Reporting
![Page 19: Lumension Security Solutions](https://reader035.vdocuments.net/reader035/viewer/2022062405/556691b0d8b42a78708b490e/html5/thumbnails/19.jpg)
© Copyright 2008 - Lumension Security
19
Security & Compliance Reporting
Measure and Ensure Network Security
Demonstrate Compliance to Security Policies and Regulations
Use or Extend Over Two-Dozen Sample Reports
Easily Create and Share Custom Reports
Open Reporting Schema Works With Existing Reporting Tools
Consolidated Analysis and Reporting of all Enterprise Vulnerability Management Information