The IT Pro’s Guide to Simplified Endpoint Security How to reduce the complexity of securing your organization’s endpoints—and make your life easier. With proliferating laptops, smartphones and other endpoint devices; multiplying third-party apps and productivity tools, along with their associated vulnerabilities; and escalating threats from polymorphic viruses, botnets, SQL injections and other attacks, endpoint security has never been more challenging. October 2011 WP-EN-10-17-11 The IT Pro’s Guide to Simplified Endpoint Security Overview ment consoles you need to worry about, stream- “There is never any justification for things being line the amount of agents that plague user devices, complex when they could be simple.” So says Ed- avoid lost time, resources and money, and make ward de Bono, author, inventor, Nobel prize nomi- your own life just a little bit easier. nee and originator of the concept of lateral thinking. That’s certainly true of endpoint security. There was a time when endpoint security simply meant admonishing employees to use strong passwords on their computer terminals. But those days are long gone. With proliferating laptops, smartphones and other endpoint devices; multiplying third-party apps and productivity tools, along with their associated vulnerabilities; and escalating threats from polymorphic viruses, botnets, SQL injections and other attacks, endpoint security has never been more challenging. As a result, you need to grapple every day with a growing number of security applications and security-management consoles. Meanwhile, your users face degraded system performance from the numerous antivirus (AV) programs, firewalls and other security measures that sit on their devices. That’s costing your entire organization time, money and focus. And let’s face it: the more complex your security, the weaker it’s going to be. But the fact is all that endpoint-security complexity is largely unnecessary. It’s possible to achieve true defense-in-depth—with layers of patch management, application control, device control and AV— without slow performance and complex management. By deploying the right security software and techniques, you can slash the number of manage- Endpoint Complexity, Agent Bloat Endpoint security has become tougher quite simply because the endpoint environment has become more dynamic and complex. For starters, there are just more endpoints. Employees now have desktops, laptops, smartphones and other devices. And those endpoints are no longer chained to a desk. Instead, they move around the enterprise and around the world. All the while, they’re carrying more and more data—about customers, products, financials, strategy, competitive positioning, and more. On top of that, employees increasingly rely on a range of third-party and social-media apps to do their jobs—and manage their personal lives. These apps are downloaded onto endpoints, often without strict centralized oversight, where they bring with them security vulnerabilities that can’t be effectively mitigated with traditional approaches such as Windows Server Update Services (WSUS). Then there are the growing endpoint threats, from sophisticated viruses, click-jacking, social engineering, and more. New threats, or new twists on old ones, are commonplace and need to be assessed, addressed and brought under control. It’s no wonder IT managers report that the areas with the greatest increase in potential risk are desktops/ laptops and mobile/remote employees.1 1. Ponemon Institute, “State of Endpoint Risk,” 2010 1 The IT Pro’s Guide to Simplified Endpoint Security The average endpoint today houses three to five individual security agents. Consoles Run Amok Endpoint complexity doesn’t just mean more agents on your endpoints. It also leads to more consoles for So what do you do? If you’re like most security pros, IT security professionals to manage. you throw technology at the problem. (See Figure 1.) And now your endpoints carry the extra bur- Today’s organizations have likely invested in a broad den of individual agents for firewalls, anti-spyware, range of endpoint-security products, including AV, patch management, encryption, intrusion detection, endpoint firewalls, application firewalls, patch man- and at least one AV product, probably several. In agement, encryption, intrusion detection, configura- fact, the average endpoint today houses three to tion management, vulnerability assessment, applica- five individual security agents, and it’s not at all un- tion whitelisting, network access control, data-loss usual for an endpoint to be bloated with 10 agents. prevention and removable-media control. 2 [Figure 1] Common Technologies for Protecting and Managing Endpoints Protect Data »» Full-disk encryption Manage »» Online backup/recovery »» Endpoint device/port controls »» Agent-based data-loss prevention Applications »» Application controls/application whitelisting »» Software distribution »» Software inventory/usage management »» Application virtualization Networks »» Personal firewalls »» Intrusion detection/prevention »» Network access control Platforms »» Antivirus »» IT asset management »» Anti-spyware »» Configuration/change management »» Patch management »» Configuration/change management Source: Aberdeen Group, “Endpoint Security, Endpoint Management,” 2009 IT organizations must grapple with a growing range of security and management solutions to keep control over their endpoints. 2. Ponemon Institute, “State of the Endpoint,” 2009 2 The IT Pro’s Guide to Simplified Endpoint Security And each one of those point products can require you It’s no surprise, then, that security pros increasing- or your staff to access and monitor a separate man- ly feel overwhelmed by the endpoint-security tools agement console. In fact, the average organization they need to keep track of. The result is discourag- now grapples with three to five different consoles to ing, if predictable: Only 38 percent of organizations manage day-to-day endpoint-security functions. say their endpoint security is well-managed, and 3 only 37 percent say they have the necessary resources to minimize endpoint risk. 4 (See Figure 2.) [Figure 2] Attributes about endpoint security Agree = strongly agree and agree combined. Disagree = unsure, disagree and strongly disagree combined. Our IT and security personnel are qualified to execute endpoint security operations. 51% 49% New whitelisting technologies make it easier to efficiently manage endpoint security risks. 42% 58% Our IT endpoint risk management procedures and policies are well documented. 41% 59% IT executives are supportive of our organization’s endpoint security operations. 41% 59% Existing blacklisting technologies (anti-virus/anti-malware) are effective in managing endpoint security risks. 39% 61% Our endpoint security operations are well managed. 38% 62% We have ample resources to minimize IT endpoint risk throughout our organization. 37% 63% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Source: Ponemon Institute, “State of Endpoint Risk,” December 2010 Organizations report that they lack sufficient resources to minimize endpoint risk, and that endpoint security remains poorly managed. 3. Ibid. 4. Ponemon Institute, “State of Endpoint Risk,” 2010 3 The IT Pro’s Guide to Simplified Endpoint Security Diminishing Returns »» Decreased productivity for users— But it’s not The problems with too many agents and too many just the IT department’s focus and productivity consoles—that is, with unnecessary endpoint-se- that’s at stake. Every new security agent curity complexity—are manifold: that gets tossed onto your users’ endpoints delivers a performance hit to their machines. »» Increased time demands for security pros— The first and most obvious issue is the impact Those degraded response times, while hard on IT department time and resources. And to measure in the aggregate, cost real dollars make no mistake: “The burden for keeping in lost productivity. They also lead to less endpoint systems secure, compliant and satisfied users. Users who are more likely to be well-managed is nearly always a centralized distracted from the job at hand and erode your function shouldered by the IT group,” organization’s strategic focus. And, incidentally, according to “Endpoint Security, Endpoint users who are more likely to call the helpdesk Management,” an Aberdeen Group report. with performance complaints, bringing the issue full circle back to the IT department. The fact is, there will always be new security threats to learn about, plan for and deal with. What’s worse, users then become more And that’s where your attention should be, apt to take endpoint security into their own to ensure optimum protection and business hands—clearly not the way to ensure efficient, continuity for your organization. If your time effective security across your organization. is taken up with staying on top of multiple Remarkably, 36 percent of endpoint devices consoles for endpoint-security point products, are managed by the user, not the enterprise. your focus won’t be on more strategic issues. And because a growing number of users have more than one endpoint, there are 40 percent more endpoints than end users. 5 Which means there are lot of endpoints that aren’t wellmanaged from a security perspective. 5. Aberdeen Group Analyst Insight, 2011 Continued » 4 The IT Pro’s Guide to Simplified Endpoint Security » »» Rising costs— The result of increased time Selling Endpoint Security demands and decreased productivity is greater It almost always comes down to cost. That’s true for business, cost. In fact, 48 percent of companies report it’s true for politics, and yes, it’s true for IT security. Security- an increase in their IT organization’s operating investment decisions are ultimately made by the business side costs. The primary cost drivers are increasing of the house. And educating business managers on the finer helpdesk calls, reimaging of endpoints, points of polymorphic malware and host-based intrusion pre- consumption of IT-staff bandwidth, and lost vention is probably a losing battle. But if you can appeal to the employee productivity.6 (See Figure 3.) purse strings, if you can take your case to the pocketbook, then you have a much better chance of getting the financial Those numbers aside, perhaps the bigger issue support you need to ensure a strong security profile. is that many costs associated with endpointsecurity complexity are largely unseen. Exactly And the way to achieve that is by targeting endpoint-security how much time, productivity and money are complexity. Consider: The top three drivers of endpoint invest- leaking away can be difficult to ascertain. And ments are the increased mobility of sensitive information, user you can’t manage what you can’t measure. productivity, and security-related incidents such as data loss. That’s according to “Endpoint Security, Endpoint Manage- There’s also the expense for the point ment,” an Aberdeen Group survey of managers, directors and solutions you’re throwing at endpoint security. executives on their approaches to endpoint protection. The price tag for each product might seem reasonable in the short term, but in the At the same time, the top inhibitors of endpoint investments are aggregate they can spell high total cost of “the complexity of the typical endpoint environment and the ownership (TCO). In fact, nearly one-half of perceived complexity of current endpoint security,” Aberdeen the TCO of every endpoint is now associated reports. In other words, security concerns are key reasons for with security management.7 endpoint investments. But the complexity of those endpoints, and of the technologies for securing them, are the key reasons »» Sinking security— But the biggest problem is that the more complex and costly your against making those investments. endpoint security, the less effective it’s going By focusing on reducing endpoint-security complexity, you can to be. The more time it takes for security not only reduce the TCO of protecting your endpoints. You can managers to handle security, the more onerous also provide clarity to management to gain their buy-in and it is for users to keep their endpoints secure, » ensure you’re investing in the mechanisms that will keep your the more company resources are strained, the endpoints truly protected. less time, focus and money will be available to ensure your endpoints are truly protected. 6. Ponemon Institute, “State of Endpoint Risk,” 2010 7. Aberdeen Group, “Endpoint Security, Endpoint Management,” 2009 5 The IT Pro’s Guide to Simplified Endpoint Security [Figure 3] What are the main cost drivers to increasing IT operating expenses? Source: Ponemon Institute, “State of Endpoint Risk,” December 2010 Endpoint complexity, increased demands on IT staff and decreased employee productivity are among the top drivers of IT costs. The facts speak for themselves. Fully 98 But the toughest security challenge isn’t the vul- percent of organizations experience at least nerabilities, threats or attacks. The most vexing one virus or malware network intrusion a year. security issue organizations face is complexity. In And 89 percent of organizations have lost fact, 54 percent of IT security pros cite managing sensitive data because of security incidents. 8 the complexity of security as their No. 1 challenge. 9 That’s despite the fact organizations are investing more and more in endpoint security. 8. Ponemon Institute, “State of Endpoint Risk,” 2010 Continued » 9. Ibid 6 The IT Pro’s Guide to Simplified Endpoint Security Simplify, Simplify, Simplify “The best-in-class companies in the study are about For a growing number of organizations, the solu- 11 percent more likely to strive for an integrated se- tion to endpoint complexity—and to the associated curity and management solution for all endpoints, productivity, cost and security penalties—is to re- as opposed to implementing endpoint security and place their hodgepodge of point products with an management solutions deemed most appropriate integrated endpoint-security suite. for the immediate problem at hand,” according to the report. “This long-arching trend toward a platform That’s the approach observed in an Aberdeen Group approach, versus the perpetuation of existing, inde- survey of managers, directors and executives re- pendently managed silos, is another characteristic sponsible for endpoint security. Results of the study of the best-in-class that repeats itself consistently in enabled Aberdeen to identify “best-in-class” orga- the thread of Aberdeen’s IT security research.” nizations—those that perform best in terms of IT security incidents and management costs. The top strategies driving endpoint investments among these best-in-class organizations include Best-in-class companies [are] more likely to strive for an integrated security and management solution for all endpoints. establishing and enforcing consistent endpoint policies and procedures; educating users on endpoint security, compliance and management; moving toward common security solutions for all endpoints; and augmenting existing endpoint security with centralized management.10 (See Figure 4.) [Figure 4] Top Strategies Driving Current Endpoint Investments 60% 64% Best-in-Class 64% 40% 20% 0% Establish and enforce consistent policies and procedures related to endpoints Educate end-users about endpoint security, compliance, and management policies and practices 36% 36% Strive towards common security and management solutions for all endpoints Augment existing endpoint security solutions with centralized management Source: Aberdeen Group, “Endpoint Security, Endpoint Management,” 2009 Top endpoint-security strategies among “best-in-class” organizations include enforcing consistent policies, educating users, moving toward common endpoint-security solutions, and adding centralized management. 10. Aberdeen Group, “Endpoint Security, Endpoint Management,” 2009 7 The IT Pro’s Guide to Simplified Endpoint Security » Lumension® Endpoint Management and Security Suite For starters, an effective suite solution should be modular. That allows you to deploy only what you require today and then add functionality as your needs Lumension® Endpoint Management and Security change. And it should include an installation man- Suite is a single, integrated endpoint security suite ager , so you can quickly and easily deploy new ca- designed to deliver best-in-class security func- pabilities. That also affords you a level of scalability tionality through a single-console, single-agent, that even the most robust point products can’t match. single-server platform. Its modular architecture covers AV, patch management, configuration Those modules should include everything you need management, application control, device control, to ensure strong endpoint security, including AV, asset management and power management. patch management, configuration management, application control, device control, asset manage- Also included is innovative “intelligent whitelisting,” ment and power management. In fact, a good suite which provides a high level of endpoint security will deliver improved security compared to your old and flexibility, reducing malware risks and costs point products, while ensuring that the features and without negatively affecting employee productivity. functions are integrated and work together seamlessly. To that end, the solution should be built on a Lumension ® Endpoint Management and Secu- single back-end database, it should rely on a single, rity Suite enables you to take control of your end- modular agent at the endpoints, and it should be points through an agile solution suite that simpli- manageable from a single security console. fies systems management, improves operational visibility and delivers more effective security—all That management console should give you true while reducing endpoint complexity and TCO. visibility into your endpoint-security posture and a » Finding the Suite Spot single version of the truth. It should also allow rolebased access so that one console can be used by multiple IT, security and compliance pros. That’s in sharp contrast with a collection of consoles for various point products or a “single” console that Replacing point products with an integrated end- actually saddles you with a different interface for point security suite might sound like a daunting— each security function. and expensive—undertaking. But a well-designed suite solution will make the transformation efficient A good suite will enable the convergence of both se- and cost-effective in the short term, and it will pay curity and operations for your endpoints. Likewise, off in stronger security dividends over time. it should ensure unified workflows for endpoint as- 8 The IT Pro’s Guide to Simplified Endpoint Security sessment, security management, incident response endpoint per year through an integrated platform and continuous improvement. And it should enable and greater consolidation.11 (See Figure 5.) shared visibility, policy and reporting management. That lets you approach endpoint security from a stra- But perhaps the biggest benefit of an integrated tegic standpoint, rather than responding on an ad- endpoint-security suite is consolidated security in- hoc basis to new threats and unexpected incidents. formation and visibility. The aggregation of formerly disparate views enables you to achieve a complete The advantages of an integrated solution are clear understanding of your risk profile and drive toward a and compelling: stronger security profile. Ultimately, you gain the abil- »» Fewer management consoles ity to make your endpoint security cheaper and more »» A lower number of endpoint agents effective. And if it makes your life a little easier in the »» A simplified interface process, there’s certainly nothing wrong with that. »» Decreased complexity »» Increased visibility Ready to take the next step? Access the free Inter- »» Lower staff requirements active Endpoint Security and Endpoint Operations »» Reduced cost Benchmark Assessment, developed by Aberdeen »» Improved security Group and sponsored by Lumension. In just a few minutes, you’ll gain insight to identify the strate- In fact, the potential for reduced cost alone is no- gies, capabilities and technologies you need to table: Organizations can save as much as $24 per achieve best-in-class endpoint security. [Figure 5] Top Benefits of Integrated Endpoint Management Suite Improved security Reduced cost Reduced staff requirements Increased visbility Simplified interface Reduced complexity Fewer endpoint agents Fewer management consoles 0 Source: Ponemon Institute, “State of Endpoint Risk,” December 2009 10 20 30 40 Percent 50 60 The top benefits of an integrated endpoint management suite range from a reduced number of consoles and agents to a better overall security posture, according to a global survey of IT security pros. 11. Aberdeen Group, “Endpoint Security, Endpoint Management,” 2009 9 The IT Pro’s Guide to Simplified Endpoint Security About Lumension Security, Inc. Lumension Security, Inc., a global leader in operational endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, and Compliance and Risk Management offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Florida, Texas, Luxembourg, the United Kingdom, Germany, Ireland, Spain, France, Australia, and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at www.lumension.com. Lumension, Lumension Patch and Remediation, Lumension Vulnerability Management Solution, “IT Secured. Success Optimized.”, and the Lumension logo are trademarks or registered trademarks of Lumension Security, Inc. All other trademarks are the property of their respective owners. Global Headquarters 8660 East Hartford Drive, Suite 300 Scottsdale, AZ 85255 USA phone: +1.888.725.7828 fax: +1.480.970.6323 www.lumension.com Vulnerability Management | Endpoint Protection | Data Protection | Compliance and IT Risk Management 10
© Copyright 2026 Paperzz