1 / 32

Your Partner for Superior Cybersecurity

With 20+ years of experience, Duncan McAlynn is your trusted partner in cybersecurity. Protect your organization from ransomware, phishing, and data breaches with our advanced endpoint security solutions.

Download Presentation

Your Partner for Superior Cybersecurity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Duncan McAlynn – Principal/Security Evangelist Your Partner for Superior Cybersecurity

  2. PS:>WHOAMI • 20+ Years Enterprise Management & Security • Ivanti Security Engineer/Evangelist • 6x Microsoft MVP • FBI InfraGard Member • Author, Columnist, Presenter • Currently authoring Advanced Windows Security • Follow me, Let’s connect: @infosecwar, in/duncanmcalynn

  3. Our Security Risks are Higher Than Ever! 1 in 2 40% $19.95/mo. executives experience a ransomware attack IBM X-Force Research buys hackers easy-to-use “as-a-service” options for attacks ZDNet of spam contains ransomware IBM X-Force Research

  4. 30% of recipients open phishing messages click on attachments 12% 2016 Verizon DBIR

  5. We Can’t Afford to be Wrong on This One! 93% 70% $1B USD of data breaches compromise organizations in minutes or less in ransom paid in 2016! DON’T DO IT! of cornered businesses hit pay the ransom DON’T DO IT! 2016 Verizon DBIR IBM X-Force Study FBI Estimate

  6. Bring IT Ops and Security Together Privilege management Both Only Security Only IT Setting IT access control panels Server OS patching Application whitelisting Security alerts

  7. Feedback from a Chertoff Groupsurvey a of 100 CIO/CISO’s most important security challenges in managing their endpoints today “We have to tear down the traditional view of what anIT operations entity is and whata security entity is.”

  8. Feedback from a Chertoff Group survey of 100 CIO/CISOs “IT wants things to work smoothly, while security wants security. At the endpoint, they have to work together to maintain both.”

  9. Feedback from a Chertoff Group survey of 100 CIO/CISOs “You do not need 15 best-in-breed productsfor a successful layered approach to cybersecurity.”

  10. Unfocused Security Strategies Lead to Expense in Depth

  11. Make Sense of Endpoint Security – TechRadar Results Report key takeaways: • Endpoint security is critical to defend against data breaches. • Security pros seek to balance prevention and detection. • Consolidating technologies leads to more effective suites. Source: Forrester TechRadar™: Endpoint Security, Q1 2017, by Chris Sherman, January 27, 2017

  12. Focused Strategies Lead to Strategic IT Success • Provide defense in depth. • Integrate the environment to discover the breadth of risk. • Provide tech that reduces the attack surface. • Analyze data for insight into issues. • Take action to solve problems. • Balance security with user needs. • Learn about users and discover their needs. • Provide security without interfering with jobs. • Silently provide service through upgrades and risk evasion. • Increase productivity with the right tools.

  13. Our Approach to Security Discover Provide insight Integrated, easy-to-use security offering Take action Easily find and quantify the assets you need secured. Clearly identify risk. Use best-in-breed tools to act swiftly.

  14. Our Defense-in-Depth Solutions Patch & Vulnerability Management Secure Program Management Application Control & Privilege Management Endpoint Security Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Patch and secure the OSes and 3rd-party apps that you can. • Ivanti Patch for Endpoints • Ivanti Patch for Servers • Ivanti Patch for SCCM • Ivanti Application Control for Endpoints • Ivanti Application Control for Servers • Ivanti Application Control for SCCM • Ivanti Service Manager • Ivanti Asset Manager • Ivanti Endpoint Security • Ivanti Server Security Discovery

  15. Our Defense-in-Depth Solutions Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management • Ivanti Patch for Endpoints • Ivanti Patch for Servers • Ivanti Patch for SCCM • Ivanti Application Control for Endpoints • Ivanti Application Control for Servers • Ivanti Application Control for SCCM • Ivanti Endpoint Security • Ivanti Server Security • Ivanti Service Manager • Ivanti Asset Manager Discovery

  16. Tie It All Together with Real-Time Dashboard Reporting Cut through the mass of information to the critical insights that matter • Pre-built connectors for nearlyevery tool you use • No coding, business intelligence gurus, spreadsheets, or data silos • Customized SIEMs connectors too!

  17. Security Compliance

  18. Critical Security Controls (CSC) The Center for Internet Security Critical Security Controls ensure a more secure environment. • Prioritized list of focused actions • Compliant with all industry and government security requirements • Based on experience with actual attacks • Block initial compromises and detect compromised devices

  19. The first 5 controls CIS, US-CERT, ASD, and other authorities prioritize these five elements of foundational cyber hygiene to significantly reduce security threats. (As much as 80-95% of security vulnerabilities!) Inventory of authorized and unauthorized devices Inventory of authorized and unauthorized software Secure configuration Controlled use of administration privileges Continuous vulnerability assessment and remediation

  20. Our defense-in-depth solutions Patch & Vulnerability Management Secure Program Management Application Control & Privilege Management Endpoint Security Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Patch and secure the OSes and 3rd-party apps that you can. • Asset management • Service management • Secure configuration management • Patch management • Vulnerability management • Application control • Privilege management • Device control • Anti-malware • Threat alerting Discovery

  21. Ivanti in Action

  22. THANK YOU! Special Offer for Data Connector’s Attendees: 50% off Advanced Windows Security Book http://www.leanpub.com/advancedwindowssecurity Code: dataconnectors

  23. Duncan McAlynnPrincipal Engineer, Security Evangelistduncan.mcalynn@ivanti.com@infosecwarlinkedin.com/in/duncanmcalynn

More Related