Title: Network Consulting Services, Inc
1Network Consulting Services, Inc
Endpoint Threatscape and Security
October 20, 2005
2Agenda
- Endpoint Security Principles and Priorities
- Business Priorities
- Threatscape
- Wireless Hacking Demo
- Business Community Direction
3Endpoint Security Principles
Secure
Functional
4Endpoint Security Principles
5Information Technology Priorities
Security was and is a top priority
6Security Market Growth
- Regulatory is driving companies to enforce
security best practices - Recent high-profile malicious attacks exploited
known vulnerabilities - Growing demand of managing complex networks is
driving companies to become proactive in managing
vulnerabilities
Source Broadview International March 2005 IDC
2004
7Market DynamicsThreats to Enterprise Network
Security
8Threatscape
- Vulnerabilities on the rise
9Threatscape
- Inside of our networks are almost as risky as the
outside - Networks are not well-compartmentalized
- Easy to obtain information, communicate and
control systems over great distances - Ubiquitous interconnections and global networks
- More links to business partners
- Outsourced staff, consultants, and contractors
- Pervasive mobile computing
- Complex software has many vulnerabilities
- Lots of bad guys very bad guys
- Time is an enemy - Beat the clock
10Threatscape Dynamics Evolution of Attacks
Attacker Skill
11Wireless Hacking
12Market Dynamics Ignore IT Security Bad Idea
- Companies must be more proactive against security
threats to avoid - lost data
- lost productivity
- ruined reputation
- unnecessary costs
- significant business risk
- Even with large investments in IT security
- 1/3 companies will be infected by computer virus
- Over 2/3 machines will be infected with spyware
- 1/3 companies will experience internal security
breach - 1/3 companies will fail compliance audit
13Market DynamicsVulnerability Management is Key
- IT security organizations should implement a set
of processes and technologies that - Establishes and maintains a security
configuration baseline - Discovers, prioritizes and mitigates exposures
- Establishes security controls
- Eliminates root causes
14What do we do ?
We have two choices
Make the Mouse a Non-Issue
Build Better Mouse Traps
15What do we do Right NOW ?
- Make the endpoint a non-issue
- We either trust the endpoint or we dont
- Cisco NAC
- Checkpoint Integrity Server
- LANDesk Trusted Access
- Etc
- With these systems we can
- Make and enforce access policies
- Track and report (audit)
- Mitigate the effects of the ThreatScape
16