Teleworking and Security: IT All Begins with Endpoints Jim Jessup

Teleworking and Security:
IT All Begins with Endpoints
Jim Jessup
Solutions Manager, Information Risk Management
June 19, 2007
Agenda
1
Today’s Landscape
2
Trends at the Endpoint
3
Endpoint Security
4
Network Access Control
5
A Complete Enterprise Security Solution
Copyright © Symantec Corporation 2007
2
Today’s landscape
• New technologies are changing the way we communicate
– Government agencies see the need to share information across their extended
enterprises
– Agencies are moving towards a mobile workforce: Teleworking, COOP, Remote
Access: Traditional perimeter defenses are not enough.
• New technologies are also introducing new security risks
– No longer focused on just the device – it’s about the information
and interactions
– Phishing, ID theft, malicious users and non-compliance are all risks
– Must keep the threats out, and ensure the information stays inside
– Internal Threats Such As Data Theft and Data Leakage
• New Policies and Regulations (FIPS, FISMA, HIPAA etc) change the way we think
about security
– Security Policy and Reporting mandated
– Adequate Controls Or Evidence Collection
– Standard Desktop Configuration Required
Copyright © Symantec Corporation 2007
3
Network Is Continually Exposed
Internet Kiosks
& Shared Computers
Guests
WANs
& Extranets
SSL VPN
Consultants
IPsec VPN
Employees
Working at Home
Wireless
Networks
Web
Applications
“Because of
worms and
other
threats, you
can no
longer
leave your
networks
open to
unscreened
devices and
users.”
Protect Your
Network with a
NAC Process,
Gartner ID#
G00124992
Copyright © Symantec Corporation 2007
Symantec™ Global
Intelligence Network
4 Symantec SOCs
+
74 Symantec Monitored
Countries
>6,200 Managed Security Devices
+
+
40,000+ Registered Sensors
in 180+ Countries
+
8 Symantec Security
Response Centers
200,000
Millions
Millions
Hundreds
malware
of
of security
threat
ofsubmissions
MSS
reports
alerts
customers
per
per
month
month
month
120
Million
Systems
Worldwide
30%
of World’s email Traffic
+per
+
Advanced
Honeypot Network
Dublin, Ireland
Tokyo, Japan
Calgary, Canada
San Francisco, CA
Redwood City, CA
Twyford, England
Santa Monica, CA
Munich, Germany
Alexandria, VA
Pune, India
Taipei, Taiwan
Sydney, Australia
Copyright © Symantec Corporation 2007
5
It Begins At The Endpoint …
• Compromised and non-compliant endpoints
endanger the network and your data
• Every user accesses the network and the
Internet from an endpoint
• But not all endpoints are protected and
compliant
• For employees, the endpoint may be
–
Company-issued laptop that hasn’t had a
patch or AV update in two weeks
–
Personal computer – desktop or laptop
–
Kiosk computer in an airport, hotel, or office
center
• For guests, the endpoint could be anything,
with no ability to know its security health
• Endpoints are at risk even when not
connected to the corporate network
How do I ensure that all the nodes on my network are protected and compliant?
Copyright © Symantec Corporation 2007
Problems at the Endpoint
• Endpoint management costs
are increasing
Number of Zero Day threats
– Cost of downtime impacts both
productivity and revenue, productivity
hit largest in enterprise
– Costs to acquire, manage and
administer point products are
increasing, as well as the demand on
system resources
• Complexity is increasing as well
– Complexity and man power to
manage disparate endpoint
protection technologies are inefficient
and time consuming
Source: Infonetics Research - The Cost of Network Security
Attacks: North America 2007
• Growing number of known and unknown threats
– Stealth-based and silent attacks are increasing, so there is a need for antivirus
to do much more
Copyright © Symantec Corporation 2007
7
Causes of Sensitive Data Loss
•The leading causes
of sensitive data loss
are:
–User error
–Violations of
policy
–Internet threats,
attacks and hacks
ITPolicyCompliance.com, “Taking Action to Protect Sensitive Data”, Feb. 2007
Copyright © Symantec Corporation 2007
8
Protection From External
Malicious Threats
• Protection Starts At The Endpoint
– Broad Range Of Client Devices : Laptop, Desktop, Cell Phone
– Broad Range Of Threats : Virus, Worms, Spyware … Crimeware
Crimeware
Spyware
Windows
Smartphone
Worm
Symbian
Device
Virus
Laptop
PC
Desktop
PC
Copyright © Symantec Corporation 2007
9
Is Endpoint Protection
Enough Protection?
“What Are The Most Common Sources Of Automated Internet Worm Attacks ?”
43%
Employee Laptop
39%
Internet Through Firewall
34%
Non-Employee Laptop
27%
VPN Home System
Don’t Know
8%
Other
8%
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Source: Enterprise Strategy Group, January 2005 ESG Research Report, Network Security And Intrusion Prevention
Copyright © Symantec Corporation 2007
10
Compliance
Protection
The Need for Complete Endpoint Security:
Endpoint Protection + Endpoint Compliance
1010101
1010101
1010101
Viruses
ID Theft
Unknown
Attacks
Worms
Endpoint Security Policy
Status
Antivirus On
Antivirus Signature Updated
Personal Firewall On
Service Pack Updated
Patch Updated
Copyright © Symantec Corporation 2007
11
Symantec Endpoint Compliance
Process
Step 1
Endpoint Attaches to Network
Configuration Is Determined
✗
Step 4
Monitor Endpoint to
Ensure Ongoing Compliance
IT Policy
Step 2
Compliance of Configuration
Against Policy Is Checked
Step 3
Take Action Based on
Outcome of Policy Check
Patch
Quarantine
Virtual Desktop
Copyright © Symantec Corporation 2007
12
Symantec Network Access Control
Ensures endpoints are protected
and compliant prior to accessing
network resources
• Choose quarantine, remediation or federated access
– Enforce policy before access is granted
– Execute updates, programs, services, etc
– Limit connection to VLAN, etc
• Broadest enforcement options of any vendor
– Remote connectivity (IPSec, SSL VPN)
– LAN-based, DHCP, Appliance
– Standards-based, CNAC, MSNAP
Copyright © Symantec Corporation 2007
13
Symantec On-Demand Protection
Layered security technology
solution for unmanaged
endpoints
Web-based
Applications
Thin
Client/Server
Applications
Traditional
Client/Server
Applications
File
Share
• Ideal for use with:
– Outlook Web Access (OWA)
– Web-enabled applications
• Most complete On-Demand security solution
– Virtual Desktop
– Malicious Code Prevention
– Cache Cleaner
– Mini personal firewall
– Host Integrity
– Adaptive Policies
Public
Kiosk
Traveling
Executives
Partner
Extranet
Copyright © Symantec Corporation 2007
14
Network Access Control +
On-Demand Protection
• Complete security compliance regardless of network
access method
– Managed Devices: laptops, mobile phones
– Unmanaged Devices: Guest, contractor, partners, kiosks
OWA
Kiosk
Windows
Smartphone
Partner
Symbian
Device
Temp
Laptop
PC
Desktop
PC
Copyright © Symantec Corporation 2007
15
Today’s Endpoint Problems Addressed by
Too Many Technologies…
Protection
Technology
Endpoint
Exposures
Always on,
always up-todate
Host integrity
& remediation
Zero-hour attacks, Malware,
Trojans, application injection
Applications
Anti
crimeware
Slurping, IP theft, malware
I/O Devices
Device
controls
Buffer Overflow, process
injection, key logging
Memory/
Processes
Buffer overflow &
exploit protection
Malware, Rootkits, day-zero
vulnerabilities
Operating
System
O/S Protection
Network
Connection
Network IPS
Worms, exploits & attacks
Viruses, Trojans, malware
& spyware
Client Firewall
Antivirus
Data & File
System
Antispyware
Copyright © Symantec Corporation 2007
16
…even from Symantec
Protection
Technology
Symantec
Solution
Endpoint
Exposures
Always on,
always up-todate
Host integrity
& remediation
Symantec
Network
Access Control
Zero-hour attacks, Malware,
Trojans, application injection
Applications
Anti
crimeware
Symantec
Confidence
Online
Slurping, IP theft, malware
I/O Devices
Device
controls
Buffer Overflow, process
injection, key logging
Memory/
Processes
Buffer overflow &
exploit protection
Malware, Rootkits, day-zero
vulnerabilities
Operating
System
O/S Protection
Network
Connection
Network IPS
Worms, exploits & attacks
Viruses, Trojans, malware
& spyware
Client Firewall
Antivirus
Data & File
System
Symantec
Sygate
Enterprise
Protection
Antispyware
Symantec
AntiVirus
Copyright © Symantec Corporation 2007
17
Ingredients for Endpoint Protection
AntiVirus
• Worlds leading AV solution
• Most (30) consecutive VB100 Awards
Virus Bulletin – Feb 2007
Antivirus
Copyright © Symantec Corporation 2007
18
Ingredients for Endpoint Protection
Antispyware
• Best rootkit detection and removal
• Raw Disk Scan (VxMS) = superior rootkit protection
Antispyware
Antivirus
Source: Thompson Cyber Security Labs, August 2006
Copyright © Symantec Corporation 2007
19
Ingredients for Endpoint Protection
Firewall
• Industry leading endpoint firewall technology
• Gartner MQ “Leader” – 4 consecutive years
• Rules based FW can dynamically adjust port
settings to block threats from spreading
Firewall
Antispyware
Antivirus
Copyright © Symantec Corporation 2007
20
Ingredients for Endpoint Protection
Intrusion Prevention
• Combines NIPS (network) and HIPS (host)
• Generic Exploit Blocking (GEB) – one signature
to proactively protect against all variants
• Granular application access control
Intrusion
Prevention
Firewall
• Proactive Threat Scans (SONAR) - Very low
(0.002%) false positive rate
No False
Alarm
16M Installations
Antispyware
False
Alarms
Antivirus
Only 20 False Positives
for every 1 Million PC’s
Copyright © Symantec Corporation 2007
21
Ingredients for Endpoint Protection
Device Control
• Prevents data leakage
Device Control
• Restrict Access to devices (USB keys, Backup drives)
• W32.SillyFDC (May 2007)
Intrusion
Prevention
Firewall
Antispyware
ives
ticks
r
s
d
y
r
e
C
l
o
D
ovab
mem
m
SillyF
.
e
l
e
2
r
b
3
W
mova
f onto
l
e
r
e
s
s
t
i
t
ge
pying y sticks
o
next
• tar
c
s
i
y
r
b
e
o
c
s
i
mem
read
e dev
h
t
• sp h as USB
n
s whe r
n
suc
u
r
tically a compute
a
m
o
t
• au nected to
con
Antivirus
Copyright © Symantec Corporation 2007
22
Ingredients for Endpoint Compliance
Network Access
Control
Network Access Control
• Network access control – ready
Device Control
• Agent is included, no extra agent deployment
• Simply license SNAC Server
Intrusion
Prevention
Firewall
Antispyware
Antivirus
Copyright © Symantec Corporation 2007
23
Unmatched Protection
Symantec Endpoint Protection
Secure
• Unmatched
combination of
technologies
• Much more than
antivirus
• Backed by the industry
standard Symantec
Global Intelligence
Network
Simple
•
•
•
•
Single agent
Single console
Single license
Single support
program
Seamless
• Fits into your network
• Easily configurable,
use only what you
need
• Combines essential
Protection and
compliance functions
24
Copyright © Symantec Corporation 2007
For More Information…
www.symantec.com/endpointsecurity
Copyright © Symantec Corporation 2007
25
Thank You!
www.symantec.com
Jim Jessup
James_Jessup@Symantec.com
Copyright © 2007 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its
affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Copyright © Symantec Corporation 2007
26