SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Info-Tech Research Group 1Info-Tech Research Group 1
Info-Tech Research Group, Inc. is a global leader in providing IT research and advice.
Info-Tech’s products and services combine actionable insight and relevant advice with
ready-to-use tools and templates that cover the full spectrum of IT concerns.
© 1997-2017 Info-Tech Research Group Inc.
Select and Implement a Next Generation
Endpoint Protection Solution
Today’s security battles are fought at the endpoint.
Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools
and templates that cover the full spectrum of IT concerns.© 1997–2017 Info-Tech Research Group
Info-Tech Research Group 2Info-Tech Research Group 2
James McCloskey,
Senior Director, Security, Risk & Compliance
Info-Tech Research Group
ANALYST PERSPECTIVE
Server compute workloads continue to migrate from
traditional on-premises delivery to cloud and hybrid models,
and endpoint compute workloads continue to migrate from
traditional, corporately owned form factors connected to a
corporate network, to a wide mix of personal and corporate
devices connecting to both corporate and foreign networks.
Ready or not, ubiquitous computing is upon us.
As a result, protecting endpoints (and through them, our
critical systems and data) against evolving threats requires
new solutions – but as a consumer of such solutions, the IT
security professional needs ongoing support to navigate
through the rapidly changing endpoint solution space and
(often) self-serving vendor claims.
Info-Tech Research Group 3Info-Tech Research Group 3
This Research is Designed For: This Research Will Help You:This Research Is Designed For: This Research Will Help You:
This Research Will Also Assist: This Research Will Help Them:
Our understanding of the problem
 Chief Information Officer (CIO)
 Chief Information Security Officer (CISO)
 Security / IT Management
 Security Operations Director / SOC
 Network Operations Director / NOC
 Systems Administrator
 Threat Intelligence Staff
 Security Operations Staff
 Security Incident Responders
 Vulnerability Management Staff
 Enhance your security program by selecting, implementing, and
streamlining the most appropriate next generation endpoint
protection suite.
 Determine the most suitable sourcing decision(s) by identifying
the use case and corresponding feature set that best aligns with
your organizational landscape.
 Increase situational awareness through continuous endpoint
prevention, detection, analysis, and response techniques,
enriching internal security events with external threat intelligence,
and enhancing security controls.
 Design a step-by-step NG-EPP implementation process.
 Pursue continuous improvement; build a measurement program
that actively evaluates program effectiveness.
 Board / Chief Executive Officer
 Information Owners (Business Directors/VP)
 Security Governance & Risk Management
 Human Resources
 Legal & Public Relations
 Execute educated endpoint protection purchasing decisions that
cater to the organization’s needs and specific use case.
 Understand the value and return on investment of endpoint
protection offerings.
 Increase visibility into the organization’s threat landscape to
identify likely targets or identify exposed vulnerabilities.
 Ensure the business is compliant with regularity, legal, and/or
compliance requirements.
Info-Tech Research Group 4Info-Tech Research Group 4
Resolution
Situation
Complication
Executive summary
• Endpoint protection is an ever-consolidating market of security controls.
Traditional approaches are failing to address modern protection challenges
while new market entrants are providing more focused coverage.
• Identifying organizational needs while accounting for the diverse array of
vendor solutions is both time consuming and a drain on resources.
• As the market evolves, capabilities that were once cutting edge become default
and new functionality becomes differentiating.
• The endpoint protection (EPP) market is overcrowded and fragmented, resulting
in information overload and consequently, a difficult vendor assessment.
• Disparate product solutions are being bundled into one-off solutions or suites,
often resulting in inefficient solutions than the more niche players.
• Imminent obsolescence: previous EPP solutions have not adapted with the
rapidly evolving threat landscape and are no longer relevant, resulting in
breaches or vulnerabilities.
• Vendors use a lot of marketing jargon, buzzwords, and statistics to sell their
solutions, making objective evaluation rather difficult.
• The solution is a holistic internal security assessment that not only identifies, but satisfies, your desired endpoint protection feature set
with the corresponding endpoint protection suite and a comprehensive implementation strategy.
• This blueprint will walk through the steps of selecting and implementing an endpoint protection solution that best aligns with your
organizational needs.
1. Don’t let vendors and market reports define
your endpoint protection needs. Identify the
use cases and corresponding feature sets that
best align with your risk profile before
evaluating the vendor marketspace.
2. Your security controls are diminishing in
value (if they haven’t already). Develop a
strategy that accounts for the rapid evolution
and imminent obsolescence of your endpoint
controls. Plan for future needs when making
purchasing decisions today.
3. Endpoint protection is a matter of defense
in depth and risk modelling; there is no silver
bullet protection and mitigation solution. As
end-client-technology providers release regular
product/software updates, security tools will
become outdated. Multiyear endpoint protection
commitments will leave you playing a constant
game of catch up.
Info-Tech Research Group 5Info-Tech Research Group 5
Data breaches are resulting in major costs across industries
$0 $100 $200 $300 $400
Public
Hospitality
Research
Technology
Media
Retail
Industrial
Consumer
Services
Education
Communications
Transportation
Energy
Financial
Pharmaceutical
Health
Per capita cost by industry classification of
benchmarked companies
Source: Cisco 2017 Security Capabilities Benchmark Study
Average data breach costs per compromised record hit an all-time
high of $217 (in 2015); $74 is direct cost (e.g. legal fees, technology
investment) and $143 is indirect cost (e.g. abnormal customer churn).
Source: 2015 Cost of Data Breach Study: United States, Ponemon Institute
58% Lost
<20%
25% Lost
20–40%
9% Lost
40–60%
5% Lost
60–80%
4% Lost
80–100%
% of business opportunity lost from a data breach
% of customers lost from a data breach
61% Lost
<20%
21% Lost
20–40%
8% Lost
40–60%
6% Lost
60–80%
4% Lost
80–100%
% of systems impacted by a data breach
1%
No
Impact
19%
1–10%
impacted
41%
11–30%
impacted
24%
31–50%
impacted
15%
>50%
impacted
Info-Tech Research Group 6Info-Tech Research Group 6
Signature-Based AV  .  .
Heuristic AV  .
Machine Learning  .
Host Firewall (Stateful Inspection)  .  .
Host IPS .  .
Host IDS  .
Kernel Monitoring  .
Full-Disk Encryption  .
File-Folder Encryption  .
Removable Media Encryption  .  .
Port & Device Control  .  .
Endpoint DLP  .  .
Patch Management  .  .
System Hardening  .
Application Whitelisting/Blacklisting (Static)  .  .
URL Filtering  .
Cross-Platform Integration  .
Threat Intelligence Enrichment  .
MSSP Support  .  .
Digital Forensics  .
Long-Term Data Retention  .
Automated Remediation  .
Cloud-Based Application Detonation  .
Local Containerization  .
Secure Web Browsing/Micro-Segmentation  .
Central Portal Policy Management  .  .
Active Directory Integration  .  .
Mobile OS Support  .  .
There’s a lot more to endpoint security than just anti-virus
44%
admitted one or more
endpoints had been
compromised within the
past 24 months
57%
of incidents were
detected via the
endpoint
The average employee
uses at least 3 devices for
day-to-day work.
Source: Sans 2016 Endpoint Security Survey
NG-EPP
Next-gen products will
become current-gen
and, eventually, last-gen.
Organizations must
decide whether their
next endpoint protection
solution can transcend
generations and adapt
alongside the threat
landscape.
Features Traditional EPP/AV
Info-Tech Research Group 7Info-Tech Research Group 7
A vendor-driven EPP selection approach is unsustainable: DO
NOT let vendors define your security needs
As threats and subsequent defenses evolve, the more appropriate question is:
“What is the right use case for my business?”
Organizations consist of distributed
endpoints that might be personally
owned, unmanaged, and/or be
connecting to unsecured networks
on the regular, but still access
corporate networks and assets.
…the perimeter is simply too fluid to
successfully manage using a
traditional network security
architecture.
– Elliot Lewis, VP Security, Risk, and
Compliance, Info-Tech Research Group
Managed Asset on
Corporate Network
Managed Asset on VPN
Managed Asset
on Foreign Network
Private Asset on
Corporate Network
Private Asset on VPN
Private Asset
on Foreign Network
• VPN
• CASB
• Digital
Forensics
• MDM/EM
• SSO/IAM
• DLP
• System
Hardening
• Data
Encryption
First, identify which operating models are relevant and from there assess the feature sets that best satisfy your
organizational needs.
Info-Tech Research Group 8Info-Tech Research Group 8
Use this blueprint to streamline your endpoint protection
selection and implementation process
Launch the
EPP Project &
Collect Feature
Requirements
Phase 1
Select Your
EPP Solution
Phase 2
Not everyone’s endpoint protection needs are the
same. Develop an endpoint protection strategy and
identify the corresponding feature sets that best align
with your organizational requirements.
Plan Your EPP
Implementation
Phase 3
Risk reduction.
NG-EPP reduces the margin for
error through the consolidation of
various network controls.
Strategic Benefits
Improved organizational
situational awareness.
Improve internal and external
communication with top
executives about organizational
risks, threat actor TTPs, and
security ROI.
Organizational cost savings.
Limit unnecessary spending by
streamlining the endpoint
protection selection and
management process.
Leverage Software Reviews to
begin making data-driven
sourcing decisions based on
industry expert reviews.
Understand your business’ integration environment.
Define the technical, functional, and strategic
requirements for a smooth endpoint protection
deployment strategy.
Info-Tech Research Group 9Info-Tech Research Group 9
 Increased resolution rate. Situational awareness
provides data with context, allowing security
operations teams to more effectively remediate
incidents.
 Increased device uptime as network-based security
controls transition to the endpoint.
 Intelligence-driven patch management. Threat
intelligence provides actionable vulnerability and
exploitation data to automatically patch critical
vulnerabilities.
 Contextualization of endpoint data. Digital forensics
– accelerates the identification of root cause analysis.
 Enhanced communication through the use of a
central management portal.
Benefits of a next generation endpoint protection solution
Operational Benefits
 Improved visibility into managed and unmanaged
devices through active kernel monitoring and digital
forensics.
 Dynamic malware-based detection through the
use of behavioral analysis and machine learning.
 Application containment mechanisms for safe
malware detonation and analysis.
 Integration of network-based security controls
within endpoint clients – host IDS, IPS, DLP, etc.
 Automated remediation capabilities to restore
infected endpoints to prior states.
 Improved effectiveness of internal defense
controls such as SIEM, NGFWs, IPS, IDS, SWGs,
anti-malware, and anti-spam packages.
Tactical Benefits
Maximizing the value of your NG-EPP strategy depends on
close integration with people, process, and technology.
Info-Tech Research Group 10Info-Tech Research Group 10
Consulting
“Our team does not
have the time or the
knowledge to take this
project on. We need
assistance through the
entirety of this project.”
Guided
Implementation
“Our team knows that
we need to fix a
process, but we need
assistance to
determine where to
focus. Some check-ins
along the way would
help keep us on track.”
DIY Toolkit
“Our team has already
made this critical
project a priority, and
we have the time and
capability, but some
guidance along the
way would be helpful.”
Workshop
“We need to hit the
ground running and
get this project kicked
off immediately. Our
team has the ability to
take this over once we
get a framework and
strategy in place.”
Diagnostics and consistent frameworks used throughout all four options
Info-Tech offers various levels of support to best suit your
needs
Info-Tech Research Group 11Info-Tech Research Group 11
Measured value for Guided Implementations
Engaging in GIs offers valuable project advice and significant cost savings.
GI Purpose Measured Value
Phase 1:
Create An EPP Strategy
• Determine why you need a new endpoint protection
solution
• Understand Info-Tech’s use-case approach
• Evaluate current endpoint protection feature sets
and criteria
Time, value, and resources saved using our industry expertise,
best practices, and templates:
Project Manager: 2 days x $800/day = $1,600
Phase 2:
Select Your EPP Solution
• Optimize your endpoint protection procurement
process
• Determine EPP vendor criteria
• Evaluate the EPP marketspace
• Design, submit, and evaluate vendor RFPs
Time, value, and resources saved using our industry expertise,
best practices, and templates:
Project Manager: 3 days x $800/day = $2,400
Variable savings:
Cost avoidance associated with right-sizing product selection.
Phase 3:
Implement and Manage
Your EPP Solution
• Identify the appropriate resourcing plan for your
endpoint protection solution
• Plan the implementation
• Design, build, test, and roll out the solution
• Develop a comprehensive measurement program
Time, value, and resources saved using our industry expertise,
best practices, and templates:
Project Manager and SysAdmins: 2 days x $800/day = $1,600
Variable savings:
Cost reduction associated with removing any existing EPP
solutions.
Total Savings
$5,600 + any cost avoidance/cost reduction
opportunities
Info-Tech Research Group 12Info-Tech Research Group 12
Info-Tech Research Group Helps IT Professionals To:
Sign up for free trial membership to get practical
solutions for your IT challenges
 Quickly get up to speed
with new technologies
 Make the right technology
purchasing decisions – fast
 Deliver critical IT
projects, on time and
within budget
 Manage business expectations
 Justify IT spending and
prove the value of IT
 Train IT staff and effectively
manage an IT department
•“Info-Tech helps me to be proactive instead of reactive –
a cardinal rule in a stable and leading edge IT environment.
- ARCS Commercial Mortgage Co., LP

Weitere ähnliche Inhalte

Was ist angesagt?

Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsInfo-Tech Research Group
 
Info-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationInfo-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationHilary Carney Badoian
 
Presentation by shreyas bhargave
Presentation by shreyas bhargavePresentation by shreyas bhargave
Presentation by shreyas bhargavePMI_IREP_TP
 
Data-Driven Software Engineering for Agile Teams
Data-Driven Software Engineering for Agile TeamsData-Driven Software Engineering for Agile Teams
Data-Driven Software Engineering for Agile TeamsTechWell
 
Presentation by rahul ghodke
Presentation by rahul ghodkePresentation by rahul ghodke
Presentation by rahul ghodkePMI_IREP_TP
 
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsThe Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsDigital Enterprise Journal
 
Gaining Competitive Advantage by Implementing the Microsoft Unified Communica...
Gaining Competitive Advantage by Implementing the Microsoft Unified Communica...Gaining Competitive Advantage by Implementing the Microsoft Unified Communica...
Gaining Competitive Advantage by Implementing the Microsoft Unified Communica...Leo Barella
 
Successful Digital Transformation starts with a well defined Strategy
Successful Digital Transformation starts with a well defined StrategySuccessful Digital Transformation starts with a well defined Strategy
Successful Digital Transformation starts with a well defined StrategyGlen Alleman
 
Presentation by namit
Presentation by namitPresentation by namit
Presentation by namitPMI_IREP_TP
 
Fundamentals of Designing, Building, & Implementing a Service Delivery Center
Fundamentals of Designing, Building, & Implementing a Service Delivery CenterFundamentals of Designing, Building, & Implementing a Service Delivery Center
Fundamentals of Designing, Building, & Implementing a Service Delivery CenterScottMadden, Inc.
 
establish an effective it steering committee
establish an effective it steering committeeestablish an effective it steering committee
establish an effective it steering committeeInfo-Tech Research Group
 
The Management of Critical Spares in the Electric & Gas Utility Industry
The Management of Critical Spares in the Electric & Gas Utility IndustryThe Management of Critical Spares in the Electric & Gas Utility Industry
The Management of Critical Spares in the Electric & Gas Utility IndustryScottMadden, Inc.
 
Strategic imperative digital transformation in capital projects
Strategic imperative digital transformation in capital projectsStrategic imperative digital transformation in capital projects
Strategic imperative digital transformation in capital projectsEndeavor Management
 
Creating IT Value-A Better Way to Make IT Investment Decisions
Creating IT Value-A Better Way to Make IT Investment DecisionsCreating IT Value-A Better Way to Make IT Investment Decisions
Creating IT Value-A Better Way to Make IT Investment DecisionsScottMadden, Inc.
 
More than Code: Contributions in Scrum Software Engineering Teams
More than Code: Contributions in Scrum Software Engineering TeamsMore than Code: Contributions in Scrum Software Engineering Teams
More than Code: Contributions in Scrum Software Engineering TeamsChristoph Matthies
 

Was ist angesagt? (20)

Info-Tech Membership Overview
Info-Tech Membership OverviewInfo-Tech Membership Overview
Info-Tech Membership Overview
 
Become a Transformational CIO
Become a Transformational CIOBecome a Transformational CIO
Become a Transformational CIO
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
 
Info-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationInfo-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop Presentation
 
Presentation by shreyas bhargave
Presentation by shreyas bhargavePresentation by shreyas bhargave
Presentation by shreyas bhargave
 
Data-Driven Software Engineering for Agile Teams
Data-Driven Software Engineering for Agile TeamsData-Driven Software Engineering for Agile Teams
Data-Driven Software Engineering for Agile Teams
 
Presentation by rahul ghodke
Presentation by rahul ghodkePresentation by rahul ghodke
Presentation by rahul ghodke
 
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT OperationsThe Roadmap to Becoming a Top Performing Organization in Managing IT Operations
The Roadmap to Becoming a Top Performing Organization in Managing IT Operations
 
Gaining Competitive Advantage by Implementing the Microsoft Unified Communica...
Gaining Competitive Advantage by Implementing the Microsoft Unified Communica...Gaining Competitive Advantage by Implementing the Microsoft Unified Communica...
Gaining Competitive Advantage by Implementing the Microsoft Unified Communica...
 
Successful Digital Transformation starts with a well defined Strategy
Successful Digital Transformation starts with a well defined StrategySuccessful Digital Transformation starts with a well defined Strategy
Successful Digital Transformation starts with a well defined Strategy
 
Presentation by namit
Presentation by namitPresentation by namit
Presentation by namit
 
L'OREAL ERP Project
L'OREAL ERP ProjectL'OREAL ERP Project
L'OREAL ERP Project
 
Fundamentals of Designing, Building, & Implementing a Service Delivery Center
Fundamentals of Designing, Building, & Implementing a Service Delivery CenterFundamentals of Designing, Building, & Implementing a Service Delivery Center
Fundamentals of Designing, Building, & Implementing a Service Delivery Center
 
establish an effective it steering committee
establish an effective it steering committeeestablish an effective it steering committee
establish an effective it steering committee
 
The Management of Critical Spares in the Electric & Gas Utility Industry
The Management of Critical Spares in the Electric & Gas Utility IndustryThe Management of Critical Spares in the Electric & Gas Utility Industry
The Management of Critical Spares in the Electric & Gas Utility Industry
 
Strategic imperative digital transformation in capital projects
Strategic imperative digital transformation in capital projectsStrategic imperative digital transformation in capital projects
Strategic imperative digital transformation in capital projects
 
Creating IT Value-A Better Way to Make IT Investment Decisions
Creating IT Value-A Better Way to Make IT Investment DecisionsCreating IT Value-A Better Way to Make IT Investment Decisions
Creating IT Value-A Better Way to Make IT Investment Decisions
 
Select collaboration platform
Select collaboration platformSelect collaboration platform
Select collaboration platform
 
More than Code: Contributions in Scrum Software Engineering Teams
More than Code: Contributions in Scrum Software Engineering TeamsMore than Code: Contributions in Scrum Software Engineering Teams
More than Code: Contributions in Scrum Software Engineering Teams
 
Overcome barriers to good req mgmt
Overcome barriers to good req mgmtOvercome barriers to good req mgmt
Overcome barriers to good req mgmt
 

Ähnlich wie Select and Implement a Next Generation Endpoint Protection Solution

A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data Naveed Ahmed
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 

Ähnlich wie Select and Implement a Next Generation Endpoint Protection Solution (20)

A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 

Mehr von Info-Tech Research Group

Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyInfo-Tech Research Group
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revisedInfo-Tech Research Group
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsInfo-Tech Research Group
 
Create a right sized disaster recovery plan
Create a right sized disaster recovery planCreate a right sized disaster recovery plan
Create a right sized disaster recovery planInfo-Tech Research Group
 
The 10 Principles of Enterprise Architecture
The 10 Principles of Enterprise ArchitectureThe 10 Principles of Enterprise Architecture
The 10 Principles of Enterprise ArchitectureInfo-Tech Research Group
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsInfo-Tech Research Group
 
Develop a Resource Management Strategy for the New Reality
Develop a Resource Management Strategy for the New RealityDevelop a Resource Management Strategy for the New Reality
Develop a Resource Management Strategy for the New RealityInfo-Tech Research Group
 

Mehr von Info-Tech Research Group (19)

Optimize the IT Operating Model
Optimize the IT Operating ModelOptimize the IT Operating Model
Optimize the IT Operating Model
 
Define an EA Operating Model
Define an EA Operating ModelDefine an EA Operating Model
Define an EA Operating Model
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Build an Application Integration Strategy
Build an Application Integration StrategyBuild an Application Integration Strategy
Build an Application Integration Strategy
 
Develop a Project Portfolio Management Strategy
Develop a Project Portfolio Management StrategyDevelop a Project Portfolio Management Strategy
Develop a Project Portfolio Management Strategy
 
Implement an enterprise service bus revised
Implement an enterprise service bus    revisedImplement an enterprise service bus    revised
Implement an enterprise service bus revised
 
Implement a Shared Services Model
Implement a Shared Services ModelImplement a Shared Services Model
Implement a Shared Services Model
 
Assess and Optimize EA Capability
Assess and Optimize EA CapabilityAssess and Optimize EA Capability
Assess and Optimize EA Capability
 
Survive an Impending Audit
Survive an Impending AuditSurvive an Impending Audit
Survive an Impending Audit
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
 
Fast track critical leadership skills
Fast track critical leadership skillsFast track critical leadership skills
Fast track critical leadership skills
 
Enterprise mobility management
Enterprise mobility managementEnterprise mobility management
Enterprise mobility management
 
Create a right sized disaster recovery plan
Create a right sized disaster recovery planCreate a right sized disaster recovery plan
Create a right sized disaster recovery plan
 
The 10 Principles of Enterprise Architecture
The 10 Principles of Enterprise ArchitectureThe 10 Principles of Enterprise Architecture
The 10 Principles of Enterprise Architecture
 
Decode the Corporate Strategy
Decode the Corporate StrategyDecode the Corporate Strategy
Decode the Corporate Strategy
 
Manage a Minimum-Viable PMO
Manage a Minimum-Viable PMOManage a Minimum-Viable PMO
Manage a Minimum-Viable PMO
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS Environments
 
Manage an Agile Portfolio
Manage an Agile PortfolioManage an Agile Portfolio
Manage an Agile Portfolio
 
Develop a Resource Management Strategy for the New Reality
Develop a Resource Management Strategy for the New RealityDevelop a Resource Management Strategy for the New Reality
Develop a Resource Management Strategy for the New Reality
 

Kürzlich hochgeladen

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Select and Implement a Next Generation Endpoint Protection Solution

  • 1. Info-Tech Research Group 1Info-Tech Research Group 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © 1997-2017 Info-Tech Research Group Inc. Select and Implement a Next Generation Endpoint Protection Solution Today’s security battles are fought at the endpoint. Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© 1997–2017 Info-Tech Research Group
  • 2. Info-Tech Research Group 2Info-Tech Research Group 2 James McCloskey, Senior Director, Security, Risk & Compliance Info-Tech Research Group ANALYST PERSPECTIVE Server compute workloads continue to migrate from traditional on-premises delivery to cloud and hybrid models, and endpoint compute workloads continue to migrate from traditional, corporately owned form factors connected to a corporate network, to a wide mix of personal and corporate devices connecting to both corporate and foreign networks. Ready or not, ubiquitous computing is upon us. As a result, protecting endpoints (and through them, our critical systems and data) against evolving threats requires new solutions – but as a consumer of such solutions, the IT security professional needs ongoing support to navigate through the rapidly changing endpoint solution space and (often) self-serving vendor claims.
  • 3. Info-Tech Research Group 3Info-Tech Research Group 3 This Research is Designed For: This Research Will Help You:This Research Is Designed For: This Research Will Help You: This Research Will Also Assist: This Research Will Help Them: Our understanding of the problem  Chief Information Officer (CIO)  Chief Information Security Officer (CISO)  Security / IT Management  Security Operations Director / SOC  Network Operations Director / NOC  Systems Administrator  Threat Intelligence Staff  Security Operations Staff  Security Incident Responders  Vulnerability Management Staff  Enhance your security program by selecting, implementing, and streamlining the most appropriate next generation endpoint protection suite.  Determine the most suitable sourcing decision(s) by identifying the use case and corresponding feature set that best aligns with your organizational landscape.  Increase situational awareness through continuous endpoint prevention, detection, analysis, and response techniques, enriching internal security events with external threat intelligence, and enhancing security controls.  Design a step-by-step NG-EPP implementation process.  Pursue continuous improvement; build a measurement program that actively evaluates program effectiveness.  Board / Chief Executive Officer  Information Owners (Business Directors/VP)  Security Governance & Risk Management  Human Resources  Legal & Public Relations  Execute educated endpoint protection purchasing decisions that cater to the organization’s needs and specific use case.  Understand the value and return on investment of endpoint protection offerings.  Increase visibility into the organization’s threat landscape to identify likely targets or identify exposed vulnerabilities.  Ensure the business is compliant with regularity, legal, and/or compliance requirements.
  • 4. Info-Tech Research Group 4Info-Tech Research Group 4 Resolution Situation Complication Executive summary • Endpoint protection is an ever-consolidating market of security controls. Traditional approaches are failing to address modern protection challenges while new market entrants are providing more focused coverage. • Identifying organizational needs while accounting for the diverse array of vendor solutions is both time consuming and a drain on resources. • As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. • The endpoint protection (EPP) market is overcrowded and fragmented, resulting in information overload and consequently, a difficult vendor assessment. • Disparate product solutions are being bundled into one-off solutions or suites, often resulting in inefficient solutions than the more niche players. • Imminent obsolescence: previous EPP solutions have not adapted with the rapidly evolving threat landscape and are no longer relevant, resulting in breaches or vulnerabilities. • Vendors use a lot of marketing jargon, buzzwords, and statistics to sell their solutions, making objective evaluation rather difficult. • The solution is a holistic internal security assessment that not only identifies, but satisfies, your desired endpoint protection feature set with the corresponding endpoint protection suite and a comprehensive implementation strategy. • This blueprint will walk through the steps of selecting and implementing an endpoint protection solution that best aligns with your organizational needs. 1. Don’t let vendors and market reports define your endpoint protection needs. Identify the use cases and corresponding feature sets that best align with your risk profile before evaluating the vendor marketspace. 2. Your security controls are diminishing in value (if they haven’t already). Develop a strategy that accounts for the rapid evolution and imminent obsolescence of your endpoint controls. Plan for future needs when making purchasing decisions today. 3. Endpoint protection is a matter of defense in depth and risk modelling; there is no silver bullet protection and mitigation solution. As end-client-technology providers release regular product/software updates, security tools will become outdated. Multiyear endpoint protection commitments will leave you playing a constant game of catch up.
  • 5. Info-Tech Research Group 5Info-Tech Research Group 5 Data breaches are resulting in major costs across industries $0 $100 $200 $300 $400 Public Hospitality Research Technology Media Retail Industrial Consumer Services Education Communications Transportation Energy Financial Pharmaceutical Health Per capita cost by industry classification of benchmarked companies Source: Cisco 2017 Security Capabilities Benchmark Study Average data breach costs per compromised record hit an all-time high of $217 (in 2015); $74 is direct cost (e.g. legal fees, technology investment) and $143 is indirect cost (e.g. abnormal customer churn). Source: 2015 Cost of Data Breach Study: United States, Ponemon Institute 58% Lost <20% 25% Lost 20–40% 9% Lost 40–60% 5% Lost 60–80% 4% Lost 80–100% % of business opportunity lost from a data breach % of customers lost from a data breach 61% Lost <20% 21% Lost 20–40% 8% Lost 40–60% 6% Lost 60–80% 4% Lost 80–100% % of systems impacted by a data breach 1% No Impact 19% 1–10% impacted 41% 11–30% impacted 24% 31–50% impacted 15% >50% impacted
  • 6. Info-Tech Research Group 6Info-Tech Research Group 6 Signature-Based AV  .  . Heuristic AV  . Machine Learning  . Host Firewall (Stateful Inspection)  .  . Host IPS .  . Host IDS  . Kernel Monitoring  . Full-Disk Encryption  . File-Folder Encryption  . Removable Media Encryption  .  . Port & Device Control  .  . Endpoint DLP  .  . Patch Management  .  . System Hardening  . Application Whitelisting/Blacklisting (Static)  .  . URL Filtering  . Cross-Platform Integration  . Threat Intelligence Enrichment  . MSSP Support  .  . Digital Forensics  . Long-Term Data Retention  . Automated Remediation  . Cloud-Based Application Detonation  . Local Containerization  . Secure Web Browsing/Micro-Segmentation  . Central Portal Policy Management  .  . Active Directory Integration  .  . Mobile OS Support  .  . There’s a lot more to endpoint security than just anti-virus 44% admitted one or more endpoints had been compromised within the past 24 months 57% of incidents were detected via the endpoint The average employee uses at least 3 devices for day-to-day work. Source: Sans 2016 Endpoint Security Survey NG-EPP Next-gen products will become current-gen and, eventually, last-gen. Organizations must decide whether their next endpoint protection solution can transcend generations and adapt alongside the threat landscape. Features Traditional EPP/AV
  • 7. Info-Tech Research Group 7Info-Tech Research Group 7 A vendor-driven EPP selection approach is unsustainable: DO NOT let vendors define your security needs As threats and subsequent defenses evolve, the more appropriate question is: “What is the right use case for my business?” Organizations consist of distributed endpoints that might be personally owned, unmanaged, and/or be connecting to unsecured networks on the regular, but still access corporate networks and assets. …the perimeter is simply too fluid to successfully manage using a traditional network security architecture. – Elliot Lewis, VP Security, Risk, and Compliance, Info-Tech Research Group Managed Asset on Corporate Network Managed Asset on VPN Managed Asset on Foreign Network Private Asset on Corporate Network Private Asset on VPN Private Asset on Foreign Network • VPN • CASB • Digital Forensics • MDM/EM • SSO/IAM • DLP • System Hardening • Data Encryption First, identify which operating models are relevant and from there assess the feature sets that best satisfy your organizational needs.
  • 8. Info-Tech Research Group 8Info-Tech Research Group 8 Use this blueprint to streamline your endpoint protection selection and implementation process Launch the EPP Project & Collect Feature Requirements Phase 1 Select Your EPP Solution Phase 2 Not everyone’s endpoint protection needs are the same. Develop an endpoint protection strategy and identify the corresponding feature sets that best align with your organizational requirements. Plan Your EPP Implementation Phase 3 Risk reduction. NG-EPP reduces the margin for error through the consolidation of various network controls. Strategic Benefits Improved organizational situational awareness. Improve internal and external communication with top executives about organizational risks, threat actor TTPs, and security ROI. Organizational cost savings. Limit unnecessary spending by streamlining the endpoint protection selection and management process. Leverage Software Reviews to begin making data-driven sourcing decisions based on industry expert reviews. Understand your business’ integration environment. Define the technical, functional, and strategic requirements for a smooth endpoint protection deployment strategy.
  • 9. Info-Tech Research Group 9Info-Tech Research Group 9  Increased resolution rate. Situational awareness provides data with context, allowing security operations teams to more effectively remediate incidents.  Increased device uptime as network-based security controls transition to the endpoint.  Intelligence-driven patch management. Threat intelligence provides actionable vulnerability and exploitation data to automatically patch critical vulnerabilities.  Contextualization of endpoint data. Digital forensics – accelerates the identification of root cause analysis.  Enhanced communication through the use of a central management portal. Benefits of a next generation endpoint protection solution Operational Benefits  Improved visibility into managed and unmanaged devices through active kernel monitoring and digital forensics.  Dynamic malware-based detection through the use of behavioral analysis and machine learning.  Application containment mechanisms for safe malware detonation and analysis.  Integration of network-based security controls within endpoint clients – host IDS, IPS, DLP, etc.  Automated remediation capabilities to restore infected endpoints to prior states.  Improved effectiveness of internal defense controls such as SIEM, NGFWs, IPS, IDS, SWGs, anti-malware, and anti-spam packages. Tactical Benefits Maximizing the value of your NG-EPP strategy depends on close integration with people, process, and technology.
  • 10. Info-Tech Research Group 10Info-Tech Research Group 10 Consulting “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.” Guided Implementation “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” DIY Toolkit “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” Workshop “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” Diagnostics and consistent frameworks used throughout all four options Info-Tech offers various levels of support to best suit your needs
  • 11. Info-Tech Research Group 11Info-Tech Research Group 11 Measured value for Guided Implementations Engaging in GIs offers valuable project advice and significant cost savings. GI Purpose Measured Value Phase 1: Create An EPP Strategy • Determine why you need a new endpoint protection solution • Understand Info-Tech’s use-case approach • Evaluate current endpoint protection feature sets and criteria Time, value, and resources saved using our industry expertise, best practices, and templates: Project Manager: 2 days x $800/day = $1,600 Phase 2: Select Your EPP Solution • Optimize your endpoint protection procurement process • Determine EPP vendor criteria • Evaluate the EPP marketspace • Design, submit, and evaluate vendor RFPs Time, value, and resources saved using our industry expertise, best practices, and templates: Project Manager: 3 days x $800/day = $2,400 Variable savings: Cost avoidance associated with right-sizing product selection. Phase 3: Implement and Manage Your EPP Solution • Identify the appropriate resourcing plan for your endpoint protection solution • Plan the implementation • Design, build, test, and roll out the solution • Develop a comprehensive measurement program Time, value, and resources saved using our industry expertise, best practices, and templates: Project Manager and SysAdmins: 2 days x $800/day = $1,600 Variable savings: Cost reduction associated with removing any existing EPP solutions. Total Savings $5,600 + any cost avoidance/cost reduction opportunities
  • 12. Info-Tech Research Group 12Info-Tech Research Group 12 Info-Tech Research Group Helps IT Professionals To: Sign up for free trial membership to get practical solutions for your IT challenges  Quickly get up to speed with new technologies  Make the right technology purchasing decisions – fast  Deliver critical IT projects, on time and within budget  Manage business expectations  Justify IT spending and prove the value of IT  Train IT staff and effectively manage an IT department •“Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP