Compensating Security Controls for Windows Server 2003 Security
|
|
|
- Phyllis Fox
- 10 years ago
- Views:
Transcription
1 ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft will end-of-life Windows Server 2003 as of July 14, 2015 and no longer provide software maintenance or support. In other words, Microsoft will stop issuing software updates for patching software vulnerabilities discovered. Unfortunately, this is a cause of great concern for many organizations that are still running Win2K3 servers and may take some time before they can migrate these workloads to alternative operating systems. Organizations planning on continued use of Windows Server 2003 must implement compensating controls to add defense-indepth protection and enhanced security monitoring capabilities. Trend Micro s Deep Security product can be helpful here by providing network, system and anti-malware security controls across physical, virtual, and cloud systems running W2K3. Overview July 14, 2015 marks an important day in the annals of Information Technology. On that day, Microsoft Corporation will officially end-of-life its venerable Windows 2003 Server product, offering no further maintenance, software patches, or support. From a software perspective, the retirement of Windows Server 2003 makes a lot of sense. After all, Win2K3 was first introduced in April 2003 and its successor, Windows 2008, has been around since February Based upon normal software product lifecycles then, Windows Server 2003 s departure was long overdue. In spite of Microsoft s operating system progress however, many organizations continue to cling to Windows Server 2003 on the eve of its retirement. In fact, ESG research indicates that 35% of organizations report that more than 30% of their Windows server portfolio is still made up of Windows Server 2003 today (see Figure 1). 1 1 Source: ESG Brief, Microsoft Windows Server 2003: The End is Nigh, February All ESG research references and charts in this solution showcase have been taken from this research report, unless otherwise noted. This ESG Solution Showcase was commissioned by Trend Micro and is distributed under license from ESG.
2 Solution Showcase: Compensating Security Controls for Windows Server 2003 Security 2 FIGURE 1. Windows Server 2003 Remains Widely Deployed 20% 18% 16% 14% 12% 10% 8% 6% 4% 2% 0% Approximately what percentage of your organization s total Windows server environment is comprised of Windows Server 2003? (Percent of respondents, N=601) 17% 19% 0% 1% to 10% 12% 11% to 20% 15% 21% to 30% 10% 10% 31% to 40% 41% to 50% 5% 51% to 60% 3% 3% 61% to 70% 71% to 80% 2% 2% 81% to 90% 91% to 100% 1% Don t know Source: Enterprise Strategy Group, 2015 What Are Organizations Planning to Do? CIOs have seen this movie before. For example, Microsoft ceased supporting its PC operating system, Windows XP, in April 2014, and other software vendors have similarly put older software versions out-to-pasture after years of useful service. In anticipation of Windows Server 2003 s retirement, many organizations are already planning their next moves. For example, ESG research indicates that 73% of organizations plan to upgrade to Windows Server 2012 and reinstall applications, 35% want to move Win2K3 servers to public cloud infrastructure, and 32% are intent on retiring servers, operating systems, and resident applications (see Figure 2). These legitimate options provide an upgrade path off of Windows Server 2003, but migration processes can be time consuming and resource intensive. This may be why industry research indicates that 15% to 20% of PCs are still running Windows XP, more than a year after its official end-of-life deadline. Server operating system migrations may be even more onerous, since these upgrades can be impacted by: Regulators and auditors. In some cases, regulatory bodies need to certify specific application/operating system configurations. This is not unusual in the health care industry where it can take months before government agencies complete their certification process and approve new application/os combinations. While IT and compliance auditors may not need official operating system certification, they may ask for several months to familiarize themselves with new application/os combinations before they are willing to consider them as in compliance. Packaged application vendors. Certain packaged application vendors may also need some lag time before they are willing to support the migration of their applications to OS versions beyond Windows Server This is especially true for fixed-function applications such as industrial control systems, manufacturing equipment, and health care devices. System qualification and testing. Even organizations that plan on moving to Windows Server 2008, 2012, or public clouds will still be faced with projects to qualify their applications on new operating environments, test application functionality, modify IT and security operations, and deploy new servers on production IT networks. Yes, moving
3 Solution Showcase: Compensating Security Controls for Windows Server 2003 Security 3 Windows Server 2003 workloads to the cloud may be slightly easier, but IT managers will still demand ample time for qualification, testing, and IT process re-engineering. Since this process can take months to accomplish, CIOs may also slow-roll operating system upgrades in favor of higher-priority projects that deliver more tangible business benefits. FIGURE 2. Upgrade and Migration Plans for Windows Server 2003 What are your organization s plans for upgrading from and/or migrating off of its Windows Server 2003 systems? (Percent of respondents, N=497, multiple responses accepted) Upgrade to Windows Server 2012 and reinstall application(s) 73% Reinstall/redeploy application(s) on public cloud infrastructure (e.g., MS Azure, Amazon Web Services, Google, etc.) 35% Retire server, operating system, and application(s) 32% Replace application(s) with a SaaS-based application(s) 31% Continue to run Windows Server 2003 without support and maintenance 25% 0% 10% 20% 30% 40% 50% 60% 70% 80% Source: Enterprise Strategy Group, 2015 Windows Server 2003 and IT Risk The ESG research indicates that 25% of organizations will continue to run Windows Server 2003 without support or maintenance while many others will need time to migrate to newer versions of Windows or cloud-based alternatives. In the meantime, continuing use of Windows Server 2003 can only increase IT risk. IT risk will be on the rise because hackers and cyber-criminals also understand that Windows Server 2003 will be hanging around for a while. Unfortunately, this means that cyber-adversaries are likely to accentuate their efforts to find 0-day vulnerabilities for exploitation and resale. Once discovered, black hat security researchers will sell them to the highest bidders who will then develop exploit kits and look for other buyers on cyber-crime websites. Others will pile on, offering malicious payloads for sale. It won t take long before this black market activity leads to real Windows Server 2003 cyberattacks and data breaches. Normally, Microsoft would usurp this process with an emergency response or a regular software update on patch Tuesday. After July 14 however, Microsoft will be out-of-the-loop, leaving organizations to defend against inevitable attacks on their own.
4 Solution Showcase: Compensating Security Controls for Windows Server 2003 Security 4 Compensating Controls for Windows Server 2003 With no help from Redmond after mid-july, CISOs must take up the slack by employing compensating security controls to protect their Windows Server 2003 systems. These compensating controls should include things like: System hardening. Security professionals will want to lock down Windows Server 2003 with hardened configurations that can disable unnecessary services, set up ACLs for file access, and limit administrator actions. Hardening guidelines are available from Microsoft as well as organizations such as NSA, NIST, and others. Network security controls. CISOs may want to use the network to isolate traffic to-and-from remaining Windows Server 2003 systems. Network security controls can include firewall rules, ACLs, and network segmentation using IP subnets or Layer 2 VLANs. Host-based IDS/IPS, particularly when deployed at an affected host like Windows Server 2003, can also offer vulnerability-facing protection through the use of virtual patching. This is done by updating IDS/IPS signatures with specific rules for blocking exploits aimed at newly discovered software vulnerabilities. As such, virtual patching may be very effective in protecting exposed Windows Server 2003 systems after July 14. System security controls. Security teams can also take action on the server itself in several ways. Existing host-based security software should be configured for maximum protection by enabling features for real-time malware detection/prevention. In some cases, the security operations team may want to install file integrity monitoring software (FIM) on servers with configurations that rarely change (i.e., single or fixed-function servers). CISOs may also want to explore whether they can utilize trusted hardware such as the Trusted Platform Module (TPM) to improve system integrity and attestation. Finally, Windows Server 2003 instances can be run as VMs so they can take advantage of security functionality at the hypervisor level. Organizations may also want to increase their monitoring activities related to all instances of Windows Server This can include frequent reviews of log activity and network flows for anomalous/suspicious activities like network communications with esoteric server processes and services. CISOs may also want to create specific rules and dashboards in security analytics tools to make Windows Server 2003 monitoring easier for the SOC team. Trend Micro Can Help Protect Windows Server 2003 While CISOs recognize the impending security issues around Windows Server 2003, they may not have the time, resources, or skills to piece together a security strategy on their own. Organizations that fall into this category should look instead for security technologies delivering strong Windows Server 2003 security in a comprehensive and easy-to-use package. Security leader Trend Micro can help here as its Deep Security product offers virtual patching, system integrity controls/monitoring, and anti-malware capabilities. Furthermore, Deep Security supports physical, virtual, and cloud-based servers, giving IT and security managers the ability to balance IT flexibility with strong security. Finally, Deep Security provides central management across all security controls, helping to streamline server security operations. Given these capabilities, organizations running Windows Server 2003 after mid-july 2015 may want to contact Trend Micro and explore how Deep Security can help them maintain strong security in an operationally efficient way. Trend Micro is committed to helping organizations smoothly transition from Windows Server 2003, and has extended support for Deep Security until 2020 to provide enough runway for migration.
5 The Bigger Truth Solution Showcase: Compensating Security Controls for Windows Server 2003 Security 5 The Windows Server 2003 situation represents a fragile balancing act for organizations. Real business, regulatory, and/or IT issues are forcing IT managers to hang onto Win2K3 beyond its end-of-life date in July, but this means living with obsolete and unprotected software residing on production networks. This certainly presents a real challenge for CISOs as they must figure out how to support business realities while addressing the foreseeable increase in IT risk. Smart security professionals will implement layers of compensating controls for Windows Server 2003 across the network and the systems, thus creating a specific defense-in-depth architecture for these vulnerable servers. The SOC team will also pitch in by increasing server monitoring and developing triggers, alerts, and rule sets to focus on incident detection and response for Win2K3 servers. Of course, security professionals are already quite busy with daily activities and may be overwhelmed by additional tasks for Windows Server 2003 security. In these instances, CISOs should look for turnkey security tools, like Trend Micro s Deep Security, that can help them reinforce Win2K3 server security in an effective and efficient manner, and also provide security to the new platforms, whether in the data center or in the cloud. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at Enterprise Strategy Group is an integrated IT research, analysis, and strategy firm that is world renowned for providing actionable insight and intelligence to the global IT community by The Enterprise [email protected] Strategy Group, Inc. All Rights Reserved. P
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
Windows Server 2003 End of Support. What does it mean? What are my options?
Windows Server 2003 End of Support What does it mean? What are my options? Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock) is looming No more patches from
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
White. Paper. Rethinking Endpoint Security. February 2015
White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed
The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
An Analytics-based Approach to Cybersecurity
ESG Solution Showcase An Analytics-based Approach to Cybersecurity Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Since the Google Aurora incident announced in 2010, large organizations
IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already
White. Paper. Information Security, Virtualization, and the Journey to the Cloud. August, 2010
White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.
Cybersecurity Skills Shortage: A State of Emergency
Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,
Virtual Patching: a Compelling Cost Savings Strategy
Virtual Patching: a Compelling Cost Savings Strategy An Ogren Group Special Report November 2010 Executive Summary IT patch processes are at a critical crossroads. Exploits appear in the wild only a day
Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
The ESG Cybersecurity Maturity Model
ESG Brief The ESG Cybersecurity Maturity Model Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: As part of its research, ESG regularly uses a scoring system to divide survey populations
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
Virtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success
: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success FAST FACTS Over 10 Million Windows Server 2003 Devices Still In Use Less Than 250 Days To Windows Server
White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013
White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI
White Paper VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI By Jon Oltsik, Senior Principal Analyst June 2012 This ESG White Paper was commissioned by Trend Micro and is distributed
Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions
White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed
Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)
Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research
McAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
Research Perspectives
Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
Trend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
The Network Application Security Architecture Requirement
White Paper The Network Application Security Architecture Requirement By Jon Oltsik March, 2011 This ESG White Paper was commissioned by Juniper Networks and is distributed under license from ESG. 2011,
Online File Sharing and Collaboration: Deployment Model Trends
Research Report Abstract: Online File Sharing and Collaboration: Deployment Model Trends By Terri McClure, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager
The Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
This ESG White Paper was commissioned by DH2i and is distributed under license from ESG.
White Paper Application Virtualization: An Opportunity for IT to do More with Much Less By Mark Bowker, Senior Analyst November 2012 This ESG White Paper was commissioned by DH2i and is distributed under
eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life
Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Server and Application Migration made easy. Ask us how!
Server and Application Migration made easy. Ask us how! Blue Turtle Technologies has taken the guesswork out of migrating applications and servers to Microsoft Azure, Windows Server 2012R2 or Microsoft
Securing the Physical, Virtual, Cloud Continuum
Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud
Deep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Trends in Private Cloud Infrastructure
Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction
Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Accelerating Network Virtualization Overlays with QLogic Intelligent Ethernet Adapters Date: June 2016 Author: Jack Poller, Senior
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
IBM Security Intrusion Prevention Solutions
IBM Security Intrusion Prevention Solutions Sarah Cucuz [email protected] IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments
#1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
How To Integrate Identity And Security With A Network-Based Business Process
INFORMATION SECURITY BRIEF Business Enablement Demands Tight Identity and Security Integration Date: April 2009 Author: Jon Oltsik, Principal Analyst Abstract: Identity management and security were once
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
Security Virtual Infrastructure - Cloud
Security Virtual Infrastructure - Cloud Your Name Ramkumar Mohan Head IT & CISO Orbis Financial Corporation Ltd Agenda Cloud Brief Introduction State of Cloud Cloud Challenges Private Cloud Journey to
ILLUMIO ADAPTIVE SECURITY PLATFORM TM
ILLUMIO ADAPTIVE SECURITY PLATFORM TM HIGHLIGHTS Security with Intelligence Illumio ASP is powered by the breakthrough PCE. The PCE contextualizes all traffic flows, services, and processes on application
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices
Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
This ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.
White Paper Network Encryption and its Impact on Enterprise Security By Jon Oltsik, Senior Principal Analyst February 2015 This ESG White Paper was commissioned by Blue Coat and is distributed under license
Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts
Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts March 2015 4 Cloud Computing: Not a Question of If, but Rather
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)
White Paper Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS) By Jon Oltsik, Senior Principal Analyst October 2014 This ESG White
White. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014
White Paper EMC Isilon: A Scalable Storage Platform for Big Data By Nik Rouda, Senior Analyst and Terri McClure, Senior Analyst April 2014 This ESG White Paper was commissioned by EMC Isilon and is distributed
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Solution Brief. Introduction
Solution Brief A Checklist when Choosing a Backup Solution for SaaS-based Applications Date: January 2015 Authors: Jason Buffington, Senior Analyst; and Monya Keane, Research Analyst Abstract: What should
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
White Paper The Dynamic Nature of Virtualization Security
White Paper The Dynamic Nature of Virtualization Security The need for real-time vulnerability management and risk assessment Introduction Virtualization is radically shifting how enterprises deploy, deliver,
