Reducing IT TCO with Effective Endpoint Security Management



Similar documents
Aerospace End Portfolio Performance Conversion Strategy

Vulnerability Management ROI Calculator User Guide. v2.0 Monday, September 29, Copyright 2008, Lumension Security

Benchmarking VoIP Performance Management

Why you need an Automated Asset Management Solution

Lumension Guide to Patch Management Best Practices

Closing the Antivirus Protection Gap

Sage ERP I White Paper. Tips for Maximizing the Return on Your ERP Investment

Federal Cyber Security Outlook for 2010

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

ERP in Wholesale and Distribution

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

Symantec Control Compliance Suite. Overview

A Guide for Implementing Best-in-Class Time and Attendance Strategies

The expression better, faster, cheaper THE BUSINESS CASE FOR PROJECT PORTFOLIO MANAGEMENT

Customer Data Quality: Roadmap for Growth and Profitability. June 2007

Cisco Remote Management Services for Financial Services

The Casper Suite An ROI overview

The Total Cost of ERP Ownership in Mid-Size Companies

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

The Total Cost of ERP Ownership in Mid-Size Companies

Maintenance, Repair, and Operations (MRO) in Asset Intensive Industries. February 2013 Nuris Ismail, Reid Paquin

To ERP or Not to ERP: It Isn't Even a Question

Real Estate and Facilities Lifecycle Management

The Advantages of Project Management in Software Development

Think Your Anti-Virus Software Is Working? Think Again.

Logical / Physical Security Convergence. Is it in the Cards?

Boosting Enterprise Application Performance in Distributed Environments

Application Performance in Complex and Hybrid Environments

FISMA Compliance: Making the Grade

Secunia Corporate Software Inspector (Secunia CSI) ver.5.0

SecurityMetrics Business Associate HIPAA compliance program

NetIQ FISMA Compliance & Risk Management Solutions

Avaya Users Deploy Best-in-Class Practices to Improve Contact Center Performance

Symantec Control Compliance Suite Standards Manager

Vulnerability Management

Total Protection for Compliance: Unified IT Policy Auditing

Closed Loop Quality Management: Integrating PLM and Quality Management

1/8/2012. Gordon Shevlin, Allgress, Founder, CEO Kyle Starkey, CISO, Early Warning Services. Effectively Communicating IT Risk to Senior Management

Dynamic Service Desk. Unified IT Management. Solution Overview

MANAGED SECURITY SERVICES: WHEN IT'S TIME TO STOP GOING "IT" ALONE

Lead Prioritization and Scoring

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists

CA Vulnerability Manager r8.3

Intelligent Whitelisting:

ITSM IT Transforms Itself into a Service

Lead Nurturing. The Secret to Successful Lead Generation. November 2008 Ian Michiels

Lumension Endpoint Management and Security Suite (LEMSS): Patch and Remediation

How To Understand Cloud Economics

Building a Corporate Application Security Assessment Program

Patch Management. Picking the Low-Hanging Fruit. Why fixing third-party application vulnerabilities is at

Smart Machines Lead to Smarter Service: Remote Intelligence Signals Profitable Resolution

Global Manufacturing Operations Management

CASE-IN-POINT: AVAYA'S SUPPLY CHAIN TRANSFORMATION - ENABLED BY A VISION FOR PEOPLE, PROCESS, AND TECHNOLOGY

Special Report: The Future of AP

Complete Patch Management

Network Security and Vulnerability Assessment Solutions

How To Get A Best Class Performance Rating From A Best-In-Class

The State of Master Data Management, 2012

Architecture Principles

How To Manage A Vulnerability Management Program

Asset Discovery with Symantec Control Compliance Suite

thyu Engineering Change Management 2.0: Better Business Decisions from Intelligent Change Management

Symantec Client Management Suite 7.6 powered by Altiris technology

Symantec Client Management Suite 8.0

Telecom Lifecycle Management

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Lumension Endpoint Management and Security Suite

How To Manage Security On A Networked Computer System

SACM Vulnerability Assessment Scenario IETF 94 11/05/2015

Fact or Fiction: Debunking the Top 5 Misconceptions about Vulnerability Management

Measuring Marketing Performance:

Symantec Client Management Suite 7.5 powered by Altiris

Best Practices for Implementing Software Asset Management

Operating System Migration

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Security in the Cloud: Embracing the Technology While Minimizing Risk. For Conference Purposes Only

Confidence in the Cloud Five Ways to Capitalize with Symantec

Enterprise Asset Management

paragyte Whitepaper The Significance of CRM in Retail Industry

PUTTING MANAGED FILE TRANSFER IN PERSPECTIVE: TAKE A LOOK AHEAD

NERC CIP VERSION 5 COMPLIANCE

Best-in-Class Strategies for Selecting an ERP Solution in July 2013 Nick Castellina, Peter Krensky

Closing the Vulnerability Gap of Third- Party Patching

ENSURING TIMELY AND ACCURATE FINANCIAL PLANS, BUDGETS, AND FORECASTS THROUGH AUTOMATION

Pieter Zevenbergen Microsoft Arnhem,

ERP Selection. Finding the Right Fit. October 2012 Nick Castellina, Peter Krensky

HRO - Early Findings and Best-in-Class Talent Management Metrics -

Asset Performance Management

Take Back Control in IT. Desktop & Server Management (DSM)

Energy Management. Driving Value in Industrial Environments. April 2009 Mehul Shah, Matthew Littlefield

WHITE PAPER Using SAP Solution Manager to Improve IT Staff Efficiency While Reducing IT Costs and Improving Availability

Cisco AnyConnect Secure Mobility Client integration with ISE & SCCM client for patch remediation on windows

The Rising Opportunity for CMO-CIO Collaboration in the Pharmaceutical Industry

7 Practical insights for IT Asset Management

Event Driven Manufacturing Intelligence. Creating Closed Loop Performance Management

Siemens Closes the Gap between Corporate and Industrial Networks

Sales and Marketing Alignment

McAfee epolicy Orchestrator

Financial Planning, Budgeting, and Forecasting

Transcription:

Reducing IT TCO with Effective Endpoint Security Management

How has the current economic environment impacted organizations and the security and management of endpoints?

Business Challenge - Do More with Less Relentless security threats» Increasing sophisticated» Financially motivated Complex compliance requirements» Industry and gov t regulations» Industry standards and best practices» Service Level Agreements» Internal policies» Highly regulated business environment $ IT budgets Innovation, growth initiatives Security, compliance budgets time Challenging economic conditions» Financial pressures» Employee pressures Internal motivations» Optimizing processes for greater efficiency» Allocating resources to minimize total cost» Aligning IT investments with the strategic objectives of the business 3

Risk Management Enables Well Managed Endpoints IT Security Governance, Risk Management, and Compliance = Secure, Compliant, Well-Managed Risk Compliance Governance Assess Manage Achieve Sustain Optimize Threats Vulnerabilities Opportunities Identify/Classify Accept Ignore (Accept) Assign Manage Industry Regulations Government Regulations Industry Standards / Best Practices Service Level Agreements Internal Policies Educate the Organization Cost Reduction Efficiency Effectiveness Allocate Resources More Rewarded Risk, Less Unrewarded Alignment w/ the Business Enable Innovation, Growth Opportunities 4

Latest Aberdeen report highlights performance metrics for organizations deemed Best-in-Class? Can you explain what these mean?

Is Your Organization Best-in-Class? 6 Definitions Best-in-Class - Top 20% of aggregate performance scorers Industry Average - Middle 50% of aggregate performance scorers Laggard - Bottom 30% of aggregate performance scorers Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

From a security perspective, what are the Best-in- Class key performance indicators (KPIs)?

Key Performance Indicators (KPIs) - Security Best-in-Class Industry Average Laggards Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

What are the Best-in-Class KPIs from a compliance perspective?

KPIs - Compliance Best-in-Class Industry Average Laggards Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

What are the Best-in-Class KPIs from an operational cost perspective?

KPIs Operational Costs (end-user) Best-in-Class Industry Average Laggards Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

KPIs Operational Costs (IT Management) Best-in-Class Industry Average Laggards Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

So it looks like top performance from an endpoint security perspective can significantly impact your bottom line. Could you walk us through an example?

Effective Endpoint Security Reduces Costs Best-in-Class organizations achieve 10.9% annual advantage» Total staff (FTE) dedicated to endpoint security, compliance and management = 4.5%» Time spent on endpoint related administrative tasks = 5.8%» Time spent on endpoint related analysis, reporting and management = 4.6% Example: 4.5% reduction in FTE staff» How many FTE staff do you have?» How much on average do they cost?» Assuming 8 FTE staff at fully loaded cost of $125k/year, top performance translates to approximate annual savings of $45k» Assuming weighted average cost of capital (i.e. time value of money) of 10%, $45k/year in perpetuity has net present value of $450k Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

Effective Endpoint Security Reduces Costs $245/endpoint/year is associated with cost of endpoint security, compliance and management. Best-in-Class impact:» Endpoint security costs = 9.3% or $6/endpoint/year» Endpoint management costs = 10.9% or $6/endpoint/year Example: Components of TCO/endpoint/year» Internal Support : $85 * 9.3% = $7.90» Reinstall/reimage/recovery: $46 * 9.4% = $4.30» Endpoint Security and Compliance: $63 * 9.3% = $5.90» Endpoint Management: $51 * 10.9% = $5.60 Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009 Best-in-Class performance saves $24/endpoint/year or $80 over the average endpoint replacement cycle (roughly 3 years) 16

In this current economic and dynamic threat landscape, what forces are driving Best-in-Class organizations to invest in endpoint security solutions?

Balance Risk versus Productivity Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

What technologies are enabling the protection and management of endpoint systems?

Technologies Enabling Endpoint Security Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

Technologies Enabling Endpoint Management Source: Aberdeen Group, Endpoint Security, Endpoint Management, March 2009

Can you provide us with any recommendations?

Key Recommendations to Improve Security Posture and Reduce TCO 23 1. Identify and inventory the endpoint systems being protected and report on them 2. Prioritize security objectives for these assets as a function of risk, audit and compliance requirements and establish consistent policies and procedures 3. Standardize endpoint systems, configurations and rollout processes. 4. Establish an overall approach to endpoint protection and management 5. Automate assessment, prioritization and remediation of security-related issues and packaging, provisioning and installing software and configuration changes 6. Assign clear ownership and accountability for endpoint security and management initiatives to an executive or cross-functional team 7. Invest in documentation, awareness and training for end-users 8. Establish a consistent, unified view of information and events related to endpoint systems; standardize audit, analysis and reporting 9. Measure and monitor regularly

Thank You. For more information, visit us at www.lumension.com or check out our blog for the most up-to-date commentary at http://blog.lumension.com

Global Headquarters 15880 N. Greenway-Hayden Loop Suite 100 Scottsdale, AZ 85260 1.888.725.7828 info@lumension.com