Vulnerability Intelligence & 3 rd party patch management

Similar documents
Complete Patch Management

Managing non-microsoft updates

Complete Patch Management

Complete Patch Management

EXTENSIVE FEATURE DESCRIPTION SECUNIA CORPORATE SOFTWARE INSPECTOR. Non-intrusive, authenticated scanning for OT & IT environments. secunia.

Secunia Corporate Software Inspector (Secunia CSI) ver.5.0

Secunia Vulnerability Intelligence Manager

Closing the Vulnerability Gap of Third- Party Patching

IT Security & Compliance. On Time. On Budget. On Demand.

Current IBAT Endorsed Services

Network Security and Vulnerability Assessment Solutions

How To Protect Your Network From Attack From A Network Security Threat

PCI DSS Top 10 Reports March 2011

Reducing the cost and complexity of endpoint management

Lumension Endpoint Management and Security Suite

Symantec Client Management Suite 8.0

Why Free Patch Management Tools Could Cost You More

Devising a Server Protection Strategy with Trend Micro

How To Buy Nitro Security

Strengthen security with intelligent identity and access management

The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Devising a Server Protection Strategy with Trend Micro

Simply Sophisticated. Information Security and Compliance

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Technical Note. CounterACT: Powerful, Automated Network Protection Inside and Out

IT Security Strategy and Priorities. Stefan Lager CTO Services

McAfee Server Security

Vulnerability Management

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Resolving the Top Three Patch Management Challenges

CuTTIng ComplexITy simplifying security

How To Monitor Your Entire It Environment

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

Symantec Control Compliance Suite Standards Manager

TRIPWIRE NERC SOLUTION SUITE

THE TOP 4 CONTROLS.

How To Manage A System Vulnerability Management Program

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

SANS Top 20 Critical Controls for Effective Cyber Defense

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

PCI-DSS Penetration Testing

Total Protection for Compliance: Unified IT Policy Auditing

Avoiding the Top 5 Vulnerability Management Mistakes

Application Security Center overview

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Symantec Control Compliance Suite. Overview

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Integrated Threat & Security Management.

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Simple Security Is Better Security

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

NERC CIP VERSION 5 COMPLIANCE

White Paper The Dynamic Nature of Virtualization Security

Secunia Vulnerability Intelligence Manager (VIM) 4.0

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

IBM Security IBM Corporation IBM Corporation

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

IBM Tivoli Endpoint Manager for Security and Compliance

PCI DSS Reporting WHITEPAPER

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

SharePoint Governance & Security: Where to Start

Proactive Vulnerability Management Using Rapid7 NeXpose

Client Security Risk Assessment Questionnaire

IBM Security X-Force Threat Intelligence

DOBUS And SBL Cloud Services Brochure

Ecom Infotech. Page 1 of 6

Practical Patch Compliance

IBM Security QRadar Risk Manager

How To Manage A Network Security Risk

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

2011 Forrester Research, Inc. Reproduction Prohibited

Compliance Management, made easy

Real-Time Security for Active Directory

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

IBM Endpoint Manager Product Introduction and Overview

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

Symantec Endpoint Protection

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

Bringing Continuous Security to the Global Enterprise

Leveraging a Maturity Model to Achieve Proactive Compliance

Transcription:

Vulnerability Intelligence & 3 rd party patch management Presented By: William Hamilton Melby

Company Overview Brief Secunia facts Established: 2002 HQ: Copenhagen, Denmark Regional office: Minneapolis, USA Ongoing collaboration with leading industry organizations Trusted advisor to thousands of organizations, including CERTS and ISACs, the White House, NATO, NIST, NERC and Mitre. Endorsements and ongoing collaboration: Industry experts consistently recognize Secunia s product innovation and commitment to eliminating vulnerabilities. 2

Market Focus The three pillars of our success Vulnerability Intelligence, Vulnerability Management and Patch Management for global enterprises, SMBs and private users Worldrenowned 1 Vulnerability Intelligence Award-winning 2 Vulnerability Management Best-in-Class 3 Patch Management 3

Microsoft Alliance Partner Ongoing collaboration and solutions integration Because patching non-microsoft programs is essential to corporate security Secunia is the first Vulnerability Security Alliance Partner of the Microsoft Technology Center Program. Our solutions integrate with Microsoft System Center 2012 and Microsoft WSUS. We are also a member of Microsoft s System Center Alliance Program. 4

Microsoft Alliance Partner Ongoing collaboration and solutions integration With System Center 2012 Configuration Manager, our customers can empower employee productivity on a wide range of devices while maintaining compliance and working to protect company data. With Secunia CSI and System Center 2012 Configuration Manager, our joint customers can streamline patch management processes and protect both Microsoft and non-microsoft applications from vulnerabilities. - Andrew Conway, Director Product Marketing, Microsoft 5

Research Team The heart and soul of Secunia; the eyes and ears of the industry One of the largest Vulnerability Intelligence databases on the market Database contains vulnerabilities in software products since 2003. 48,213+ programs, applications and plug-ins from thousands of software vendors. Fully CVE compliant. Data is tested and verified by Secunia s researchers. The database is unique to Secunia and is Secunia s own IP. 6

7

The Highlights Secunia Vulnerability Review 2014 8

Vendor Update Top 50 Software Portfolio Non-Microsoft (Third-party) Programs Microsoft Products Operating Systems Microsoft programs (including Windows 7) account for 66% of the products in the Top 50, but were only responsible for 24% of the vulnerabilities. Source: Secunia Vulnerability Review 2014. https://secunia.com/vulnerability-review/ 2014 Secunia Presentation 9

Time to Patch Patch availability on Day 1 increasing (Top 50 software portfolio) 84% of vulnerabilities had patches available on the day of disclosure. You can patch most vulnerabilities the trick is knowing what to patch. In 2011, the number was 72%. Source: Secunia Vulnerability Review 2013. https://secunia.com/vulnerability-review/ 10

Why Are Vulnerabilities Important? They are the attack vector you should never ignore Through 2015, 80% of successful attacks will exploit well-known vulnerabilities and be detectable via security monitoring. - Gartner Source: Adapting Vulnerability Management to Advanced Threats. Gartner. April 2012 http://www.gartner.com/id=2142515 11

The Root Cause of Security Issues In other words: an Access All Areas pass for cybercriminals Vulnerabilities in software are used routinely by cybercriminals as gateways to exploit corporate networks. (1) 60% of attacks in 2012 were performed by commercialized exploit toolkits, sold in the underground, allowing anyone to become a cybercriminal. (2) Over 65% of the top threats in Q4 2012 used vulnerabilities to infect machines and perform malicious activities. (2) Sources: (1) AVG Community Powered Threat Report. Q4 2012. AVG http://mediacenter.avg.com/content/dam/mediacenter/threatreports/avg%20threat%20report%20q4%202012_final.pdf (2) Russian Underground 101. Research Paper. Trend Micro Incorporated. 2012 http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wprussian-underground-101.pdf 12

What You Are up Against Continual threats on the horizon Writing malicious code is no rocket science: In 2012 a 11-year-old child developed a Trojan to steal account login information from online gamers. Source: AVG Community Powered Threat Report. Q4 2012. AVG http://mediacenter.avg.com/content/dam/mediacenter/threatreports/avg%20threat%20report%20q4%202012_final.pdf 13

What You Are up Against Continual threats on the horizon (In 2012) There were a surprising number of major incidents involving the Conficker worm, despite a patch being available since 2008. Source: Information Security Breaches Survey 2013. Technical Report. PwC http://www.pwc.co.uk/auditassurance/publications/2013-information-security-breaches-survey.jhtml 14

The Concept of Complete Patch Management 15

Introduction to the Secunia CSI Combining scanning and patching to meet the requirements of both IT security and operations It s not enough to detect the vulnerabilities if you can t patch them. It s not enough to have the patches, if you don t know where to apply them. Secunia CSI gives you the when, the where, the what and the how: This combination of vulnerability intelligence, vulnerability scanning, patch creation and patch deployment is unique in the industry. 16

Value Proposition Our foundation stone for the proactive detection and remediation of vulnerabilities INTEGRATION 17

CSI Key Takeaways What s in it for you? Management Comply with regulatory standards (e.g. PCI-DSS or NERC- CIP) regarding the patching of programs. Utilize your existing infrastructure to enforce security levels, i.e. Microsoft System Center 2012. Enable policy enforcement and document your compliance efforts in the case of a breach. Operations An overview of the security state of all programs installed across endpoints and servers for effective prioritization of patching efforts. Cross-platform scanning and patching of non-microsoft programs. Automatic package creation, plus access to out-of-the-box packages. Security Pinpoint the exact vulnerabilities affecting your network and verify security levels (Microsoft, third-party and custom programs). Audit, enforce and document patching levels based on indepth intelligence. Secure your off-site assets. 18

What Best Practice Patch Management Offers The wisdom and agility to tackle oncoming threats and a strengthened security posture Automatic identification of vulnerabilities in networks across endpoints and servers, grouped according to threat criticality. Streamlined patching efforts according to risk exposure, mitigation and compliance standards. Optimized workflow and remediation process through integration with patch deployment tools and automatic patch repackaging. A complete, real-time overview of installation and the security state of all installed programs (both Microsoft and non-microsoft). Multi-platform approach: Windows, Mac OS and Red Hat Linux are all catered for. Simplified patching of non-microsoft programs through existing patch deployment tools (Microsoft System Center 2012, WSUS, Altiris). Off-site assets secured by managing threats from endpoints not under the direct control of your corporate network 19

How We Compare 20

How We Compare to Other Vendors Market leadership: Clear differentiation Best-in-class solution for medium-sized organizations and enterprises Company Vulnerability Assessment Vulnerability Scanning Patch Management Observations Vulnerability coverage: +48k Programs covered: +25k Patch library: +350 Complete patch management solution: (VI+VS+PC+PD=PM) In-house research team (verified intelligence) Largest coverage of third-party programs Non-intrusive scanning technology A comparative sample of typical vendors Typical Patch Management vendor x x Patch Manager integration restricted to Microsoft System Center/WSUS Coverage of third-party programs: 20-30 vendors only No in-house research team No scanning capabilities reliance on information released by vendors, therefore offering limited accuracy Offers only pre-packaged updates, which might result in incompatibility with IT environments and unsuitability to more complex network structures Cumbersome installation not designed for enterprises and scalability requires additional resources Typical Vulnerability Management vendor x Probe-based scanning only. Low Windows thirdparty detection coverage No patching capability; only remediation advice and management features are provided High technical knowhow required for deployment and utilization very intrusive 21

Q&A Stay Secure www.secunia.com Secunia Mikado House, Rued Langgaards Vej 8, 4th floor DK-2300 Copenhagen S Denmark Phone: +45 7020 5144 Fax: +45 7020 5145 Secunia Inc. Lake Calhoun Business Center, Suite 420 3033 Excelsior Boulevard Minneapolis, MN 55416 USA Phone: +1 888 924 8265 Fax: +1 888 924 8266