Tips to Endpoint Management, Security and Compliance Challenges
This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.
Steve Brasen - Research Director, Enterprise Management Associates | Tim Williams, Director, Product Marketing HEAT Software
As Windows support requirements continue to dominate the focus of enterprise endpoint management efforts, an increasing number of Apple device users are becoming frustrated with being treated as second-class citizens. At the heart of the problem are Windows-centric practices and solutions that do not comprehensively translate to supporting Mac and iOS platforms. However, adoption of Apple management point solutions that operate independent of existing Windows administration platforms only add to management complexity and fail to achieve service reliability and cost-effectiveness.
Join Steve Brasen, EMA Research Director from analyst firm, Enterprise Management Associates, and Tim Williams, Director Product Marketing at HEAT Software for a one-hour presentation identifying the optimal practices and solutions that will enable comprehensive management of Apple devices side-by-side with Windows endpoints.
Key topics of discussion include:
•What is the current state of Apple device adoption and use in the enterprise?
•What specific Apple requirements are not being serviced by traditional Windows-targeted management solutions?
•Which methods should be employed to maintain consistent user experiences across different endpoint architectures?
•What effect has increased workforce mobility had on emerging Apple support requirements?
•How can enterprise security requirements be maintained across disparate software and hardware ecosystems?
In this session, 6x Microsoft MVP and Sr. Solutions Specialist, Duncan McAlynn, will have a discussion with Logun Baker, Senior Systems Administrator for The Huntington National Bank, regarding the challenges of 3rd party application patching within their enterprise and how they have solved those problems
During the webinar, McAlynn will also be demonstrating how PatchLink natively plugs into the SCCM Admin Console, providing seamless integration into existing patch management workflows without any additional client deployment, infrastructure requirements or added consoles.
-Hear a real-world case study from a customer that addresses 3rd party patching to protect and defend themselves against malware/randsomware within their enterprise
-Learn about free add-on tools available from Microsoft and the System Center community to help extend and enhance the core capabilities of SCCM for security compliance monitoring and management
System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications and server platforms?
Introducing the only enterprise-class 3rd party patching solutions designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.
Join us for a discussion of practical methods to improve and automate the patch process for your most targeted 3rd party desktop applications and non-Windows server platforms, reduce the time you spend building updates, and improve audit readiness in your Windows environment.
Security is Complex, Patching with Microsoft® System Center Shouldn't Be
System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications?
Introducing the only enterprise-class 3rd party patching solution designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.
Join us for an in-depth demonstration of practical methods to improve the patch process for your most targeted 3rd party desktop applications, reduce the time you spend building updates, and improve audit readiness in your Windows environment—through our newly released Lumension® Patch Manager DeskTop plug-in.
Key capabilities include:
Integrated plug-in with automated content subscription and synchronized scheduling—all within the familiar SCCM console but without need for manual SCUP input
Ensures systems are correctly patched the first time though Patent-pending Patch-Smart™ technology
Enterprise-class content which delivers in-depth vulnerability information and supports both enterprise and consumer versions of the most widely adopted, highly targeted applications
After so many massive data breaches in 2014, it’s small wonder that data protection is such a hot topic today. The fourth annual Data Protection Maturity Trends report delves into the issues and concerns facing IT security teams, how effective their data protection efforts have been to date, and their plans for 2015 and beyond.
User-centric risk tops this year’s concerns: what is IT doing about it?
Endpoint risk is rising and 78% of respondents to the new 2015 State of Endpoint Security study say negligent, careless employees not following policy are IT’s biggest threat.
The 6th Annual survey, conducted by Ponemon Institute, asked IT practitioners involved in securing endpoints about risks and challenges in 2015. This year’s report reveals why risk has become more challenging over the last 24 months and what IT plans to do about it in 2015.
Join us Wednesday January 21st at 8am PST / 11am EST, as Larry Ponemon and Chris Merritt reveal analysis from the Annual State of Endpoint Risk, sponsored by Lumension, including:
• The evolving IT threat landscape and today’s top-5 risks
• The disconnect between perceived and actual risk, and the corresponding strategies to combat these threats including detect and respond, big data and threat intelligence
• Insights into new Infosec budgets and their 2015 allocations
Register Today, and learn how your peers are planning on addressing the endpoint security risks and challenges of 2015.
Over the past few years Endpoint Security Management offerings — including patching, configuration, device control, and mobility — have been bundled into suites to simplify management. Protecting endpoint devices continues to get harder, so Securosis has authored new research that now includes anti-malware, BYOD and more.
Join Mike Rothman, President, Securosis as he shares clear, up-to-date buying criteria for those looking at procuring endpoint solutions in the near future. Included will be a look at the ongoing challenge of securing endpoints, recommended how-to’s on protecting endpoints, reducing attack surface and managing mobile security as well as important buying considerations and a procurement process.
The days in which an organization owned and issued all devices accessing its network are long gone. Employees are now using their personal mobile devices to store and access corporate data, but many organizations do not have policies or security in place to mitigate BYOD risk.
We learned in the 2014 State of the Endpoint Survey by Ponemon that 75% of IT professionals saw mobile device protection as the number one challenge for 2014, and 46% admitted they have no security policies in place for mobile devices.
Since mobile device security is an increasing priority, Lumension sponsored the second BYOD & Mobile Security Survey with the global LinkedIn Information Security group to hear the community’s views and sentiment on this issue. After surveying over 1,000 respondents, the preliminary results are in, and we want to give a sneak peek to share the findings with you!
Join Chris Merritt, Director of Solution Marketing at Lumension, in this interactive, 30 minute discussion to learn:
• Your peers’ big concerns on BYOD and mobile security
• What they are currently doing to combat mobile device risk
• What solutions & security policies work in organizations
We look forward to hearing your thoughts and hope to see you there!
Point of Sale (POS) systems have long been the target of financially-motivated crime. And in 2013 the magnitude of cybercrime against POS systems skyrocketed, with 97% of breaches in the retail sector and 47% in the healthcare sector aimed against POS systems. With sensitive financial and personal records getting exposed by the millions, the FBI recently warned that POS systems are under sustained and continued attack.
During this webcast, we will take you into the three critical entry points to POS system attacks. We’ll discuss how the attacks look, the timelines for these breaches, and what proactive security measures you can take to help your organization minimize the risk to your POS systems.
•3 Critical Entry Points to POS System Attacks
•Impacts to an Organization
•Top 3 Security Measures to Minimize Risk
In 2012 we found that the BYOD environment and the consumerization of the workplace had turned traditional notions of corporate IT upside down. In this webcast, we’ll look at the results from the 3rd annual survey and look at how mobility has changed the way IT teams are managing their devices, how effective their efforts are, and their biggest concerns.
During this webcast we will look at each of data protection trends, helping you define best practices for your organization to address the top concerns. We’ll also show you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
Organizations around the world are losing intellectual property and customer data to cyber criminals at mind-boggling rates. How is this happening?
For 5 consecutive years, the annual State of the Endpoint Report, conducted by Ponemon Institute, has surveyed IT practitioners involved in securing endpoints. This year’s report reveals endpoint security risk is more difficult to minimize than ever before. What are IT pros most concerned about heading into 2014? From the proliferation of mobile devices, third party applications, and targeted attacks/APTs, endpoint security risk for 2014 is becoming more of a challenge to manage.
Join Larry Ponemon of the Ponemon Institute and Ed Brice of Lumension for a webcast that will reveal statistics on growing insecurity, IT’s perceived areas of greatest risk for 2014 as well as tactical suggestions for how to improve your endpoint security. Specifically, you will learn:
•IT perspective on the changing threat landscape and today’s Top 5 risks;
•Disconnect between perceived risk and corresponding strategies to combat those threats;
•Tips and tricks on how to best communicate today’s threats and subsequent needed responses up the management chain