Endpoint Management, Security and Compliance Whitepapers

Achieving Compliance with GSi Code of Connection (CoCo)

In November 2005, The Government published ‘Transformational Government – Enabled by Technology’, which documents the steps necessary to achieve effective delivery of technology for Government. To develop the necessary trust and confidence within the Public Sector communities and between Government and the citizens, a common approach to risk management and the implementation of an Information Assurance framework becomes increasingly important .

The aim of the Code of Connection (CoCo) is to develop the trust required both within and between communities, which then allows more effective use of shared systems and services. The CoCo provides a minimum set of security standards that organizations must adhere to when joining the GSi. This paper addresses some of the key challenges of achieving and maintaining compliance with the GSi Code of Connection (CoCo) for the GCSX, which must be achieved by September 30, 2009.

Click here to download it now »

Achieving Compliance with Massachusetts Data Protection Law 201 CMR 17.00

By March 1, 2010, all organizations with operations and/or customers in the state of Massachusetts will be required to follow comprehensive information security requirements regarding both paper and electronic records containing personal information. These requirements include enforcing password security, encrypting all personal information stored on laptops and removable devices and ensuring up-to-date firewall protection, operating system patches and the latest versions of security agent software. Read this whitepaper to learn how your organization can meet the necessary requirements and improve its security practices.

Click here to download it now »

Achieving Compliance: Australian Information and Communications Technology Security Manual (ACSI 33)

This paper highlights security practices that the Defence Signals Directorate (DSD) requires agencies to follow and explains how Lumension solutions help protect citizens’ information by:

  • Enforcing a trusted application environment where only authorised applications can execute on government systems.
  • Enforcing removable device usage and data encryption policies to prevent data loss or theft.
  • Providing detailed auditing and forensics capabilities that track all data transfer attempts, as well as what specific data was moved to or from a removable device.
  • Streamlining and automating the vulnerability management process to effectively mitigate the majority of risk due to un-patched operating systems and applications and system mis-configurations.

Click here to download it now »

Achieving Federal Desktop Core Configuration Compliance with Lumension® Solutions

The Federal Desktop Core Configuration (FDCC) is an Office of Management and Budget (OMB) mandated security configuration set applicable within United States Federal Government agencies. Private enterprises may also choose to utilize this established framework as a foundation for their own security configuration baselines. All federal agencies that utilize or plan an upgrade to either Windows XP or Vista must report compliance, with FDCC reporting requirements dictated by the standard FISMA reporting guidance. The FDCC specific configuration requirements are generally based on the “Principle of Least Privilege” restricting user and machine rights. This whitepaper examines the FDCC requirements, the compliance challenges including vulnerability management, change control, and system security management and also highlights how Lumension’s SCAP Validated FDCC scanner is integrated with a complete vulnerability management solution to effectively enable compliance with these standards.

Click here to download it now »

Achieving NERC Cyber Security Standards Compliance with Lumension

The North American Electric Reliability Corporation (NERC) is a non-profit corporation chartered to ensure that the bulk electric system in North America is reliable, adequate and secure. As cyber crime has become a dangerous threat and a national security concern to the power grid, NERC has implemented regulations to meet compliance of cyber security standards. Lumension addresses NERC compliance challenges and ensures audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.

Click here to download it now »

Compliance with Data Handling Procedures in UK Government

A recent UK Data Handling Procedures in Government Report set out clear and mandatory procedures to be followed by all government employees that have access to and responsibility for citizen data. The Report was drafted at the request of Prime Minister, Gordon Brown, in response to HMRC’s loss of 2 compact discs containing 25 million child benefit records in November 2007. As a result of this data loss and to thwart future episodes related to this type of preventable loss, all departments placed immediate restrictions on their use of removable media and subsequently all departments have initiated programmes to encrypt laptops and USB memory sticks. The Report sets out significant changes to government departmental policy with regard to secure handling of citizens’ data and individual departments must show compliance with the new Data Handling procedures within their annual report at the end of 2008.

This paper aims to guide government employees and their partner agencies on how Lumension’s tightly integrated portfolio of solutions including Data Protection, Endpoint Protection, Vulnerability Management and Security & Compliance can assist in meeting these data handling requirements, specifically with regards to the control and visibility of removable media used by government personnel; the auditing of data transferred to and from such media and the encryption of data stored on portable devices.

Click here to download it now »

Endpoint Security, Endpoint Management: The Cost-Cutter’s Case for Convergence

This latest Aberdeen Group benchmark report, sponsored by Lumension, is for any organization that relies upon end-user computing platforms (e.g., personal computers, workstations, laptops, notebooks) - and their associated applications, data, and network connectivity - to carry out strategic business objectives. It describes how the companies with top results keep these endpoints "clean and ready." To distinguish Best-in-Class companies from Industry Average and Laggard organizations in protecting and managing endpoints, Aberdeen used the year-over-year changes in the following performance criteria related to their endpoint systems:

  • Number of actual security-related incidents
  • Number of non-compliance incidents (e.g., audit deficiencies)
  • Total management costs

Companies with top performance based on these criteria earned Best-in-Class status. Read this report to learn specific recommendations on achieving Best-in-Class status and how to focus first on the security of endpoint systems, then on compliance, then on optimizing ongoing management for greater efficiency and lower cost.

Click here to download it now »

Endpoint Security: Moving Beyond AV

Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability, filling in the gaps that anti-virus (AV) was never designed to cover. Organizations have invested heavily in traditional AV solutions, often stacking AV filters from multiple vendors along the data path in the desperate hope that one of the products would stop malware from infecting the corporate or government endpoints. While AV plays a crucial role in identifying known malware and cleaning infected systems, the reality is that relying on layers of the same defense mechanism leaves organizations completely exposed to attacks and data theft from unknown or designer malware that can be delivered in web-based active code, downloaded encrypted code fragments, and persistent botnets. Security teams that know they need more than AV are now deploying application whitelisting technology to protect laptops, desktops, server and Point-of-Sale endpoints from unidentified malicious code as well as undetected code injections - and they are finding significant operational benefits due to fewer interruptions responding to infected endpoints.

This Ogren Group Special Report, Endpoint Security: Moving Beyond AV, commissioned by Lumension, presents the market demand for application whitelisting with recommended actions for security decision makers. Information in this report derives from Ogren Group research and interviews with enterprise security executives of global organizations.

Click here to download it now »

Five Ways to Reduce Your Audit Tax

Taxes are certainly not fun, but there is something worse: an audit. Combine the two in a risk and compliance scenario and you have the onerous “audit tax,” a figurative term used to describe the expenses a company incurs when deploying resources and manpower to satisfy the burgeoning set of internal and external compliance and audit mandates. The good news is that there are ways to reduce the audit tax burden. This whitepaper outlines five methods organizations should consider to streamline their compliance efforts and thereby reduce their audit tax.

Click here to download it now »

HIPAA and Beyond: How to Effectively Safeguard Electronic Protected Health Information

HIPAA lacks the depth and breadth on which to build an information security program as it takes a myopic view of security and privacy with Protected Health Information (PHI) being the center of its universe. But there is much more to information security than PHI. Healthcare organizations must look beyond HIPAA and take a global view of their infrastructure because while HIPAA is a static regulation, healthcare organizations exist in a dynamic IT world with new threats coming about daily. When HIPAA first came out, vulnerability assessments, patching and configuration remediation were only typically performed quarterly at best. Now with zero-day threats, lack of a defined network perimeter and focus on information protection, the need for real-time patching and proactive endpoint and data protection is a basic requirement. Read this whitepaper to learn how to use HIPAA as the starting point for your security program, and then using best practices and Lumension solutions to improve your overall security posture.

Click here to download it now »

How to Effectively Protect Data in Transit and Assure Governance with NHS Directive

In December 2007, the office of David Nicholson CBE, the Chief Executive of the NHS in England, wrote to all Chief Executives of all Strategic Health Authorities, Special Health Authorities, NHS Trusts and Primary Care Trusts, restating the key responsibilities and accountabilities for securing effective information governance and to clarify required actions. Within the content of the letter (Gateway reference number 9185) are specific requirements for securing data in transit.

This document examines how Lumension’s Endpoint Security Suite, which includes Application and Device Control, assures NHS Trusts of governance with all of the stated requirements for securing data in transit and maps the solution’s capabilities to these specific requirements.

Click here to download it now »

Local UK Government Data Handling Guidelines

The Local Government Association and the Society of Information Technology Management (SOCITM) published their guidelines for local council information security and data handling to provide a local government response to the Information Commissioner’s “Data Handling Procedures in UK Government” published in June 2008. Read this paper to learn how Lumension solutions help local councils reduce risk and ensure compliance with these best practices. By enforcing application and removable device usage policies, local councils can ensure that only authorised personnel are able to connect removable storage devices or run authorised applications on government endpoints.

Click here to download it now »

Lumension Vulnerability Management Solution: Automating the Vulnerability Management Lifecycle

Any computer that is exposed to the internet, unsanctioned applications, or unprotected storage devices can be infected with viruses, Trojans, worms, keyloggers, spyware, rootkits, and other malware. By preying upon vulnerabilities in operating systems and applications – from ubiquitous internet browsers to email and office productivity suites – these infections can quickly lead to stolen data, disrupted operations, and threats to the privacy of customers and employees. In 2007 alone, well over 6,000 new vulnerabilities were reported, an average of 124 per week. Nearly 90% of those vulnerabilities could be exploited remotely. In addition, poorly installed or misconfigured devices can create vulnerabilities that allow data corruption, eavesdropping, and theft.

Because vulnerabilities can be found literally everywhere – from gateways and routers to DNS servers, web servers, desktops, and laptops – many IT departments run a “catch as catch can” defense. But using swarms of IT personnel to constantly hunt down vulnerabilities, figure out and then apply the appropriate patches, and hope for the best is a waste of resources. Automating the vulnerability management lifecycle – discovery, assessment, prioritization, remediation, and reporting – lets you keep your information resources safe from external threats around the clock, freeing IT personnel to work on business-focused projects.

This whitepaper will examine how Lumension Vulnerability Management Solution enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management:

  • Discovering assets
  • Assessing vulnerabilities and misconfigurations
  • Prioritizing risks
  • Mitigating non-patchable risks
  • Remediating vulnerabilities
  • Reporting and monitoring

Click here to download it now »

Minimizing Security-Related Total Cost of Ownership

Any security professional worth his or her salt understands that the job at hand isn’t just a matter of protecting the technology ecosystem, it is a question of doing so without racking up costs that will raise the CFO’s eyebrows. In today’s economy, though, the antes have been raised. Nowadays security gurus aren’t just expected to keep security-related problems at bay as cheaply as possible. They are also counted on to find ways to reduce the total cost of ownership (TCO) of all IT assets by minimizing risks, reducing network complexity and optimizing resources. This whitepaper examines how to minimize your security TCO through proactive solutions that are no longer a luxury, but a necessity to compete in today’s economic environment. By investing in the necessary Endpoint Protection, Data Protection, Vulnerability Management and Reporting and Compliance solutions, IT resources can be freed up to work on strategic initiatives that drive profit to the bottom line.

Click here to download it now »

Taking Control of Your Data: Protecting Business Information from Loss or Theft

Safeguarding your data is critical to running your business and protecting the privacy of employees and customers. The news is rife with reports of information lost or stolen from laptops left in cars, thumb drives dropped in airports, or CDs lost in the mail. Employee information, patient medical records, credit card numbers, corporate intellectual property – all can be lost or stolen in an instant, unless you have complete control over how data is stored, copied, and transported. Though malware and hackers take most of the blame for theft from networks and computers, critical information can just as easily be lost or stolen and misused while at rest on physical storage devices. In fact, 70% of all serious incidents are sparked by insiders. The ease and speed with which gigabytes of data can be copied to a thumb drive, for example, requires a security solution that controls not only what devices can be attached to a computer but also how much data can be copied at a time and whether it is encrypted.

This whitepaper will examine how Lumension Data Protection Solution enables organizations to control the movement of vital business data and ultimately ensure it is protected, and take an in-depth look at the four key phases of rolling out such a solution:

  • Catalog removable storage and media devices
  • Define endpoint policies
  • Roll out Lumension agents
  • Monitor devices and data flow

Click here to download it now »

The Best PCI Audit of Your Life: Are You Ready?

Two years of experience with PCI DSS (Payment Card Industry Data Security Standard) shows that companies are relying upon the same broken compliance strategy where too much money is spent, too little ROI is achieved, and even less effective security is gained. PCI compliance should not be treated as a single discrete effort. This myopic view of regulatory compliance creates the situation where organizations are constantly reinventing the wheel, wasting time and effort, and ultimately blowing security budgets. This whitepaper will detail a strategy that enables companies to painlessly become audit-ready, gain PCI compliance and ultimately ensure effective security. And it will discuss Lumension’s Security Suite, which maps technical controls to PCI standards and continuously monitors, assesses and reports the status of your environment, making your PCI audit the most efficient and actionable of your life.

Click here to download it now »

The Total Economic Impact of Lumension Application and Device Control

This study, from Forrester Research, illustrates the financial impact of moving from a difficult-to-enforce, ”voluntary” compliance solution to the IT-driven Lumension Endpoint Security solution that automatically enforces endpoint security policies. The TEI study should be seen as a guide to better understand and evaluate Lumension Endpoint Security.

Click here to download it now »

Whitelisting Technology Improves Security, Reliability and Performance Via Trusted Change

Traditional approaches to endpoint protection have become ineffective in today’s dynamic computing environments. Battling the onslaught of viruses, malware, and plain old poorly designed applications has become a reactive game with a losing proposition. To escape this mode of always falling one step behind emerging threats, you need a new endpoint security model.

An application whitelist provides the means to take charge of your information environment by making the shift from focusing only on what you know is bad to allowing only what you know to be good. This whitepaper will examine the many benefits of utilizing an application whitelisting solution such as Lumension Endpoint Protection, and take an in-depth look at the four key phases of rolling out such a solution:

  • Discovering and monitoring your application ecosystem
  • Rolling out pilots and clients
  • Enforcing protection
  • Fine-tuning your application ecosystem

Click here to download it now »

Why Free Patch Management Tools Could Cost You More

Today’s current economic situation underscores the importance of scrutinizing all business expenses, particularly within IT. Although point patching products may look more attractive on the surface, closer inspection often reveals hidden costs and missing capabilities. The result: fragmented patch management and weaker security posture while also being a more costly and cumbersome option for organizations to maintain.

Click here to download it now »

Why End-Users Are Your Weakest Security Link

This paper examines why end users pose the biggest security risk and outlines key strategies for C-level executives and security staff to effectively address their weakest security link: their end users. Learn the key steps to ensure that corporate policies are effectively enforced and read how Lumension customers have successfully implemented controls to manage the risk that is inherent with their employees’ use of technology.

Click here to download it now »

Lumension VMS vs Microsoft WSUS

Tolly engineers tested the Lumension Vulnerability Management solution and the free Microsoft® Windows Server Update Services 3.0 SP1 and designed a model to compare the long-term Total Cost of Ownership (TCO) for both products. Tolly’s testing found that the Lumension Vulnerability Management solution provides much lower TCO than Microsoft’s free Windows Server Update Services and provides a full range of services including patching Microsoft, non-Microsoft, and custom applications; built-in reporting, software removal, flexibility of management control, granular patch control, Common Vulnerabilities and Exposures (CVE)-based patching, discovering new/unauthorized client system, up-to-date asset assessment and network visibility.

Click here to download it now »

Six Critical Elements to Achieve Economies in FISMA Compliance

A FISMA compliance approach that relies on a manual and labor-intensive process can produce mountains of paper and elec¬tronic documents that no one can organize and make sense of. Such a compliance strategy results in overwhelming confusion where the assumption is that everything is in place because personnel are too busy to make sense of it all: that is, until things break down and all the fingers are pointed at the agency.

This Corporate Integrity whitepaper highlights the six critical elements agencies should keep in mind in order to reduce the burden of FISMA compliance, while achieving greater control and security. These recommended best practices are:

  • Agility
  • Consistency
  • Efficiency
  • Transparency
  • Accountability
  • Security

By implementing approaches and solutions to automate the monitoring of information systems for changes, vulnerabilities, and controls to validate that the agency is staying within its defined boundaries in the SSP, agencies and contractors can streamline reporting processes, improve overall security and reduce the overall burden of FISMA compliance.

Click here to download it now »

Three Tips on Preventing USB Insecurity In Your Organization

With great advantages come great responsibilities. The usefulness of USB devices has made them indispensible to most of us today. However, the ease with which data can be copied and the ubiquity of these devices has also exposed organizations to three serious risks: data loss, data theft and malware propagation. Learn how removable device policy enforcement can mitigate these risks while enabling the flexible and managed use of these necessary productivity tools.

Click here to download it now »

The Great Balancing Act: Using USB Flash Drives in Government Environments

USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. But left unchecked, the use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and/or citizens’ personally identifiable information (PII), and otherwise breach the public’s trust. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk.

Click here to download it now »

Best Practice Guide to Reducing Your Threat Exposure

With IT security increasingly pressured to rein in costs,organizations are assessing the damage laid waste by limited budgets and exponentially increasing external threats. The picture may seem scary at the moment, but by taking advantage of vulnerability and patch management best practices, your organization can go a long way toward reducing its threat exposure.

Click here to download it now »

Best Practice Guide to Minimizing Your Insider Risk

In today’s increasingly collaborative and always-accessible working environment, organizations are challenged to balance the need to put information at the fingertips of productive workers with the responsibility to preserve the privacy and integrity of sensitive data stores. Balancing productivity with security is a fine line, but by taking advantage of security best practices, your organization can go a long way toward minimizing insider risk and protecting data.

Click here to download it now »

Four Steps to Cure Your Patch Management Headache

The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. The heat is on to proactively safeguard your systems and endpoints from the newest exploits as the time it takes hackers to exploit a known vulnerability continues to shrink. Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.

Click here to download it now »

5 Best Practices to Reduce Web 2.0 Risks

With the rise of user-generated content, social networks and readily available information offered by the Web 2.0-enabled workplace, users are more connected to people and ideas than ever before. This new level of connectivity also introduces significant risk. Organizations need to find the proper balance of risk vs. productivity through improved policy, controls and education of users.

Click here to download it now »

Practical Steps to Ensure GCSX Code of Connection Compliance and Beyond

The GCSX Code of Connection is an important step along the journey to provide a secure infrastructure for public sector business. In isolation, GCSX Code of Connection compliance may be seen to deliver little extra value back to the organisation, so it is important that a successful implementation be used as a catalyst for an improvement in overall organisational compliance. This white paper discusses the importance of the GCSX Code of Connection and then addresses the larger issue of compliance management and how this can be effected using a structured approach.

Click here to download it now »

Don't Wave the White Flag Over Red Flags Rule

The Red Flags Rule, designed to mandate businesses that extend credit to customers to pay attention to the danger signs that could signal fraudulent activity as a result of identity theft, is enforceable as of December 31, 2010. Organizations that automate and harmonize compliance efforts across multiple regulations including the Red Flags Rule not only can enable a greater level of efficiency of controls, but also can bolster their overall IT risk management capabilities in the process. Learn the key capabilities organizations leverage to enable real-time visibility of compliance with the Red Flags Rule and other regulations.

Click here to download it now »

Six Critical Elements to Achieve Economies in NERC CIP Compliance

The interconnected computer systems and networks of electric, natural gas, and water distribution systems pose a significant risk to the nation’s critical infrastructure. This has put utilities under the microscope as they face increasing pressure for accountability regarding IT risk and compliance. The most taxing compliance demands on utilities stem from the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) requirements. And as of July 1, 2010 these utilities face the next step in being auditably compliant, meaning organizations must meet the full intent of each CIP requirement and prove compliance to an auditor. It is no longer sufficient to be substantially or even fully compliant internally. Utilities that cannot demonstrate compliance face fines of up to $1 million per day per CIP violation. To achieve auditable compliance requires the utility to undergo internal audits, spot checks, and the ability to provide documented evidence of compliance or non-compliance to the CIP standards. This paper highlights the critical elements utilities must keep in mind to achieve economies in NERC CIP compliance as well other mandates.

Click here to download it now »

Protecting Financial Enterprise Data from Two Faces Risk

Addressing targeted threats from outside and from within the typical financial organization

Whether it’s from treacherous insiders stealing data or malicious cybercriminals hacking into company resources, financial institutions face risk from both inside and outside the organization. While each side of the coin poses unique threats, the financial sector can minimize the double-sided risks with very similar tactics. Learn how to minimize these risks by resting on the security fundamentals of solid vulnerability management, device control, application control, and sound monitoring and reporting practices.

Click here to download it now »

Create Your Natural Advantage – Integrating Desktop Power Savings with Patch Management

Organizations stand to save themselves a significant amount of money by managing the power consumption of their IT systems. But if they aren't careful, they could potentially save their way right into a security and operational nightmare. When power management is not centralized nor built into your overall IT operational processes it can often impede system maintenance, patching and vulnerability scans. That's why organizations must carefully consider their tools, strategies and policies around power management if they're seeking to go green without compromising their operational efficiency or security posture.

Click here to download it now »

3 Strategies to Protect Endpoints from Risky Applications

Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment. That's because as the typical IT organization has worked on reducing the risk profile of PC and server operating systems, cyber criminals have started to look for greener pastures — namely among third-party applications.

Click here to download it now »

Six Critical Elements to PCI DSS Compliance and Beyond

Organizations that fully comply with PCI DSS are considered secure credit-card processors; however, compliance and security are not necessarily synonymous. An organization can be compliant and still experience a security breach, and can also be non-compliant and maintain a secure infrastructure. The question is: What good is compliance? Approached correctly, compliance can be a catalyst for implementing effective security measures. However, this requires an understanding of the principles behind the requirements, not just adherence to minimum requirements. Security is more than a list of checkboxes — it involves a holistic approach and processes to protect the organization. Compliance with standards such as with PCI DSS provides a foundation for achieving security, but by itself it does not adequately protect the organization.

Read this paper to learn the six critical elements to developing and implementing a security program that enables organizations to achieve compliance with PCI DSS and ensure the protection of critical information.

Click here to download it now »

5 Steps to Embrace the Consumerized Workforce

Finding Ways to Balance IT Risk and Productivity

While tools such as Web 2.0 applications, IM, P2P and portable USB media can be great for business innovation and productivity, they can introduce significant risks when not managed properly. Unfortunately, too many organizations fall into two extremes when it comes to reining in these risks. On one end, very security-conscious organizations have reacted by simply banning these technologies — a practice quickly falling out of favor among line-ofbusiness leaders. And on the other end of the spectrum, many more practical organizations have chosen to develop acceptable-use policies for these tools without any real enforcement. To truly realize the benefits while curtailing the risks, organizations must find a way to strike a happy balance that allows for the safe use of new technologies.

Click here to download it now »

The CISOs Guide to Measuring IT Security

Many organizations continue to blindly blaze into new technology territory without fully understanding the inherent IT risks. As a CISO, you must be able to facilitate business productivity without the risk. If you can accurately measure your security posture and communicate in terms of business risk as opposed to bits and bytes, you can effectively gain buy-in from key executives on important security initiatives.

Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.

Click here to download it now »

Intelligent Whitelisting – An Introduction to More Effective and Efficient Endpoint Security

The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.

Click here to download it now »

Unruly USB Devices Expose Networks to Malware

It's pretty easy for organizations to get so wrapped up about what goes out on USB drives that they forget to protect against what comes in their environments via USB. And with attacks inflicting increasingly greater damage following uncontrolled connection, it's time that organizations got serious about this threat. The key to USB security is balancing productivity with protection.

Click here to download it now »

Reducing Local Admin Exposure Through Application Whitelisting

In today’s Windows environment, end users are accustomed to having local administrator privileges which allow them to download a variety of applications and potentially misconfigure their PCs. While standard wisdom may be to simply solve the problem by revoking local administrator rights on users' systems, the reality is that this may not be an option at all organizations. Fortunately, there's hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base – through application whitelisting.

Click here to download it now »

Think Your Anti-Virus Software Is Working? Think Again

We’ve been so bombarded by computer viruses, worms, Trojan horses and other malware that we’ve become acclimated to their presence. We subscribe to an anti-virus (AV) offering and hope for the best. Trouble is, AV hasn’t been keeping up. Studies show that even though most organizations use AV, more and more are succumbing to attacks. It’s time to shift from the status quo to a new, more effective endpoint security approach, called intelligent whitelisting, which affords greater protection, productivity, and efficiency.

Click here to download it now »

Endpoint Management and Security Buyers Guide

In today's complex endpoint environment, security can no longer be just a collection of point products thrown at the issue "de-jour". In order to implement a solution that works for the needs of the business as well as security, it not only needs to protect systems, but it also has to be easy to manage, affordable to maintain and do it all without punching PCs in the gut, performance-wise. This Buyers Guide examines the five factors to look for in endpoint management and security solutions that will help reduce endpoint cost, simplify management and improve overall performance.

Click here to download it now »

Endpoint Security: Winning the Endgame

Sophisticated malware is increasingly targeting the endpoints that connect your environment to the rest of the world. This paper delves into the latest malware trends and paths into your network and highlights what you need to know about protecting your PCs, laptops and other endpoints in the new security arms race. Learn how to effectively secure endpoints with a defense-in-depth approach that includes patch management, anti-virus, application whitelisting and device control – and learn how this can all be managed more simply within an endpoint management and security platform.

Click here to download it now »

Lumension Patch Management: Picking the Low-Hanging Fruit

Why fixing third-party application vulnerabilities is at the core of sound information security—and how to make sure patch management is optimizing your security posture.

Click here to download it now »

Using Defense-in-Depth to Combat Endpoint Malware: A Technical Paper

The signature-based model of classic antivirus (AV) and the teams and infrastructure behind it are increasingly stretched to keep up with the pace and sophistication of today's financially motivated malware developers. This technical paper, written by Randy Franklin Smith, takes an in-depth look at Lumension® Intelligent Whitelisting™, which takes the concept of a static application whitelist and applies it to the real world of hundreds or thousands of unique, ever-changing PCs with a practical approach that does not involve the upfront burden of analysis and testing necessary with traditional whitelisting solutions. Learn how this innovative solution works and how it integrates several endpoint security layers together to provide and improved defense that doesn't impact productivity.

Click here to download it now »

5 Ways to Evolve Endpoint Management and Security for a New Threat Environment

Implement these key endpoint elements to bring up the level of security and bring down the cost of managing client systems.

Click here to download it now »

Information Security for Government Agencies: Checks, Balances and a More Secure Endpoint

Government agencies must protect sensitive data while improving transparency and accessibility—all in the face of rising cyberthreats. A defense-in-depth approach can optimize visibility and enforcement—without requiring additional budget and resources—to improve your overall IT security posture.

Click here to download it now »

Checking Unknown Apps at the Door: A Playbook for Reducing Admin Burden and Risk

The explosion of new applications available to users via the web has revolutionized business, but if not managed these apps can introduce significant IT risk and burden to an organization. Learn how to gain visibility of unknown apps and control when, what and how users are installing apps on their PCs.

Click here to download it now »

Effective and Efficient Security on a SMB Budget

It's clear that today's traditional defenses aren't working for small to medium-sized businesses (SMBs). This paper will discuss the different threats facing today's SMBs, talk about why the traditional defenses fail, discuss what does work, and confirm why intelligent application control (a.k.a. whitelisting) is the single best defense that any company can implement to significantly minimize security risk.

Click here to download it now »

The IT Pro's Guide to Simplified Endpoint Security

With proliferating laptops, smartphones and other endpoint devices; multiplying third-party apps and productivity tools, along with their associated vulnerabilities; and escalating threats from polymorphic viruses, botnets, SQL injections and other attacks, endpoint security has never been more challenging.

Click here to download it now »

The Busy IT Professional's Guide to Data Protection

Top 5 Tips For Securing Data In The Modern Organization

Ready your organization for more robust data protection measures by first implementing these five steps to improve data security in a business- and cost-effective manner.

Click here to download it now »

Reducing the Cost of HIPAA Security Compliance with Lumension Solutions

Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required controls for audit readiness to meet many aspects of the HIPAA Security Rule.

Click here to download it now »

E Is for Endpoint Six Security Strategies for Highly Effective IT Professionals

Strategy 1: Think Different

Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But today's endpoints demand even more. Endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enabling operational improvement. Read the first whitepaper in the series to learn the six steps you need to think different about endpoint security.

Click here to download it now »

Virtualization Security Risks: How to Develop Your Strategic Approach Now

Today, what virtualization software can accomplish is nearly limitless. But has your computer security methodology and software kept up? This whitepaper will take an in-depth look at virtualization security risks and mitigations.

Click here to download it now »

A Busy IT Professional's Guide to Endpoint Protection

Stay on top of endpoint security by implementing these five tips that will help you prevent costly malware outbreaks and data breaches, even as the barrage of attacks intensifies.

Click here to download it now »

The Busy IT Professional's Guide to Vulnerability Management

Don’t leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.

Click here to download it now »

The Busy IT Professional's Guide to Governance Risk and Compliance

Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.

Click here to download it now »

E is for Endpoint (Strategy 2 of 6): Back to Basics with Patch and Configuration Management

Patch and configuration management is Security 101—the most fundamental and cost-effective means of protecting your endpoints. But when it comes to configuring and patching endpoints, many organizations aren’t keeping up with changing realities. Here’s how to get back on track with patch and configuration management.

Click here to download it now »

Application Explosion - How to Manage Productivity and Security

This paper discusses the risks of uncontrolled applications, best practices for controlling those applications, and the array of choices available, exploring the attributes of Microsoft’s built-in tools, of free and open source software, and of third-party commercial application control systems. You'll learn how the difficulty of positively identifying applications complicates the application control process, and why application whitelists, rather than blacklists, are the only effective way to achieve control. You’ll also see how application control is enhanced when integrated within an overall endpoint control system.

Click here to download it now »

Beyond Compliance: Combating Threats with Endpoint Configuration Management

The evolution of threats and the accelerating arms-race between organizations and attackers has caused endpoint security to re-emerge as a critical security issue. Configuration management is the foundation of endpoint security. Read this whitepaper by Randy Franklin Smith of Monterey Technology Group to find out how to fill the gaps and provide a solid and comprehensive configuration management solution upon which to build the rest of the organization’s endpoint security approach.

Click here to download it now »

How Mature is Your Data Protection

Consumerisation has turned traditional notions of corporate IT upside down. The desire of employees to access organisational data from outside of that perimeter, often using their own devices and applications, has driven the increasing elasticity of the network perimeter. For many business organisations, priceless corporate data now resides as much outside of the corporate firewall as within its protective reach.

This paper features a detailed discussion of the survey findings from Computing UK and explains why and how organisations should be aiming for a best-in-class approach to data protection. We also present a Data Protection Maturity Model with a view to help organisations identify specific best practises that might benefit them the most.

Click here to download it now »

How to Check Unknown Apps at the Door

Antivirus and patch management are vital layers of defense. But their limitations leave your systems vulnerable. Intelligent whitelisting adds a level of flexible, dynamic application control to truly protect your endpoints.

Click here to download it now »

Closing the Antivirus Protection Gap

Corporate economic concerns have put increased pressure on already limited IT resources in recent years as the onslaught of malware and sophistication of cyber attacks continues to grow at exponential rates. As a result, 50% of endpoint operating costs are directly attributable to malware,1 yet, corporate IT budgets are still focused on maintaining stand alone antivirus as the keystone in endpoint security.

In this paper, we will benchmark the effectiveness of standalone AV and O/S resident patching solution versus newer technologies and a defense-in-depth of approach of layering multiple endpoint security and operational technologies together.

Click here to download it now »

Lumension Guide to Patch Management Best Practices

With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security patches across your complex IT infrastructure is key to mitigating risks and remediating vulnerabilities. Here are the Lumension-recommended steps to cure your patch management headache.

Click here to download it now »

Lumension Guide to Application Control Best Practices

As IT professionals know, endpoint security needs are evolving: new vulnerabilities are disclosed every day, new malware creation is exploding, and traditional AV signatures cannot keep up. You know that patch management and AV are necessary – but not sufficient – layers of endpoint defense. Intelligent application whitelisting is an important addition to your risk mitigation strategy, and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term. Read this whitepaper to understand the best practice workflow to application whitelisting, and can act as a guide when implementing Lumension® Endpoint Management and Security Suite: Application Control.

Click here to download it now »

Healthy Solutions for Protecting Patient Data

Guarding Healthcare Information with Device Control and Data Encryption

As the electronic medical records revolution continues to take hold across the healthcare industry, the risks of misplaced digitized health documentation are ever present. The expansion of HIPAA through the HITECH Act widens the scope of privacy and security protections available, but also increases potential legal liability for non-compliance.

Click here to download it now »

Lumension Guide to Device Control Best Practices

USB flash drives and other removable storage devices continue to proliferate throughout organizations. This could result in the loss or theft of your sensitive corporate and customer data, or in the propagation of malware like Stuxnet. Fortunately, powerful data protection tools are now available to help mitigate these risks, while still enabling flexible and managed use of these productivity devices. Learn about the best practices for deploying device control within your environment. Walk away with the recommended process to successfully prepare, enforce and manage the use of removable devices and media, and to protect your sensitive data.

Click here to download it now »

The Endpoint Security Management Buyers Guide

Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance oversight and evolving security attacks against vulnerable endpoint devices, getting a handle on managing endpoint becomes more important every day. Complicating matters is the fact that ‘endpoints’ now include all sorts of devices – including a variety of PCs, mobiles, and even kiosks and other fixed function devices. This report, developed by analyst firm Securosis, is focused on helping you understand what features and functions are important – in the four critical areas of patch management, configuration management, device control, and file integrity monitoring.

Click here to download it now »

Weaponized Malware - A Clear and Present Danger

Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks are now available to any cyber-criminal. How can security pros protect their organizations from these emerging perils?

Click here to download it now »

Proving Your Vulnerability Compliance - Patches, Configuration, Reports and More

Today’s organizations have a lot of computers to worry about, all of which run an operating system of some kind, and all of which run hundreds, if not thousands of applications and utilities. All of that software potentially contains millions of undiscovered security vulnerabilities – bugs, in other words – that will eventually be discovered and patched. All that software also includes millions of configuration settings, many of which are security-related and need to be properly managed in order to maintain organizational security goals. Read this whitepaper to learn how to get everything on one page, to make patch management and configuration auditing consistent and automated so you can stop wasting money and time.

Click here to download it now »

Closing the Vault on Cybercrime

Financial institutions have many tools at their disposal to fight cybercrime. However, as long as organizations don’t reevaluate their security approach and employ next-generation tools to protect themselves, they are sitting targets for a serious breach – which leads to fraud and considerable brand damage. It will be beneficial for financial institutions to update their security approach – not only to improve IT security but also to reduce administrative burden and operational costs.

Click here to download it now »

2013 Data Protection Maturity Survey Results

This research paper presents the survey findings and discusses the trends from this year's Data Protection Maturity survey. We also look at how organizations can develop a best-practices approach to data privacy, and look at some trends for the upcoming year.

Click here to download it now »

Third-Party Applications in the Enterprise

Management and Risk Mitigation of Third-Party Applications

Third-party applications, browsers and plugins have become the attack vector of choice for the modern cyber criminal. Computing surveyed over 200 UK business decision makers to understand how they perceived the risks that they faced from third-party applications. We set out to understand how they were managing and mitigating the challenges to employee productivity, compliance and information security.

This paper features a detailed discussion of the survey findings alongside analysis of how third-party applications have come to pose such a threat. The paper discusses why vulnerabilities for which remediation is available are so widespread and why business organisations are often slow to deploy up-to-date versions of popular third-party applications and security patches. The paper concludes with a discussion of why only a holistic approach to endpoint security management can empower organisations to realise the benefits of third-party applications whilst mitigating the risks that they can present.

Click here to download it now »

Preventing Weaponized Malware Payloads in Advanced Persistent Threats

Strategies for Layered Endpoint Defense Against the APT Kill Chain

Weaponized malware combined with advanced persistent threats pose a daunting security challenge for organizations. Here's how weaponized malware works - and how a defense-in-depth approach to endpoint security can give you the upper hand.

Click here to download it now »

Strategic Endpoint Security for C-Level Executives

It doesn’t matter how malicious hackers or their malware get into our environments. In order to be successful at their end goal, they must execute a payload on compromised endpoint computers. This paper discusses the various types of endpoint solutions, the challenges presented to the average C-level officer, and best practice strategic recommendations on how to keep your organization secure.

Click here to download it now »

SC Magazine Security Brief: Examining Third-Party Applications for APTs

Third-party applications can be a portal through which miscreants penetrate enterprise networks. What can be done to thwart these attacks? Stephen Lawton reports.

Click here to download it now »

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks

Many IT security professionals recognize that advanced persistent threats (APTs) pose a growing risk to their organizations. However, recent UBM Tech research discovered that only a few are taking the necessary steps to combat APTs and protect their organizations. In fact, many appear to have a misplaced sense of confidence in their ability to detect these attacks, even though few have developed strategies for dealing with them. This gap is particularly troubling since security experts say that it isn’t a question of whether an APT attack will occur, but when.

Click here to download it now »

Keeping Bot Herders Off Your Servers and Breaking the Lateral Kill Chain of Today

Conventional wisdom says that servers are much more isolated from the Internet. Also, servers are in the hands of security-conscious IT pros, who hopefully refrain from dangerous activities such as web browsing, file downloads, or opening email. Conventional wisdom also says that servers do not have potentially dangerous workstation applications such as Office, Adobe Reader or Flash installed. But conventional wisdom is frequently inaccurate. The rest of this section demonstrates why such reasoning is wrong in the case of servers and malicious or unwanted software.

Click here to download it now »

Improving Server Performance and Security

An Impact Comparison of Application Control and Traditional Anti-Virus Solutions

Server systems are generally more critical to an organization than individual endpoints. They provide services to hundred or even thousands of endpoints, and must therefore be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV scans, along with frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as they dive into the impact on server resources of the Lumension® Application Control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.

Click here to download it now »

Taking the Sting Out of Java Vulnerabilities

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform.

But what if there were a better way?

Click here to download it now »

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV

While traditional anti-virus (AV) solutions can provide protection for endpoints, constantly running AV processes with potentially frequent signature updates can consume resources that could otherwise be used to provide application services to users. Tolly evaluated the impact on client resources of Lumension AV solution and its alternative application control solution and compared it with traditional AV solutions from Symantex Corp, and McAfee, Inc. Understand how endpoint performance was affected and how effective they were against zero-day threats. Also, find out which solutions translate into significant savings to a business.

Click here to download it now »

Committed to Memory: Protecting Against Memory Based Attacks

Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.

Click here to download it now »

The 5 Key Tactics for Dealing with Advanced Persistent Threats

eSecurity Planet Executive Brief

Advanced Persistent Threat (APT) attacks exploit a single vulnerability and then use that foothold to penetrate more systems and gain access to more corporate information. A recent QuinStreet web seminar, sponsored by Lumension, discussed APT attacks and tactics for preventing them. This paper summarizes the talks given during that web seminar.

Click here to download it now »

Reflective Memory Injection: How it Works and How to Stop it

Reflective memory injection (RMI) is the most recent weapon in the arms race between attackers and defenders. Take a deep dive into how RMI works, what it looks like, and how your organization can stop these security incidents from occurring in your environment.

Click here to download it now »

SC Magazine Security Brief - Under the Radar

Most computer users think nothing of transferring files on to tiny memory devices. Security pros warn about the risks. Read this edition in our serious of reader surveys on various aspects of Advanced Persistent Threats focuses on removable media. Find out how respondents perceive the risks associated with removable media and how they are prioritizing these concerns.

Click here to download it now »

Redefining Defense-in-Depth

As the cyber threat landscape continues to intensify, a multi-layered, overlapping, proactive approach to security is vital. Read this report from eMedia to learn the about the decreasing effectiveness of traditional protection and how to apply today’s defense-in-depth approach to your endpoint security.

Click here to download it now »

The 2014 Endpoint Security Buyers Guide

Last year we offered our thoughts on buying Endpoint Security Management offerings — including patching, configuration, device control, and file integrity monitoring — which are increasingly bundled in suites to simplify management. In this updated and revised 2014 Endpoint Security Buyer’s Guide we update our research on the management functions described last year and add coverage of ant-imalware, mobility, and BYOD. All very timely and relevant topics. The goal of this guide remains to provide clear buying criteria for those of you looking at these solutions in the near future.

Click here to download it now »

Targeted Threat Defense Framework

Targeted threats (also known as Advanced Persistent Threats, or APTs) are one of the biggest threats to any company. These sophisticated, malicious hackers use focused resources to gain access to a company’s valuable assets, or to disrupt business. It used to be that only large, Fortune 500-sized businesses had to be worried about targeted threats. But today, the same risks apply to small- and medium- sized companies alike. The risk is further multiplied for companies with important partners, business associates, and valuable intellectual property.

This paper from Roger Grimes will discuss the characteristics of target threats and give prescriptive guidance and a framework for protecting your company.

Click here to download it now »

SC Magazine Market Focus - APT Server Watch

Based on a series of APT-related surveys, this analysis exams how attackers exploit server vulnerabilities and what can be done to stop them.

Click here to download it now »

Windows XP End of Support - Danger and Opportunity

Support for Windows XP and Office 2003 has officially come to an end. For organizations still running these programs, this means unprecedented security risk. There are a few options for addressing the issue, from ignoring the problem to ripping out Windows XP and replacing it as soon as possible. While WinXP’s end of support presents a significant challenge, it also represents a tremendous opportunity. Read this whitepaper to understand what opportunities can lie ahead to improve your security posture across the enterprise going forward.

Click here to download it now »

2014 State of The Endpoint Risk

Just when many IT security practitioners were hoping to get their endpoint security risks under control, the exploding growth of mobility platforms and public cloud resources has turned these dreams into a security nightmare.

We surveyed 676 IT and IT security practitioners with involvement in endpoint security. Most of the participants in the study are involved in IT security, management and operations in their organizations.

According to these knowledgeable respondents, endpoint security risk is more difficult to manage than ever. The reason is the growing number of employees and other insiders using multiple mobile devices in the workplace followed by the increase in personal devices connected to the network and the growing popularity of public cloud services such as Dropbox.

Sponsored by Lumension Corporation, we are pleased to present the findings of the 2014 State of Endpoint Risk. The study focuses on how organizations are addressing the IT endpoint risk and where the greatest vulnerabilities exist. In this report we will compare the findings to the study conducted in 2012.

Click here to download it now »

Endpoint Security - Past Present and Future

Ponemon Institute's fifth-annual study of endpoint risk reveals how endpoint security has evolved - and how organizations can best protect themselves going forward.

Click here to download it now »

Lumension 2014 Data Protection Maturity Report

Lumension’s third-annual survey on data protection maturity uncovers important security trends—and points to best practices for safeguarding mission-critical information.

Click here to download it now »

Targeted Threat Protection for POS Systems

Targeted attacks on retail Point of Sale (POS) networks have entered the scene in a big way recently, ushering in what could be the most damaging cyber-crime opportunities to-date. Balancing business productivity and effective endpoint security has always been a challenge but the remote, Internet-connected POS terminals common place in today’s retail environment provide an even bigger dilemma for the IT teams tasked with securing them.

Click here to download it now »

Lumension Securing the Virtual Endpoint

Desktop virtualization combined with Bring Your Own Device (BYOD) computing is helping today's 24/7 enterprises contain their IT costs and provide workers with unprecedented mobility. But offering employees anywhere, anytime access to applications and data comes at a cost: the risk that valuable data could be lost or stolen or IT environments exposed to viruses and malware.

Click here to download it now »


This documentation describes the implementation of Lumension® Device Control in a Citrix XenApp environment to control access to devices from unmanaged endpoints.

Click here to download it now »

SC Magazine Market Focus: Malware - The Omnipresent Risk

In the last 30 years, malware has evolved and continues to unleash destructive and sophisticated targeted attacks on organizations of all sizes. But despite malware’s popularity and ubiquity, many organizations are not prepared to cope with these hard to detect threats. This new survey of SC Magazine readers, commissioned by Lumension, offers in-depth analysis that examines the scourge of malware along with mitigation strategies and best practices to combat targeted attacks.

Click here to download it now »

2014 BYOD & Mobile Security Report

Organizations are somewhat better prepared for BYOD than a year ago according to the LinkedIn group, Information Security Community that is 214,985 members strong. Download the second annual BYOD and Mobile Security Report to learn how your peers view BYOD and mobile security, and what steps they're taking to protect their organizations from the risks including what they are doing to combat mobile device risk and what solutions and security practices really work. Here are just a few highlights discussed in the report:

  • The key drivers for BYOD are about keeping employees mobile (57 percent), satisfied (56 percent) and productive (54 percent).
  • The biggest BYOD security concerns are loss of company or client data (67percent) and unauthorized access to company data and systems (57 percent).
  • Additional IT resources to manage security incidents (30 percent) are by far the biggest negative impact of mobile security threats.

Click here to download it now »

Mobile Device Management: More Security, Less Headache

Mobile devices are proliferating in the enterprise. In fact, there are now more mobile devices than there are people on earth. Here's how to securely empower your mobile employees—without inflating your IT management burden.

Click here to download it now »

The 2015 Endpoint and Mobile Security Buyer's Guide

Protecting endpoints continues to grow in complexity. Patching, configuration, device control and mobile…all of these and more should be considered for a strong security posture. Authored by Securosis, the 2015 Endpoint Management Buyer's Guide provides clear, up-to-date buying criteria for those looking at procuring endpoint solutions in the near future. Included in their new guide is a look at the ongoing challenge of securing endpoints, recommended how-tos on protecting endpoints, reducing attack surface and managing mobile security as well as important buying considerations and a procurement process.

Click here to download it now »

SCCM Practical Patch Compliance

Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.

Click here to download it now »

Click here to download it now »


Whitepaper Archive

Please visit our Whitepaper Archive to view previous whitepapers.