Government Drivers and Challenges

While many government bodies have established endpoint security policies, they do not have the right security management software to enforce them. Users continue to run software that is either unauthorized or is without the latest patches, opening the doors to cyber criminals and cyber terrorists. Users can also remove data from government networks via removable devices or media and if the data is not encrypted, sensitive information can be exposed.

With the productivity advantages of removable devices such as USB sticks come significant data protection challenges as government organizations have lost personal information at alarming rates. In fact, former UK Prime Minister Brown stated, “I can’t make any promises about keeping your personal details safe.”

Not having the latest patches and not enforcing encryption of information to removable media can expose government systems to unnecessary risk and compromise the integrity and confidentiality of critical information. In many jurisdictions around the world this had led to regulations and standards-based protocols around security controls and data protection.

International Government Solutions

Lumension’s Security Management Solutions Secure Critical Information at the Endpoint
Lumension protects against insider threats and cyber criminals targeting government organizations by providing comprehensive vulnerability management, endpoint security, compliance and IT risk management and data protection solutions enabling you to:

Challenge Lumension Solution
Identify and assess key international compliance standards and regulations such as ISO 27002, Basel II, etc. for global organizations. Lumension® Compliance and IT Risk Management helps organizations achieve lower costs of compliance by automating IT audit workflows, harmonizing controls with policy requirements, and providing greater reports and visibility across IT assets for optimal security and compliance management.
Safeguard the confidentiality, integrity and availability of sensitive data and ensure secure configurations. Lumension® Vulnerability Management identifies non-compliant security configurations through comprehensive network and agent-based scanning capabilities, removes the risk of sensitive data from being improperly disclosed and minimizes the vulnerability window of exposure through rapid remediation.
Lumension® Data Protection controls and monitors the flow of inbound and outbound data via removable devices / media and protects data using FIPS 140-2 Level 2 validated encryption.
Lumension® Endpoint Protection identifies your organizational security holes in the protection of information through comprehensive auditing of user behavior and endpoint configurations.
Prevent malware execution originating at an endpoint. Lumension® Endpoint Protection prevents the execution of malware and zero-day threats through the use of application whitelisting.
Improve IT system performance. Lumension® Vulnerability Management, Lumension® Endpoint Protection, and Lumension® Data Protection all provide key capabilities that improve IT system performance: through standardizing endpoint configurations, patching vulnerabilities and by whitelisting applications and removable devices to ensure that only those authorized can execute on your network.
Reduce endpoint security TCO. Lumension® Vulnerability Management
minimizes security or compliance crisis response and
remediates vulnerabilities quickly with fewer required resources.
Improve end user productivity. Lumension® Endpoint Protection blocks unwanted, non-government approved desktop applications and enforces policies to ensure endpoints run as expected.
Enforce software license compliance within the organization. Lumension® Endpoint Protection ensures only authorized software applications are running on government endpoints.