what is next-generation endpoint security and why do you need it?

21
#RSAC Session ID: TECH-R05 Next-Generation Endpoint Security Overview Jon Oltsik Senior Principal Analyst ESG

Upload: priyanka-aash

Post on 16-Apr-2017

674 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Session ID: TECH-R05

Next-Generation Endpoint Security Overview

Jon OltsikSenior Principal AnalystESG

Page 2: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Agenda

2

Endpoint Security Defined

What about antivirus?

The next-generation endpoint security triggers

Next-generation endpoint security market dichotomy

Prevention vs. Detection/Response crowd

Recommendations and lessons learned

Page 3: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

What Is An Endpoint?

3

Primary:Windows PCs

Secondary

Page 4: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Anti-malware

Endpoint security controls

Data security

Application security

IAM

Acceptable use policies

Configuration

management

System monitoring

What is Endpoint Security?

“The policies, processesand technology controls

used to protect theconfidentiality, integrity,

and availability of an endpoint system”

Page 5: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Anti-malware

Endpoint security controls

Data security

Application security

IAM

Acceptable use policies

Configuration

management

System monitoring

What is Endpoint Security?

“The policies, processesand technology controls

used to protect theconfidentiality, integrity,

and availability of an endpoint system”

Page 6: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

What About AV?

6

$5 billion to $7 billion WW market

95%+ penetration rate

Historically dominated by 5 vendors

History of usurping functionality

Application controls, anti-spyware/adware, full-disk encryption

Page 7: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Antivirus Myth and Reality

7

AV is NOT a commodity product (nor is it “dead”)

AV management is often delegated to IT operations groups

AV is not always well maintained

Advanced features:

Not well known or always used

Can have a substantial impact on system performance

Mixed results in terms of efficacy

Page 8: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Endpoint Security Market

8

Page 9: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

NG Endpoint Security Triggers

9

Network compromise, cyber-attack, or data breach

Time and resources necessary for system reimaging

Cybersecurity quantum leap

Cybersecurity cavalry to the rescue!

Needs and resource assessment

Page 10: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Endpoint Security Continuum

10

Advanced malwareprevention

Advanced detectionand response (EDR)

Advanced endpointcontrols

Page 11: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

11

“Hair-on-fire” problem

Resource constraints

Staff size, skills, time

Endpoint malware prevention may be one of several cybersecurity initiatives

Endpoint Security Advanced Prevention

Page 12: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Endpoint Security Advanced Prevention

12

Problematic shortage of IT security skills

46%

28%

25%

23%

24%

2016

2015

2014

2013

2012

Page 13: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Advanced Prevention Products

13

New types of algorithms

Process isolation or sandboxing

Behavioral heuristics

Tight integration with threat intelligence

Page 14: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Procurement and Deployment

14

Extensive background

researchRFI/RFP

Product testing

POC Pilot projectEnterprise

deployment

Page 15: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Observations

15

Early stage products have obvious flaws

Extensive customer input into product roadmaps

Scale and manageability are high priority requirements

AV replacement is often part of strategy

Enhancements may be required

Windows firewall, application controls, etc.

Page 16: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

16

Progressive skills and resources

Strong relationships with existing AV vendor

Not hung up on endpoint agents

Broad approach to anti-malware based upon data analytics

Network sandbox, threat intelligence, open source tools, custom rules, etc.

Focus on IR automation and orchestration

Advanced Detection and Response

Page 17: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Advanced Detection and Response Products

17

Data collection- and analytics-centric

Windows logs, system activities, forensic capture, etc.

Various requirements for endpoint data collection

Polling, trigger-based, local collection, central collection, etc.

Trend toward real-time continuous collection and visibility

Product GUI and analytics may or may not be important

Page 18: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Procurement and Deployment

18

Basic background

research

Exploration of open source and

commercial offerings

Simple and concise RFI/RFPs

POC including product and

process integration

Pilot project to test scale and

data management

Enterprise deployment

Page 19: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Observations

19

Very demanding user base

Best-of-breed mentality

Customers will likely

Demand product customization and enhancements from vendors from the start

Want to use products to create (and even distribute) custom remediation rule sets

“Big brother” issues

Page 20: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Further Analysis

20

Continuum will continue

Rip-and-replace mindset

Possible extensions for data security and insider threat

Cloud-based control plane?

Endpoint security and patching

Page 21: What Is Next-Generation Endpoint Security and Why Do You Need It?

#RSAC

Action Items

21

Assessment

Existing AV, malware, malicious network traffic, skill sets…

Requirements definition

Comprehensive security requirements

IT and business requirements

Technical requirements

Research and evaluation

Cast a wide net but maintain a focused search

Plan for the long-term