SlideShare a Scribd company logo
MATURING
ENDPOINT
SECURITY
5 KEY CONSIDERATIONS
www.forsythe.com
Forsythe is a leading enterprise IT company,
providing advisory services, security, hosting
and technology solutions for Fortune 1000
organizations. Forsythe helps clients optimize,
modernize and innovate their IT to become
agile, secure, digital businesses.
Sponsored by
Maturing Endpoint Security: 5 Key Considerations
Ask yourself:
a) Very confident
b) Somewhat confident
c) Not at all confident
HOW CONFIDENT ARE YOU IN
YOUR ORGANIZATION’S ABILITY
TO DETECT AND RESPOND TO
MODERN THREATS?
THE AGGRESSIVENESS
AND SOPHISTICATION
OF CYBER ATTACKS
HAS INCREASED;
DEFENSIVE
CAPABILITIES ARE
NOT KEEPING UP
Sources: Gemalto 2016 Breach Level Index, FireEye 2017 M-Trends Report
1.4 billion data records were
compromised during 2016, an
increase of 86 percent over 2015
Global median time from
compromise to discovery
in 2016 was 99 days
Source: Verizon 2016 Data Breach Investigations Report
USERS AND USER
DEVICES REPRESENT
THE LARGEST AND
FASTEST-GROWING
TARGET GROUP
Server
User Device
Person
Media
Kiosk/Terminal
Network2009 2010 2011 2012 2013 2014 2015
0%
10%
20%
30%
40%
50%
Percent of breaches per asset
category over time
NO MATTER WHAT TECHNOLOGY WE
PUT IN PLACE, NO MATTER HOW MUCH
MONEY WE SPEND ON PROTECTIONS FOR
THE ORGANIZATION, WE STILL HAVE
PEOPLE, AND PEOPLE ARE FALLIBLE.
— Theodore Kobus, Baker & Hostetler, Privacy and Data Protection
ENDPOINT
SECURITY IS
THE FRONT LINE
IN THE FIGHT
AGAINST CYBER
ATTACKS
Ask yourself:
a) Less than 5
b) More than 5
c) Not sure
HOW MANY ENDPOINT
SECURITY AGENTS IS YOUR
TEAM CURRENTLY MONITORING?
Source: Forrester Mastering the Endpoint, March 2017
On average, organizations are monitoring
10 different security agents…
…and swiveling between at least 5 different
interfaces to investigate and remediate incidents
Forrester Business Technographics Security Survey, Q3 2016
MANY ORGANIZATIONS
STILL RELY HEAVILY
ON SIGNATURE-BASED
SOLUTIONS
55% 53%
63%
80%
THE BOTTOM LINE:
ORGANIZATIONS
NEED TO ENHANCE
PREVENTION METHODS
ON THE ENDPOINT AND
ADD THE ABILITY TO
DETECT AND RESPOND
TO EMERGING THREATS
BY 2020, 80% OF LARGE ENTERPRISES,
25% OF MIDSIZE ORGANIZATIONS AND
10% OF SMALL ORGANIZATIONS WILL
HAVE INVESTED IN EDR CAPABILITIES.
— Gartner Market Guide for Endpoint Detection and Response Solutions, 30 November, 2016
ENDPOINT SECURITY USE CASES
Facilitate the prevention of attacks by stopping endpoints from executing malicious files and
processes, and/or connecting to malicious domains and URLs. Some tools can also remove
malicious files, and isolate infected endpoints from the network.
Search for and identify advanced attacks or malware processes in real-time through proactive hunting
for malicious activity. This can include activity scoring, and both rule-based and threat-intelligence-
based detection. This use case is typically for organizations with mature security programs.
Continuous monitoring of endpoints to understand what executables are running, what activities
users and/or endpoints are engaging in or have engaged in, the current state of endpoints, etc.
Analysts can use recorded information to establish trends and patterns of activities to learn what’s
normal, and what’s not.
Provide a platform to document, analyze, contain, disrupt and/or remediate incidents. Provide
history of activity, connections and actions. Conduct historical searches, and scan systems for
known artifacts derived from threat intelligence and past investigations.
Prevent or alert on unauthorized changes to endpoint configurations/installations. Maintain standard
or “Gold” images in order to prevent the need to reimage. Enhance patch management by preventing
vulnerabilities from being exploited before organizations have a chance to deploy patches.
Incident
Investigation/
Response
Management
Prevention
Threat Hunting/
Detection
Monitoring/
Visibility
FINDING THE
RIGHT FIT
There are numerous EDR
solutions to choose from, as
well as next-generation
endpoint security solutions
from EPP providers that
incorporate EDR capabilities.
5 KEYS TO MATURING YOUR
ENDPOINT STRATEGY
Organizations need to evaluate their
current capabilities before they can
advance their programs
ONE
GAUGE YOUR
MATURITY
Initial
Processes
unorganized; not
repeatable or scalable
Repeatable
Basic program and
policies established;
success can
be repeated
Defined
Program and
policies formalized
and updated in
last 24 months
Managed
Program formalized,
up to date and
functioning; CISO
in place
Optimized
Model security
program around all
endpoints; designed
to anticipate change
ENDPOINT SECURITY
MATURITY MODEL
Ask yourself:
a) Initial or Repeatable
b) Defined or Managed
c) Optimized
d) Unsure
BASED ON THIS MODEL, WHAT
WOULD YOU GUESS YOUR
ORGANIZATION’S MATURITY TO BE?
No single solution can keep up
with today’s sophisticated,
emerging threats
TWO
ENSURE
COMPREHENSIVE
PROTECTION
COMPREHENSIVE CONTROLS
Anti-virus
Advanced
prevention
tools
Advanced
detection and
response tools
Additional endpoint security controls
• Application controls
• Network access controls
• Management controls
• Port controls
• DLP
• ERM
NEXT-GENERATION ENDPOINT SECURITY
MACHINE
LEARNING?
Machine learning is one of
the year’s hottest technology
trends; within the endpoint
security space, many
companies legitimately
claim to do some machine
learning, though it’s often
not clear what that means,
how it works, or even
why it is important.
It is impossible to manually manage all of
the endpoints on your network; while it’s
important to have defense-in-depth, it is
equally important to consolidate agents
and processes wherever possible
THREE
CENTRALIZE
MANAGEMENT
Too much IT security spending
has focused on the prevention
of data breaches, and not
enough has gone towards
preparing for the inevitable
FOUR
STREAMLINE
INCIDENT
RESPONSE
Humans are the weakest link in any
security strategy; defending against
human behavior involves a combination
of endpoint security solutions and
increased awareness
FIVE
BOLSTER
SECURITY
AWARENESS
http://focus.forsythe.com/articles/574/Maturing-
Endpoint-Security-5-Key-Considerations
CHECK OUT THE
ORIGINAL ARTICLE:
http://focus.forsythe.com
OR FIND MORE ARTICLES ABOUT
BUSINESS AND TECHNOLOGY
SOLUTIONS AT FOCUS ONLINE:
Authors:
Jose Ferreira
Security Strategist,
Forsythe Security Solutions
Josh Thurston
Security Strategist,
Office of the CTO, McAfee www.forsythe.com
Forsythe is a leading enterprise IT company,
providing advisory services, security, hosting
and technology solutions for Fortune 1000
organizations. Forsythe helps clients optimize,
modernize and innovate their IT to become
agile, secure, digital businesses.
Maturing Endpoint Security: 5 Key Considerations

More Related Content

PDF
What Is Next-Generation Endpoint Security and Why Do You Need It?
PDF
IDC Security 2014, Endpoint Security in Depth
PPTX
What is Next-Generation Antivirus?
PPTX
Malware evolution and Endpoint Detection and Response
PPTX
NextGen Endpoint Security for Dummies
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PDF
Cloud Breach – Preparation and Response
PDF
Evidence-Based Security: The New Top Five Controls
What Is Next-Generation Endpoint Security and Why Do You Need It?
IDC Security 2014, Endpoint Security in Depth
What is Next-Generation Antivirus?
Malware evolution and Endpoint Detection and Response
NextGen Endpoint Security for Dummies
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Cloud Breach – Preparation and Response
Evidence-Based Security: The New Top Five Controls

What's hot (20)

PDF
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
PDF
The Critical Security Controls and the StealthWatch System
PDF
Carbon Black Corporate Overview 2016
PDF
Building a World-Class Proactive Integrated Security and Network Ops Center
PDF
How To Avoid The Top Ten Software Security Flaws
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
Implementing An Automated Incident Response Architecture
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PPTX
Security operation center (SOC)
PPTX
IT Cyber Security Operations
PPTX
7 Steps to Build a SOC with Limited Resources
PPTX
Endpoint Modeling 101 - A New Approach to Endpoint Security
PPTX
RSA 2016 Security Analytics Presentation
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
From IT to IoT: Bridging the Growing Cybersecurity Divide
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Achieving Defendable Architectures Via Threat Driven Methodologies
PDF
DTS Solution - Building a SOC (Security Operations Center)
PPTX
Five SIEM Futures (2012)
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
The Critical Security Controls and the StealthWatch System
Carbon Black Corporate Overview 2016
Building a World-Class Proactive Integrated Security and Network Ops Center
How To Avoid The Top Ten Software Security Flaws
Building a Next-Generation Security Operations Center (SOC)
Implementing An Automated Incident Response Architecture
Wfh security risks - Ed Adams, President, Security Innovation
Security operation center (SOC)
IT Cyber Security Operations
7 Steps to Build a SOC with Limited Resources
Endpoint Modeling 101 - A New Approach to Endpoint Security
RSA 2016 Security Analytics Presentation
Security Operations Center (SOC) Essentials for the SME
From IT to IoT: Bridging the Growing Cybersecurity Divide
Effective Security Operation Center - present by Reza Adineh
Achieving Defendable Architectures Via Threat Driven Methodologies
DTS Solution - Building a SOC (Security Operations Center)
Five SIEM Futures (2012)
Ad

Similar to Maturing Endpoint Security: 5 Key Considerations (20)

PDF
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
PDF
Carbon Black: Justifying the Value of Endpoint Security
PPTX
Protecting endpoints from targeted attacks
PDF
Carbon Black: 32 Security Experts on Changing Endpoint Security
PPTX
Select and Implement a Next Generation Endpoint Protection Solution
PDF
REAL TIME ENDPOINT INSIGHTS
PDF
Endpoint Protection Best Practices - Eflot
PDF
CounterTack: 10 Experts on Active Threat Management
PDF
What is Endpoint Security presentation download
PDF
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
PDF
The Endpoint Security Paradox
PPT
Top Tactics For Endpoint Security
PPTX
Endpoint Security Pres.pptx
PDF
Why Endpoint Security is Important for Your Business .
PDF
You Can't Stop The Breach Without Prevention And Detection
PPTX
Understanding Endpoint Security in a SOC
PPTX
Endpoint Security of database, data file, and information
PDF
Why Endpoint Security is Important for Your Business.
PPTX
It's Time to Rethink Your Endpoint Strategy
PPT
Info Sec2007 End Point Final
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
Carbon Black: Justifying the Value of Endpoint Security
Protecting endpoints from targeted attacks
Carbon Black: 32 Security Experts on Changing Endpoint Security
Select and Implement a Next Generation Endpoint Protection Solution
REAL TIME ENDPOINT INSIGHTS
Endpoint Protection Best Practices - Eflot
CounterTack: 10 Experts on Active Threat Management
What is Endpoint Security presentation download
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
The Endpoint Security Paradox
Top Tactics For Endpoint Security
Endpoint Security Pres.pptx
Why Endpoint Security is Important for Your Business .
You Can't Stop The Breach Without Prevention And Detection
Understanding Endpoint Security in a SOC
Endpoint Security of database, data file, and information
Why Endpoint Security is Important for Your Business.
It's Time to Rethink Your Endpoint Strategy
Info Sec2007 End Point Final
Ad

More from Sirius (20)

PDF
Healthcare Cybersecurity Survey 2018 - Sirius
PPTX
6 Guidelines on Crafting a Charter for your Business Transformation
PPTX
Exhaust into Fuel: Turning Data into a Strategic Business Asset
PPTX
3 Keys to Web Application Security
PPTX
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
PPTX
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Keep Calm and Comply: 3 Keys to GDPR Success
PPTX
Beyond backup to intelligent data management
PPTX
Making the Jump to Hyperconvergence: Don't Get Left Behind
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PPTX
6 Ways to Deceive Cyber Attackers
PPTX
Your Cloud Strategy: Evolution or Revolution
PPTX
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
PPTX
7 Essential Services Every Data Center Solutions Provider Should Have
PPTX
10 Keys to Data-Centric Security
PPTX
5 Keys to Addressing Insider Threats
PPTX
6 Steps for Operationalizing Threat Intelligence
PPTX
5 Ways to Close Your Information Technology Skills Gap
Healthcare Cybersecurity Survey 2018 - Sirius
6 Guidelines on Crafting a Charter for your Business Transformation
Exhaust into Fuel: Turning Data into a Strategic Business Asset
3 Keys to Web Application Security
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
Optimizing Security Operations: 5 Keys to Success
Keep Calm and Comply: 3 Keys to GDPR Success
Beyond backup to intelligent data management
Making the Jump to Hyperconvergence: Don't Get Left Behind
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
6 Ways to Deceive Cyber Attackers
Your Cloud Strategy: Evolution or Revolution
Open Source, Open Mindset: 4 Keys to Continuous Cloud Transformation
7 Essential Services Every Data Center Solutions Provider Should Have
10 Keys to Data-Centric Security
5 Keys to Addressing Insider Threats
6 Steps for Operationalizing Threat Intelligence
5 Ways to Close Your Information Technology Skills Gap

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
CIFDAQ's Market Insight: SEC Turns Pro Crypto
NewMind AI Monthly Chronicles - July 2025
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Maturing Endpoint Security: 5 Key Considerations

  • 2. www.forsythe.com Forsythe is a leading enterprise IT company, providing advisory services, security, hosting and technology solutions for Fortune 1000 organizations. Forsythe helps clients optimize, modernize and innovate their IT to become agile, secure, digital businesses. Sponsored by
  • 4. Ask yourself: a) Very confident b) Somewhat confident c) Not at all confident HOW CONFIDENT ARE YOU IN YOUR ORGANIZATION’S ABILITY TO DETECT AND RESPOND TO MODERN THREATS?
  • 5. THE AGGRESSIVENESS AND SOPHISTICATION OF CYBER ATTACKS HAS INCREASED; DEFENSIVE CAPABILITIES ARE NOT KEEPING UP Sources: Gemalto 2016 Breach Level Index, FireEye 2017 M-Trends Report 1.4 billion data records were compromised during 2016, an increase of 86 percent over 2015 Global median time from compromise to discovery in 2016 was 99 days
  • 6. Source: Verizon 2016 Data Breach Investigations Report USERS AND USER DEVICES REPRESENT THE LARGEST AND FASTEST-GROWING TARGET GROUP Server User Device Person Media Kiosk/Terminal Network2009 2010 2011 2012 2013 2014 2015 0% 10% 20% 30% 40% 50% Percent of breaches per asset category over time
  • 7. NO MATTER WHAT TECHNOLOGY WE PUT IN PLACE, NO MATTER HOW MUCH MONEY WE SPEND ON PROTECTIONS FOR THE ORGANIZATION, WE STILL HAVE PEOPLE, AND PEOPLE ARE FALLIBLE. — Theodore Kobus, Baker & Hostetler, Privacy and Data Protection
  • 8. ENDPOINT SECURITY IS THE FRONT LINE IN THE FIGHT AGAINST CYBER ATTACKS
  • 9. Ask yourself: a) Less than 5 b) More than 5 c) Not sure HOW MANY ENDPOINT SECURITY AGENTS IS YOUR TEAM CURRENTLY MONITORING?
  • 10. Source: Forrester Mastering the Endpoint, March 2017 On average, organizations are monitoring 10 different security agents… …and swiveling between at least 5 different interfaces to investigate and remediate incidents
  • 11. Forrester Business Technographics Security Survey, Q3 2016 MANY ORGANIZATIONS STILL RELY HEAVILY ON SIGNATURE-BASED SOLUTIONS 55% 53% 63% 80%
  • 12. THE BOTTOM LINE: ORGANIZATIONS NEED TO ENHANCE PREVENTION METHODS ON THE ENDPOINT AND ADD THE ABILITY TO DETECT AND RESPOND TO EMERGING THREATS
  • 13. BY 2020, 80% OF LARGE ENTERPRISES, 25% OF MIDSIZE ORGANIZATIONS AND 10% OF SMALL ORGANIZATIONS WILL HAVE INVESTED IN EDR CAPABILITIES. — Gartner Market Guide for Endpoint Detection and Response Solutions, 30 November, 2016
  • 14. ENDPOINT SECURITY USE CASES Facilitate the prevention of attacks by stopping endpoints from executing malicious files and processes, and/or connecting to malicious domains and URLs. Some tools can also remove malicious files, and isolate infected endpoints from the network. Search for and identify advanced attacks or malware processes in real-time through proactive hunting for malicious activity. This can include activity scoring, and both rule-based and threat-intelligence- based detection. This use case is typically for organizations with mature security programs. Continuous monitoring of endpoints to understand what executables are running, what activities users and/or endpoints are engaging in or have engaged in, the current state of endpoints, etc. Analysts can use recorded information to establish trends and patterns of activities to learn what’s normal, and what’s not. Provide a platform to document, analyze, contain, disrupt and/or remediate incidents. Provide history of activity, connections and actions. Conduct historical searches, and scan systems for known artifacts derived from threat intelligence and past investigations. Prevent or alert on unauthorized changes to endpoint configurations/installations. Maintain standard or “Gold” images in order to prevent the need to reimage. Enhance patch management by preventing vulnerabilities from being exploited before organizations have a chance to deploy patches. Incident Investigation/ Response Management Prevention Threat Hunting/ Detection Monitoring/ Visibility
  • 15. FINDING THE RIGHT FIT There are numerous EDR solutions to choose from, as well as next-generation endpoint security solutions from EPP providers that incorporate EDR capabilities.
  • 16. 5 KEYS TO MATURING YOUR ENDPOINT STRATEGY
  • 17. Organizations need to evaluate their current capabilities before they can advance their programs ONE GAUGE YOUR MATURITY
  • 18. Initial Processes unorganized; not repeatable or scalable Repeatable Basic program and policies established; success can be repeated Defined Program and policies formalized and updated in last 24 months Managed Program formalized, up to date and functioning; CISO in place Optimized Model security program around all endpoints; designed to anticipate change ENDPOINT SECURITY MATURITY MODEL
  • 19. Ask yourself: a) Initial or Repeatable b) Defined or Managed c) Optimized d) Unsure BASED ON THIS MODEL, WHAT WOULD YOU GUESS YOUR ORGANIZATION’S MATURITY TO BE?
  • 20. No single solution can keep up with today’s sophisticated, emerging threats TWO ENSURE COMPREHENSIVE PROTECTION
  • 21. COMPREHENSIVE CONTROLS Anti-virus Advanced prevention tools Advanced detection and response tools Additional endpoint security controls • Application controls • Network access controls • Management controls • Port controls • DLP • ERM NEXT-GENERATION ENDPOINT SECURITY
  • 22. MACHINE LEARNING? Machine learning is one of the year’s hottest technology trends; within the endpoint security space, many companies legitimately claim to do some machine learning, though it’s often not clear what that means, how it works, or even why it is important.
  • 23. It is impossible to manually manage all of the endpoints on your network; while it’s important to have defense-in-depth, it is equally important to consolidate agents and processes wherever possible THREE CENTRALIZE MANAGEMENT
  • 24. Too much IT security spending has focused on the prevention of data breaches, and not enough has gone towards preparing for the inevitable FOUR STREAMLINE INCIDENT RESPONSE
  • 25. Humans are the weakest link in any security strategy; defending against human behavior involves a combination of endpoint security solutions and increased awareness FIVE BOLSTER SECURITY AWARENESS
  • 27. http://focus.forsythe.com OR FIND MORE ARTICLES ABOUT BUSINESS AND TECHNOLOGY SOLUTIONS AT FOCUS ONLINE:
  • 28. Authors: Jose Ferreira Security Strategist, Forsythe Security Solutions Josh Thurston Security Strategist, Office of the CTO, McAfee www.forsythe.com Forsythe is a leading enterprise IT company, providing advisory services, security, hosting and technology solutions for Fortune 1000 organizations. Forsythe helps clients optimize, modernize and innovate their IT to become agile, secure, digital businesses.