Lumension Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Lumension

Overview: Lumension Security, Inc., a leader in operational endpoint management and security, develops, integrates and markets security software solutions that help businesses protect vital information and manage critical risk across network and endpoint assets.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Lumension.
Research offered by Lumension

2013 BYOD and Mobile Security Report by Lumension. April 21, 2014 - This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.

  View 2013 BYOD and Mobile Security Report research abstract

2014 Ultimate Buyers Guide to Endpoint Security Solutions by Lumension. February 19, 2014 - This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.

  View 2014 Ultimate Buyers Guide to Endpoint Security Solutions research abstract

3 Strategies to Protect Endpoints from Risky Applications by Lumension. September 10, 2010 - Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.

  View 3 Strategies to Protect Endpoints from Risky Applications research abstract

Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension. May 28, 2009 - The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.

  View Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions research abstract

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension. March 02, 2009 - Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.

  View Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards research abstract

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension® by Lumension. October 11, 2013 - This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.

  View After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension® research abstract

Application Whitelisting Best Practices: Lessons from the Field by Lumension. February 17, 2014 - This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.

  View Application Whitelisting Best Practices: Lessons from the Field research abstract

Barclays Bank by Lumension. August 2008 - Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices.

  View Barclays Bank research abstract

Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance by Lumension. January 12, 2008 - Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.

  View Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance research abstract

Data Protection Solution-Taking Control of Your Data by Lumension. October 30, 2008 - Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control.

  View Data Protection Solution-Taking Control of Your Data research abstract

Debunking the Top 5 Misconceptions about Data Protection by Lumension. May 2008 - Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.

  View Debunking the Top 5 Misconceptions about Data Protection research abstract

Demystifying IT Risk to Achieve Greater Security and Compliance by Lumension. January 26, 2010 - Read this white paper to learn how organizations need an intelligent approach to gaining the upper hand when it comes to assessing IT risk and managing compliance.

  View Demystifying IT Risk to Achieve Greater Security and Compliance research abstract

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals by Lumension. January 23, 2012 - Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.

  View E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals research abstract

Endpoint Security Value Calculator by Lumension. August 12, 2009 - This flexible, easy to use tool enables you to rapidly evaluate a wide range of scenarios and gather compelling proof of the dramatic impact that Lumension Security’s effective application and device whitelisting can have on your bottom line.

  View Endpoint Security Value Calculator research abstract

Endpoint Security, Endpoint Management: The Cost-Cutter's Case for Convergence by Lumension. March 18, 2009 - This analyst report is for any organization that relies on end-user computing platforms (personal computers, workstations, laptops, notebooks) - and their associated applications, data, and network connectivity - to carry out strategic business objectives. It describes how the companies with top results keep these endpoints "clean and ready."

  View Endpoint Security, Endpoint Management: The Cost-Cutter's Case for Convergence research abstract

Endpoint Security: Anti-Virus Alone is Not Enough by Lumension. December 31, 2012 - Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.

  View Endpoint Security: Anti-Virus Alone is Not Enough research abstract

Fact or Fiction Security Survival Guide by Lumension. February 02, 2009 - This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.

  View Fact or Fiction Security Survival Guide research abstract

Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security by Lumension. May 2008 - Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter.

  View Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security research abstract

Four Steps to Cure Your Patch Management Headache by Lumension. January 06, 2011 - The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache.

  View Four Steps to Cure Your Patch Management Headache research abstract

Four Steps to Cure Your Patch Management Headache by Lumension. February 11, 2010 - Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.

  View Four Steps to Cure Your Patch Management Headache research abstract

How to Achieve Device Control Peace of Mind by Lumension. July 31, 2013 - Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.

  View How to Achieve Device Control Peace of Mind research abstract

How to Effectively Protect Data in Transit and Assure Governance with NHS Directive by Lumension. February 13, 2008 - This document examines how Lumension solutions assure NHS Trusts of governance with all of the stated requirements for securing data in transit and maps the solution's capabilities to these specific requirements.

  View How to Effectively Protect Data in Transit and Assure Governance with NHS Directive research abstract

How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension. August 12, 2009 - Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.

  View How to Prevent Security Breaches Through Effective Management and Control of USB Devices research abstract

Integrating Vulnerability Assessment and Remediation by Lumension. August 2008 - An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.

  View Integrating Vulnerability Assessment and Remediation research abstract

IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs by Lumension. May 11, 2009 - This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management.

  View IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs research abstract

Laying the IT Security Foundation by Lumension. April 06, 2009 - Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker.

  View Laying the IT Security Foundation research abstract

Lumension Endpoint Management and Security Suite by Lumension. September 13, 2010 - A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.

  View Lumension Endpoint Management and Security Suite research abstract

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change by Lumension. September 01, 2008 - Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.

  View Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change research abstract

Lumension Endpoint Security: Device Control and Application Control by Lumension. September 13, 2010 - The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

  View Lumension Endpoint Security: Device Control and Application Control research abstract

Lumension Patch Management: Picking the Low-Hanging Fruit by Lumension. January 12, 2012 - This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.

  View Lumension Patch Management: Picking the Low-Hanging Fruit research abstract

Lumension Sanctuary Device & Application Control for Endpoint Security -- 30-day Free Trial by Lumension. January 2008 - Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware.

  View Lumension Sanctuary Device & Application Control for Endpoint Security -- 30-day Free Trial research abstract

Lumension Sanctuary Device Control by Lumension. February 13, 2009 - Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints.

  View Lumension Sanctuary Device Control research abstract

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension. November 01, 2008 - Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting.

  View Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle research abstract

Lumension Vulnerability Scanner Offer by Lumension. March 11, 2009 - This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.

  View Lumension Vulnerability Scanner Offer research abstract

Lumension® Device Control for Microsoft® System Center by Lumension. January 21, 2010 - Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.

  View Lumension® Device Control for Microsoft® System Center research abstract

New Insider Threat Emerges in the New Economy by Lumension. February 02, 2009 - Learn how employees and partners are engaging with IT assets and intellectual property.

  View New Insider Threat Emerges in the New Economy research abstract

Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges by Lumension. June 2008 - Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment.

  View Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges research abstract

Patch Tuesday Alerts by Lumension. July 2008 - Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.

  View Patch Tuesday Alerts research abstract

PC on a Stick: A Portable Endpoint Security Nightmare by Lumension. January 01, 2007 - Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns.

  View PC on a Stick: A Portable Endpoint Security Nightmare research abstract

Presentation Transcript: Content Monitoring in the Enterprise by Lumension. January 04, 2013 - This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.

  View Presentation Transcript: Content Monitoring in the Enterprise research abstract

Putting Security First in the Newly Virtualized World by Lumension. July 2008 - At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches

  View Putting Security First in the Newly Virtualized World research abstract

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk by Lumension. August 2008 - This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.

  View Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk research abstract

Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions by Lumension. October 19, 2009 - Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.

  View Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions research abstract

Reducing IT TCO with Effective Endpoint Security Management by Lumension. August 12, 2009 - This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO.

  View Reducing IT TCO with Effective Endpoint Security Management research abstract

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension. October 06, 2009 - This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance.

  View Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management research abstract

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension. December 31, 2009 - In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.

  View Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management research abstract

Salvation Army Protects the Integrity of Data and Global Brand by Lumension. October 14, 2013 - In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.

  View Salvation Army Protects the Integrity of Data and Global Brand research abstract

Salvation Army Protects the Integrity of Data and Global Brand by Lumension. October 31, 2007 - Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.

  View Salvation Army Protects the Integrity of Data and Global Brand research abstract

SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension. September 25, 2012 - Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.

  View SecuritySCAPE Virtual Conference 2012: IT Security Made Simple research abstract

The Best PCI Audit of Your Life by Lumension. August 13, 2009 - This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.

  View The Best PCI Audit of Your Life research abstract

The Busy IT Pros Guide to Vulnerability Management: Top 5 Tips for Avoiding Preventable Attacks by Lumension. February 29, 2012 - Many businesses suffer attacks because they leave their endpoints unpatched and insecurely configured. Protecting every aspect of your organizations valuable information is an essential part of the security process. This white paper provides five tips for avoiding preventable attacks and creating a comprehensive vulnerability management plan.

  View The Busy IT Pros Guide to Vulnerability Management: Top 5 Tips for Avoiding Preventable Attacks research abstract

The CISOs Guide to Measuring IT Security by Lumension. January 12, 2012 - In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.

  View The CISOs Guide to Measuring IT Security research abstract

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension. August 13, 2009 - The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.

  View The Critical Security Controls – Moving Beyond the Checklist Mentality research abstract

The Extraordinary Failure of Anti-Virus Technology by Lumension. February 12, 2008 - Anti-virus technology fails to prevent computers from virus infections. And because it fails, it inadvertently assists many security woes that plague the computer population.

  View The Extraordinary Failure of Anti-Virus Technology research abstract

The Total Economic Impact of Lumension Security's Sanctuary by Lumension. September 2007 - Lumension's Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a "voluntary" compliance solution to an "automatic" one is illustrated

  View The Total Economic Impact of Lumension Security's Sanctuary research abstract

The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control by Lumension. September 12, 2012 - Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand.

  View The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control research abstract

Think Your Anti-Virus Software Is Working? Think Again by Lumension. March 31, 2011 - Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.

  View Think Your Anti-Virus Software Is Working? Think Again research abstract

Think Your Anti-Virus Software Is Working? Think Again by Lumension. April 01, 2011 - This paper examines how anti-virus software hasn’t been keeping up. Studies show that even though most organizations use anti-virus software, more and more are succumbing to attacks. Lumension Intelligent Whitelisting integrates the most effective third party security tools and techniques. The result is more effective endpoint security.

  View Think Your Anti-Virus Software Is Working? Think Again research abstract

Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension. January 27, 2010 - Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.

  View Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment research abstract

Three Ways to Prevent USB Insecurity by Lumension. October 14, 2013 - This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.

  View Three Ways to Prevent USB Insecurity research abstract

Three Ways to Prevent USB Insecurity in Your Enterprise by Lumension. January 06, 2011 - USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk.

  View Three Ways to Prevent USB Insecurity in Your Enterprise research abstract

Video - Vulnerability Management in a Web 2.0 World by Lumension. January 28, 2009 - Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.

  View Video - Vulnerability Management in a Web 2.0 World research abstract

Weaponized malware now threatens the private sector by Lumension. September 12, 2012 - Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.

  View Weaponized malware now threatens the private sector research abstract

Why "Free" Patch Management Tools Could Cost You More by Lumension. November 01, 2008 - While "free" tools appear to be an enticing solution for patch management, looking deeper into the needs of the organization leads to selection of a more complete patch management solution which results in reduced long-term risk and optimized operating expense.

  View Why "Free" Patch Management Tools Could Cost You More research abstract

Why Free Patch Management Tools Could Cost You More by Lumension. January 13, 2012 - This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.

  View Why Free Patch Management Tools Could Cost You More research abstract

WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges by Lumension. February 25, 2014 - In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.

  View WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts