Overview: Lumension Security, Inc., a leader in operational endpoint management and security, develops, integrates and markets security software solutions that help businesses protect vital information and manage critical risk across network and endpoint assets.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Lumension.
Research offered by Lumension
2013 State of the Endpoint Security Report by Lumension. December 31, 2012 - Consult this exclusive resource for a complete overview of the state of the modern endpoint. Discover the major threats that are putting endpoints at risk – such as malware and mobile vulnerabilities – and learn all you need to know to remove the barriers preventing complete endpoint protection by reading on now.
2013 Ultimate Buyers Guide to Endpoint Management Solutions by Lumension. February 18, 2013 - Tune into this webcast to uncover the four critical areas that are most important for 2013 endpoint security management planning. View now to better understand what features and functions are most important to keeping your endpoints and enterprise secure.
3 Strategies to Protect Endpoints from Risky Applications by Lumension. September 10, 2010 - Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
A CFOs Guide to Why Standalone AV is No Longer Enough by Lumension. May 16, 2013 - In this webcast, security expert Derek Brink of the Aberdeen Group will show you why anti-virus alone is simply not enough for endpoint security. Inside, you'll learn important facts regarding defense-in-depth solutions, common endpoint security technologies, patch management, and more.
Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension. May 28, 2009 - The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.
Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension. March 02, 2009 - Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Application Explosion: How to Manage Productivity and Security by Lumension. January 31, 2013 - This paper discusses the risks of uncontrolled applications, best practices for controlling those applications, and the array of choices available, exploring the attributes of Microsoft's built-in tools, of free and open source software, and of third-party commercial application control systems.
Barclays Bank by Lumension. August 2008 - Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices.
Best Practice Guide to Addressing Web 2.0 Risks by Lumension. January 31, 2012 - With the rise of user-generated content, social networks and readily available information offered by the Web 2.0-enabled workplace, users are more connected to people and ideas than ever before. This new level of connectivity also introduces significant risk. In this resource, find 5 key best practices for reducing risk in a Web 2.0 world.
Best Practice Guide to Minimizing Your Insider Risk by Lumension. January 31, 2012 - Balancing productivity with security is a fine line, but by taking advantage of security best practices, your organization can go a long way toward minimizing insider risk and protecting data.
Best Practice Guide to Reducing Your Cost of Compliance by Lumension. January 31, 2012 - With the cost of compliance expected to rise, organizations must find ways to streamline compliance spending to maintain IT operations and IT security service levels in the coming year. Here are some useful best practices to slash regulatory overhead and improve the effectiveness of your compliance spend.
Best Practices to Device Control: An In-Depth Technical Webcast by Lumension. May 16, 2013 - This webcast offers practical steps you can take to implement the device control and encryption technologies that will help you effectively address the vulnerabilities associated with removable storage devices. Watch and learn more about laying the groundwork for data security, technical enforcement, data protection policies and more.
Beyond Compliance: Combating Threats with Endpoint Configuration Management by Lumension. December 31, 2012 - Read this informative whitepaper today to find out how to provide a solid and comprehensive configuration management solution upon which to build the rest of the organization's endpoint security approach.
Beyond Compliance: Combating Threats with Endpoint Configuration Management by Lumension. December 31, 2011 - Read this whitepaper today to find out how to provide a solid and comprehensive configuration management solution upon which to build the rest of your organization's endpoint security approach.
BitLocker Drive Encryption - How it Works and How it Compares by Lumension. May 14, 2013 - In this webcast, Randy Franklin Smith of Ultimate Window Security explains to listeners how BitLocker can help organizations meet their security encryption needs. Watch and and learn how to effectively deploy BitLocker and BitLocker To Go, how it protects your data and devices, and why you need to go beyond simple encryption to stay secure.
Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance by Lumension. January 12, 2008 - Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
Closing the Antivirus Protection Gap: A Comparative Study on Effective Endpoint Protection Strategies by Lumension. May 31, 2012 - In this paper, we will benchmark the effectiveness of a standalone AV and O/S resident patching solution versus newer technologies and a defense-in-depth approach of layering multiple endpoint security and operational technologies together.
Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension. May 14, 2013 - Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities.
Committed to Memory: Protecting Against Memory-Based Attacks by Lumension. July 23, 2013 - Gain insight into the inner-workings of memory injections: how they infiltrate your apps, why they are difficult to detect, and how traditional endpoint security strategies cannot protect against them.
Data Protection Solution-Taking Control of Your Data by Lumension. October 30, 2008 - Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control.
Debunking the Top 5 Misconceptions about Data Protection by Lumension. May 2008 - Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Demystifying IT Risk to Achieve Greater Security and Compliance by Lumension. January 26, 2010 - Read this white paper to learn how organizations need an intelligent approach to gaining the upper hand when it comes to assessing IT risk and managing compliance.
Developing Best Practices for Patch and Remediation: An In-Depth Technical Webcast by Lumension. May 14, 2013 - Discover the steps you can take to improve patch management and your ability to mitigate risk. Watch today's webcast and learn why patch management is important, best practices for patch management, critical areas to address, and more.
Developing Best Practices to Application Whitelisting: An In-Depth Technical Webcast by Lumension. May 14, 2013 - This video covers the important steps involved with laying the groundwork for application whitelisting, how to prevent unwanted or dangerous changes while maintaining flexibility, and maintaining your environment as application, user, and other needs change. Watch and learn more.
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It by Lumension. February 15, 2013 - This webcast walks you through the fascinating nuts and bolts of the Flame attack and explains the technical details about how it worked and what lessons can be learned. Take an in-depth look into the entire attack by tuning in to learn more now.
E is for Endpoint - 6 Strategies for Highly Effective IT Pros by Lumension. January 31, 2012 - Endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
E is for Endpoint - Back to Basics with Patch and Configuration Management by Lumension. March 31, 2012 - Patch and configuration management is Security 101—the most fundamental and cost-effective means of protecting your endpoints. But when it comes to configuring and patching endpoints, many organizations aren't keeping up with changing realities. Here's how to get back on track with patch and configuration management.
E is for Endpoint: How to Check Unknown Apps at the Door by Lumension. April 30, 2012 - Antivirus and patch management are vital layers of defense. But their limitations leave your systems vulnerable. Intelligent whitelisting adds a layer of flexible, dynamic application control to truly protect your endpoints.
E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals by Lumension. January 23, 2012 - Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Endpoint Security Management Buyer's Guide by Lumension. September 12, 2012 - This report, developed by analyst firm Securosis, is focused on helping you understand what features and functions are important – in the four critical areas of patch management, configuration management, device control, and file integrity monitoring.
Endpoint Security Value Calculator by Lumension. August 12, 2009 - This flexible, easy to use tool enables you to rapidly evaluate a wide range of scenarios and gather compelling proof of the dramatic impact that Lumension Security’s effective application and device whitelisting can have on your bottom line.
Endpoint Security, Endpoint Management: The Cost-Cutter's Case for Convergence by Lumension. March 18, 2009 - This analyst report is for any organization that relies on end-user computing platforms (personal computers, workstations, laptops, notebooks) - and their associated applications, data, and network connectivity - to carry out strategic business objectives. It describes how the companies with top results keep these endpoints "clean and ready."
Endpoint Security: Anti-Virus Alone is Not Enough by Lumension. April 30, 2012 - Consult this white paper now to find an analysis of current endpoint security measures and discover the limitations and vulnerabilities of using anti-virus software as a strategy for endpoint defense. Keep your endpoints secure from evolved attacks – read on now to get started.
Enterprise antimalware excess? Managing antimalware security products by Lumension. April 27, 2012 - Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.
Everything Matters: Every Setting, Every Component, Every Technology by Lumension. February 18, 2013 - This webcast explores why cutting corners just doesn't cut it in today's enterprise, especially when it comes to security. View now to learn why protecting the most important systems isn't the most important thing anymore because, well, they're all important.
Fact or Fiction Security Survival Guide by Lumension. February 02, 2009 - This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security by Lumension. May 2008 - Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter.
Four DLP Best Practices To Enhance Security by Lumension. December 10, 2012 - Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Four Steps to Cure Your Patch Management Headache by Lumension. February 11, 2010 - Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.
Four Steps to Cure Your Patch Management Headache by Lumension. January 06, 2011 - The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache.
How to Achieve Device Control Peace of Mind by Lumension. July 31, 2013 - Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
How to Deal with Today's Multi-Platform, Multi-Vendor Patch Management Mess by Lumension. January 30, 2013 - Organizations need a comprehensive patch management solution which provides endpoint protection beyond the typical operating system in order to effectively and efficiently minimize risks caused by the vulnerabilities that are inevitable in modern computing systems.
How to Effectively Protect Data in Transit and Assure Governance with NHS Directive by Lumension. February 13, 2008 - This document examines how Lumension solutions assure NHS Trusts of governance with all of the stated requirements for securing data in transit and maps the solution's capabilities to these specific requirements.
How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension. August 12, 2009 - Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Improving Server Performance and Security: An Impact Comparison of Application Control and Traditional Anti-Virus Solutions by Lumension. April 10, 2013 - This analyst report unveils the impact an application control solution – which promises to reduce server CPU resource consumption – had on servers and reveals the level of protection from malware that it can provide.
Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV by Lumension. May 03, 2013 - This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure.
Integrating Vulnerability Assessment and Remediation by Lumension. August 2008 - An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.
IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs by Lumension. May 11, 2009 - This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management.
IT Pros Guide to Data Protection: Top 5 Tips to Securing Data in the Modern Organization by Lumension. January 31, 2012 - The following five steps are some very effective ways to improve data security in a cost-effective manner and are the first steps toward readying an organization for more robust data protection measures such as data leak prevention (DLP).
IT Pros Guide to Endpoint Protection: Top 5 Tips for Enabling a Self-Defending Endpoint by Lumension. February 29, 2012 - Learn how to avoid costly malware outbreaks with this informative resource.
Keeping Bot Herders Off Your Servers and Breaking the Lateral Kill Chain of Today's Attackers by Lumension. May 14, 2013 - In this presentation, security expert Randy Franklin Smith of Ultimate Windows Security describes exactly why and how application security is such a critical component of any modern security plan, and how you can go about implementing the detection and prevention measures you need to stay secure.
Laying the IT Security Foundation by Lumension. April 06, 2009 - Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker.
Lumension Endpoint Management and Security Suite by Lumension. September 13, 2010 - A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change by Lumension. September 01, 2008 - Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Lumension Endpoint Security: Device Control and Application Control by Lumension. September 13, 2010 - The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Lumension Guide to Application Control Best Practices by Lumension. September 14, 2012 - Read this whitepaper to understand the best practice workflow to application whitelisting, and can act as a guide when implementing Lumension® Endpoint Management and Security Suite: Application Control.
Lumension Guide to Device Control Best Practices by Lumension. September 14, 2012 - This white paper provides a practical guide to assist you with the deployment of a device control module as part of your endpoint security management. Learn how you can prevent malware, ensure data protection and more.
Lumension Guide to Patch Management Best Practices by Lumension. September 14, 2012 - Access this white paper to discover patch management best practices. Learn how to better mitigate risk and remediate vulnerabilities.
Lumension Patch Management: Picking the Low-Hanging Fruit by Lumension. January 12, 2012 - This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.
Lumension Sanctuary Device & Application Control for Endpoint Security -- 30-day Free Trial by Lumension. January 2008 - Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware.
Lumension Sanctuary Device Control by Lumension. February 13, 2009 - Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints.
Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension. November 01, 2008 - Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting.
Lumension Vulnerability Scanner Offer by Lumension. March 11, 2009 - This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
Lumension® Device Control for Microsoft® System Center by Lumension. January 21, 2010 - Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.
Minimizing Security-Related Total Cost of Ownership by Lumension. October 31, 2008 - This guide explains how security implementations in four major areas can reduce IT TCO dramatically, effectively paying for direct costs of these technologies by reducing the overall bottom line.
New Insider Threat Emerges in the New Economy by Lumension. February 02, 2009 - Learn how employees and partners are engaging with IT assets and intellectual property.
Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges by Lumension. June 2008 - Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment.
Patch Tuesday Alerts by Lumension. July 2008 - Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.
PC on a Stick: A Portable Endpoint Security Nightmare by Lumension. January 01, 2007 - Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns.
Presentation Transcript: Content Monitoring in the Enterprise by Lumension. January 04, 2013 - This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Proving Your Vulnerability Compliance: Patches, Configuration, Reports and More by Lumension. January 30, 2013 - This whitepaper explores your strategies for simplifying and streamlining your vulnerability compliance efforts. Read on to see how you can make patch management and configuration auditing consistent and automated, allowing you to save both time and money.
Putting Security First in the Newly Virtualized World by Lumension. July 2008 - At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches
Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk by Lumension. August 2008 - This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions by Lumension. October 19, 2009 - Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.
Reducing IT TCO with Effective Endpoint Security Management by Lumension. August 12, 2009 - This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO.
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension. October 06, 2009 - This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance.
Salvation Army Protects the Integrity of Data and Global Brand by Lumension. October 31, 2007 - Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension. September 25, 2012 - Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
Stopping the Adobe, Apple and Java Software Updater Insanity by Lumension. February 15, 2013 - This on-demand webcast shares tips and caveats for dealing with the most common software updaters from Adobe, Apple and Oracle. Discover the need for centralized patch management and explore the important requirements and architectural issues you should know by reading on now.
Strategic Endpoint Security for C-Level Executives by Lumension. February 28, 2013 - Uncover the different endpoint security solutions available – and the challenges of implementing one. In addition, discover why putting multiple protective layers on your perimeters and endpoints is crucial to achieving a defense-in-depth security strategy that will keep your organization secure.
Strategies for Layered Endpoint Defense Against the APT Kill Chain by Lumension. February 28, 2013 - Take a look at what we need to learn from highly-publicized weaponized attacks such as Stuxnet, DuQu, Flame, and Gauss and explore why a defense-in-depth security architecture is crucial to defending against them.
Taking the Sting Out of Java Vulnerabilities by Lumension. June 30, 2013 - Access this white paper to discover a defense-in-depth strategy with overlapping layers of protection, backed up by flexible application whitelisting to address not just Java vulnerabilities, but the security profile of your entire IT infrastructure.
The Best PCI Audit of Your Life by Lumension. August 13, 2009 - This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
The Busy IT Professional's Guide to Governance Risk and Compliance by Lumension. February 28, 2012 - Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
The Busy IT Professional's Guide to Vulnerability Management by Lumension. February 29, 2012 - Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
The Busy IT Pros Guide to Vulnerability Management: Top 5 Tips for Avoiding Preventable Attacks by Lumension. February 29, 2012 - Many businesses suffer attacks because they leave their endpoints unpatched and insecurely configured. Protecting every aspect of your organizations valuable information is an essential part of the security process. This white paper provides five tips for avoiding preventable attacks and creating a comprehensive vulnerability management plan.
The CISOs Guide to Measuring IT Security by Lumension. January 12, 2012 - In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension. August 13, 2009 - The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
The Extraordinary Failure of Anti-Virus Technology by Lumension. February 12, 2008 - Anti-virus technology fails to prevent computers from virus infections. And because it fails, it inadvertently assists many security woes that plague the computer population.
The Total Economic Impact of Lumension Security's Sanctuary by Lumension. September 2007 - Lumension's Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a "voluntary" compliance solution to an "automatic" one is illustrated
The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control by Lumension. September 12, 2012 - Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand.
Think Your Anti-Virus Software Is Working? Think Again by Lumension. March 31, 2011 - Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.
Think Your Anti-Virus Software Is Working? Think Again by Lumension. April 01, 2011 - This paper examines how anti-virus software hasn’t been keeping up. Studies show that even though most organizations use anti-virus software, more and more are succumbing to attacks. Lumension Intelligent Whitelisting integrates the most effective third party security tools and techniques. The result is more effective endpoint security.
Third-Party Applications in the Enterprise: Management and Risk Mitigation by Lumension. January 31, 2013 - This Computing Research report unveils the results of a recent survey on the perceived risks of third-party apps and available mitigation strategies. View now to uncover the significant issues third-party apps present and learn why so many organizations are struggling to defend themselves against them.
Three Tips to Prevent USB Insecurity In Your Enterprise by Lumension. January 31, 2012 - Today, what virtualization software can accomplish is nearly limitless. But has your computer security methodology and software kept up? This whitepaper will take an in-depth look at virtualization security risks and mitigations.
Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension. January 27, 2010 - Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Three Ways to Prevent USB Insecurity in Your Enterprise by Lumension. January 06, 2011 - USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk.
Video - Vulnerability Management in a Web 2.0 World by Lumension. January 28, 2009 - Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
Virtualization Security Risks: How to Develop Your Strategic Approach Now by Lumension. February 22, 2012 - While virtualization offers costs and agility benefits, it can also increase the risk and complexity of your existing environment. Is your computer security strategy and software able to keep up? In this resource, get an in-depth look into the virtualization security challenges, and discover how to develop a strategic approach for risk mitigation.
Weaponized Malware - A Clear and Present Danger by Lumension. September 30, 2012 - Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks are now available to any cyber-criminal. How can security pros protect their organizations from these emerging perils?
Why "Free" Patch Management Tools Could Cost You More by Lumension. November 01, 2008 - While "free" tools appear to be an enticing solution for patch management, looking deeper into the needs of the organization leads to selection of a more complete patch management solution which results in reduced long-term risk and optimized operating expense.
Why Free Patch Management Tools Could Cost You More by Lumension. January 13, 2012 - This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
Windows 8 Is Coming to a BYOD Near You: Are the New Security Features Enough? by Lumension. December 31, 2012 - This presentation will show you how to more effectively manage Windows 8 devices in the workplace and how to secure them properly. Dive in to learn more about RT versus "Real" Windows, Windows 8 security features, and more.