Overview: Lumension Security, Inc., a leader in operational endpoint management and security, develops, integrates and markets security software solutions that help businesses protect vital information and manage critical risk across network and endpoint assets.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Lumension.
Research offered by Lumension
2014 Ultimate Buyers Guide to Endpoint Security Solutions by Lumension. February 19, 2014 - This informative webcast provides a helpful buyers guide to the top endpoint security solutions on the market today, helping your organization to analyze each tool's offering and determine which would deliver the most benefits.
3 Strategies to Protect Endpoints from Risky Applications by Lumension. September 10, 2010 - Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today’s IT environment. Read this white paper to learn more.
Achieving Federal Desktop Core Configuration Compliance with Lumension Solutions by Lumension. May 28, 2009 - The Federal Desktop Core Configuration (FDCC) is an OMB mandated security configuration set applicable within United States Federal Government agencies. Learn how you can address each of the FDCC requirements with Lumension Vulnerability Management.
Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards by Lumension. March 02, 2009 - Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension® by Lumension. October 11, 2013 - This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Application Whitelisting Best Practices: Lessons from the Field by Lumension. February 17, 2014 - This in-depth resource explores the state of cybercrime, whitelisting strategies and best practices for securing your endpoints.
Barclays Bank by Lumension. August 2008 - Barclays chose Lumension Security's Sanctuary Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices.
Booz Allen Hamilton: Securing the Mobile Enterprise & Ensuring Compliance by Lumension. January 12, 2008 - Booz Allen Hamilton has incorporated Lumension Security's PatchLink Update into their automated patch management system. With PatchLink Update, the IT team no longer has to inspect each laptop, making it much more efficient and cost effective.
Code Signing Debacle 2.0: A Hacked Adobe Server and Its Impact on Us All by Lumension. May 14, 2013 - Watch this webinar to learn about the threat of hacked vendor software, the technologies and controls that can help address the risk of compromised code signatures and infrastructures, and how to preemptively address these vulnerabilities.
Data Protection Solution-Taking Control of Your Data by Lumension. October 30, 2008 - Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control.
Debunking the Top 5 Misconceptions about Data Protection by Lumension. May 2008 - Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus by Lumension. April 17, 2014 - Malware is the most common type of cyber-threat and businesses are struggling when it comes to stopping its growing complexity. This informative resource explores some strategies for preventing these sophisticated malware attacks.
Demystifying IT Risk to Achieve Greater Security and Compliance by Lumension. January 26, 2010 - Read this white paper to learn how organizations need an intelligent approach to gaining the upper hand when it comes to assessing IT risk and managing compliance.
Dousing the Flame: How This Tom Clancy-Esque Attack Worked and What Should You Really Do to Protect Against It by Lumension. February 15, 2013 - This webcast walks you through the fascinating nuts and bolts of the Flame attack and explains the technical details about how it worked and what lessons can be learned. Take an in-depth look into the entire attack by tuning in to learn more now.
E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals by Lumension. January 23, 2012 - Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Endpoint Security Compliance: Top 19 Questions Auditors Ask by Lumension. April 11, 2014 - This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time.
Endpoint Security Value Calculator by Lumension. August 12, 2009 - This flexible, easy to use tool enables you to rapidly evaluate a wide range of scenarios and gather compelling proof of the dramatic impact that Lumension Security’s effective application and device whitelisting can have on your bottom line.
Endpoint Security, Endpoint Management: The Cost-Cutter's Case for Convergence by Lumension. March 18, 2009 - This analyst report is for any organization that relies on end-user computing platforms (personal computers, workstations, laptops, notebooks) - and their associated applications, data, and network connectivity - to carry out strategic business objectives. It describes how the companies with top results keep these endpoints "clean and ready."
Endpoint Security: Anti-Virus Alone is Not Enough by Lumension. December 31, 2012 - Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
Enterprise antimalware excess? Managing antimalware security products by Lumension. April 27, 2012 - Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.
Fact or Fiction Security Survival Guide by Lumension. February 02, 2009 - This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Fact or Fiction: Debunking the Top 5 Misconceptions about Endpoint Security by Lumension. May 2008 - Check out this white paper and learn about the top 5 misconceptions about endpoint security and how your company can mitigate the risks of the eroding network perimeter.
Four DLP Best Practices To Enhance Security by Lumension. December 10, 2012 - Read this eGuide to learn what is involved with implementing full-blown DLP and how it can help improve the security of your business. Topics covered include best practices for introducing DLP to your business, understanding the relationship between DLP and the cloud, and more.
Four Steps to Cure Your Patch Management Headache by Lumension. February 11, 2010 - Using patch and vulnerability management as the principal component of your risk mitigation strategy and taking prudent measures to establish a best practices approach can help reduce costs and risks in the long term.
Four Steps to Cure Your Patch Management Headache by Lumension. January 06, 2011 - The need to speed up patch deployment across today’s highly complex and distributed IT environment has never been more important. Read this free white paper and learn four steps to cure your patch management headache.
How to Achieve Device Control Peace of Mind by Lumension. July 31, 2013 - Uncover which solution one of your peers implemented to help them find peace of mind and stop worrying about data loss and malware intrusion from removable USB drives and other portable storage devices.
How to Effectively Protect Data in Transit and Assure Governance with NHS Directive by Lumension. February 13, 2008 - This document examines how Lumension solutions assure NHS Trusts of governance with all of the stated requirements for securing data in transit and maps the solution's capabilities to these specific requirements.
How to Prevent Security Breaches Through Effective Management and Control of USB Devices by Lumension. August 12, 2009 - Learn how USB devices are used to transfer data, the federal government’s ban on USB devices and its impact, and how to effectively manage USB devices to secure data and networks without impacting productivity.
Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV by Lumension. May 03, 2013 - This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure.
Integrating Vulnerability Assessment and Remediation by Lumension. August 2008 - An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.
Is Your AV Keeping Up? by Lumension. April 16, 2014 - This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
IT GRC: Managing Risk, Improving Visibility, and Reducing Operating Costs by Lumension. May 11, 2009 - This Aberdeen Group benchmark report describes the policy, planning, process, and organizational elements of successful IT GRC implementations. Learn what top performing companies do to gain a competitive edge regarding compliance and IT risk management.
Laying the IT Security Foundation by Lumension. April 06, 2009 - Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker.
Lumension Endpoint Management and Security Suite by Lumension. September 13, 2010 - A new wave of vulnerabilities is threatening our endpoints and browsers at a much greater rate than operating systems and servers, which is why the SANS Institute has ranked “patching client-side software” as the number one security priority.
Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change by Lumension. September 01, 2008 - Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Lumension Endpoint Security: Device Control and Application Control by Lumension. September 13, 2010 - The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Lumension Patch Management: Picking the Low-Hanging Fruit by Lumension. January 12, 2012 - This white paper explores a centralized, comprehensive approach to application patching, allowing security pros to automatically detect risks, deploy patches and protect business information across a complex, highly distributed physical and virtual environment.
Lumension Sanctuary Device & Application Control for Endpoint Security -- 30-day Free Trial by Lumension. January 2008 - Protecting networks from malware can seem like an insurmountable challenge. In this 30-day free trial download, see how Lumension's Sanctuary Device and Application Control enable only authorized applications to run and only authorized devices to connect to a laptop or desktop, removing the risk of data leakage and malware.
Lumension Sanctuary Device Control by Lumension. February 13, 2009 - Lumension's Sanctuary Device Control minimizes the risk of data theft from removable devices through its policy-based enforcement of device use that controls the flow of inbound and outbound data from your endpoints.
Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension. November 01, 2008 - Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting.
Lumension Vulnerability Scanner Offer by Lumension. March 11, 2009 - This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes.
Lumension® Device Control for Microsoft® System Center by Lumension. January 21, 2010 - Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.
New Insider Threat Emerges in the New Economy by Lumension. February 02, 2009 - Learn how employees and partners are engaging with IT assets and intellectual property.
Patch Management 2.0: Evolving Your Patch Management Technology to Proactively Combat Security Challenges by Lumension. June 2008 - Read this white paper to get up-to-date technology alternatives to help better manage your patch management environment.
Patch Tuesday Alerts by Lumension. July 2008 - Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.
PC on a Stick: A Portable Endpoint Security Nightmare by Lumension. January 01, 2007 - Devices are growing increasingly more complex and manufacturers will soon develop the "PC on a stick". Because of this evolution, enterprise endpoint security must also grow to address the increasing concerns.
Presentation Transcript: Content Monitoring in the Enterprise by Lumension. January 04, 2013 - This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Preventing Weaponized Malware Payload in Advanced Persistent Threats: Strategies for Layered Endpoint Defense Against the APT Kill Chain by Lumension. February 04, 2013 - This white paper explores a solution through a defense-in-depth approach to endpoint security that will help bolster your security posture including: antivirus, device control, hard-drive and media encryption, and more.
Putting Security First in the Newly Virtualized World by Lumension. July 2008 - At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches
Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk by Lumension. August 2008 - This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Reduce the Cost to Achieving HIPAA Security Compliance with Lumension® Solutions by Lumension. October 19, 2009 - Healthcare organizations face a host of HIPAA Security Rule compliance challenges with the move to put patient medical records online. Lumension helps organizations address these compliance challenges by providing the proactive IT risk management and the required audit readiness to meet many aspects of the HIPAA Security Rule.
Reducing IT TCO with Effective Endpoint Security Management by Lumension. August 12, 2009 - This audiocast includes the findings from Aberdeen Group's latest report "Endpoint Security, Endpoint Management: The Cost Cutter's Case for Convergence", information about which endpoint security management technologies are used by "Best-in-Class" organizations, and recommendations to improve your security and ultimately reduce IT TCO.
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension. October 06, 2009 - This whitepaper will examine PCI DSS and explain how Lumension® Compliance and IT Risk Management can help organizations reduce the cost of addressing compliance.
Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management by Lumension. December 31, 2009 - In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Salvation Army Protects the Integrity of Data and Global Brand by Lumension. October 14, 2013 - In this white paper, uncover device control software that enables authorized devices and applications to access organizations' networks to ensure security policies and requirements are met.
Salvation Army Protects the Integrity of Data and Global Brand by Lumension. October 31, 2007 - Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
SC Magazine Security Brief: Server Side Risk by Lumension. April 18, 2014 - This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks.
SecuritySCAPE Virtual Conference 2012: IT Security Made Simple by Lumension. September 25, 2012 - Register now to attend SecuritySCAPE 2012, this year's premiere IT security virtual event. Gain insight into topics including endpoint security, vulnerability, data theft, and more from industry analysts, thought leaders, and IT pros from around the world.
The 2014 Endpoint Security Buyers Guide by Lumension. August 16, 2013 - This exceptional endpoint security buyer's guide provides clear buying criteria for solutions in anti-malware, mobility, and BYOD. Additionally, scan over 10 questions you should ask when buying this new technology.
The 5 Key Tactics for Dealing with Advanced Persistent Threats by Lumension. December 31, 2013 - This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.
The Best PCI Audit of Your Life by Lumension. August 13, 2009 - This white paper will detail a strategy that enables companies to easily gain PCI compliance and ensure effective security. By mapping technical controls to PCI standards and by continuously monitoring, assessing, and reporting the status of your environment, you can make your PCI audit the most efficient and actionable of your life.
The Busy IT Pros Guide to Vulnerability Management: Top 5 Tips for Avoiding Preventable Attacks by Lumension. February 29, 2012 - Many businesses suffer attacks because they leave their endpoints unpatched and insecurely configured. Protecting every aspect of your organizations valuable information is an essential part of the security process. This white paper provides five tips for avoiding preventable attacks and creating a comprehensive vulnerability management plan.
The CISOs Guide to Measuring IT Security by Lumension. January 12, 2012 - In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension. August 13, 2009 - The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
The Extraordinary Failure of Anti-Virus Technology by Lumension. February 12, 2008 - Anti-virus technology fails to prevent computers from virus infections. And because it fails, it inadvertently assists many security woes that plague the computer population.
The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks by Lumension. December 31, 2013 - This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs.
The Total Economic Impact of Lumension Security's Sanctuary by Lumension. September 2007 - Lumension's Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a "voluntary" compliance solution to an "automatic" one is illustrated
The Total Economic Impact of Lumension Security’s Sanctuary Application And Device Control by Lumension. September 12, 2012 - Consult this study to find out more about the financial impact of moving from "voluntary" compliance solution to an IT-driven solution that automatically enforces endpoint security policies. Read in-depth interviews with John C. Lincoln hospitals to see the benefits first-hand.
Think Your Anti-Virus Software Is Working? Think Again by Lumension. March 31, 2011 - Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.
Think Your Anti-Virus Software Is Working? Think Again by Lumension. April 01, 2011 - This paper examines how anti-virus software hasn’t been keeping up. Studies show that even though most organizations use anti-virus software, more and more are succumbing to attacks. Lumension Intelligent Whitelisting integrates the most effective third party security tools and techniques. The result is more effective endpoint security.
Third Party Applications: A Chink in Your Armour by Lumension. April 15, 2014 - This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management.
Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment by Lumension. January 27, 2010 - Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Three Ways to Prevent USB Insecurity by Lumension. October 14, 2013 - This crucial white paper examines how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Three Ways to Prevent USB Insecurity in Your Enterprise by Lumension. January 06, 2011 - USB flash drives and other portable devices are valuable tools in the typical government staffer’s virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. Read this paper to learn how to enable the use of these productivity tools, while mitigating the risk.
Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them by Lumension. April 16, 2014 - This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Video - Vulnerability Management in a Web 2.0 World by Lumension. January 28, 2009 - Lumension Security's Sr. Director of Solutions and Strategy, Don Leatham, discusses Vulnerability Management challenges in a Web 2.0 world, and how to defend against these threats.
Weaponized Malware - A Clear and Present Danger by Lumension. September 30, 2012 - Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks are now available to any cyber-criminal. How can security pros protect their organizations from these emerging perils?
Weaponized malware now threatens the private sector by Lumension. September 12, 2012 - Access this resource for crucial information about the next class of advanced persistent threats (APT) and uncover how you can boost endpoint security management to reduce the risk of these attacks.
What Businesses Need to Know About Cyber Security by Lumension. April 17, 2014 - Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world.
Why "Free" Patch Management Tools Could Cost You More by Lumension. November 01, 2008 - While "free" tools appear to be an enticing solution for patch management, looking deeper into the needs of the organization leads to selection of a more complete patch management solution which results in reduced long-term risk and optimized operating expense.
Why Free Patch Management Tools Could Cost You More by Lumension. January 13, 2012 - This white paper explores why so-called "free" patch management solutions could really end up costing your organization more in the long run.
WSUS for Secure Patching: Top Tips, Tricks and Scripts for Overcoming Limitations and Challenges by Lumension. February 25, 2014 - In this webinar, Windows expert Randy Franklin Smith shares some the best tips, tricks and scripts for addressing patching issues within WSUS.