Government Drivers and Challenges
While many government bodies have established endpoint security policies, they do not have the right security management software to enforce them. Users continue to run software that is either unauthorized or is without the latest patches, opening the doors to cyber criminals and cyber terrorists. Users can also remove data from government networks via removable devices or media and if the data is not encrypted, sensitive information can be exposed.
With the productivity advantages of removable devices such as USB sticks come significant data protection challenges as government organizations have lost personal information at alarming rates. In fact, UK Prime Minister Brown recently stated, “I can’t make any promises about keeping your personal details safe.”
Not having the latest patches and not enforcing encryption of information to removable media can expose government systems to unnecessary risk and compromise the integrity and confidentiality of critical information. In many jurisdictions around the world this had led to regulations and standards-based protocols around security controls and data protection.
International Government Solutions
Lumension’s Security Management Solutions Secure Critical Information at the Endpoint
Lumension’s Common Criteria EAL 2 Certified security management software protects against insider threats and cyber criminals targeting government organizations by providing comprehensive vulnerability management, endpoint security, compliance and IT risk management and data protection solutions enabling you to:
|Identify and assess key international compliance standards and regulations such as ISO 27002, Basel II, etc. for global organizations.
||Lumension® Compliance and IT Risk Management helps organizations achieve lower costs of compliance by automating IT audit workflows, harmonizing controls with policy requirements, and providing greater reports and visibility across IT assets for optimal security and compliance management.
|Meet strict international requirements posed by the National Information Assurance Partnership (NIAP) Common Criteria Evaluation and Validation Scheme for IT Security (CCEVS).
||Lumension® Vulnerability Management, Lumension® Endpoint Protection and Lumension® Data Protection are all certified, maintain audit readiness and increase your security posture.
|Safeguard the confidentiality, integrity and availability of sensitive data and ensure secure configurations.
||Lumension® Vulnerability Management identifies non-compliant security configurations through comprehensive network and agent-based scanning capabilities, removes the risk of sensitive data from being improperly disclosed and minimizes the vulnerability window of exposure through rapid remediation.
Lumension® Data Protection controls and monitors the flow of inbound and outbound data via removable devices / media and protects data using FIPS 140-2 Level 2 validated encryption.
Lumension® Endpoint Protection identifies your organizational security holes in the protection of information through comprehensive auditing of user behavior and endpoint configurations.
|Prevent malware execution originating at an endpoint.
||Lumension® Endpoint Protection prevents the execution of malware and zero-day threats through the use of application whitelisting.
|Improve IT system performance.
||Lumension® Vulnerability Management, Lumension® Endpoint Protection, and Lumension® Data Protection all provide key capabilities that improve IT system performance: through standardizing endpoint configurations, patching vulnerabilities and by whitelisting applications and removable devices to ensure that only those authorized can execute on your network.
|Reduce endpoint security TCO.
||Lumension® Vulnerability Management
minimizes security or compliance crisis response and
remediates vulnerabilities quickly with fewer required resources.
|Improve end user productivity.
||Lumension® Endpoint Protection blocks unwanted, non-government approved desktop applications and enforces policies to ensure endpoints run as expected.
|Enforce software license compliance within the organization.
||Lumension® Endpoint Protection ensures only authorized software applications are running on government endpoints.
Certified and Approved Security Management Software
Lumension’s solutions have been developed to meet rigorous government and industry security standards, including:
For more detailed information on all the certifications which Lumension security software solutions have obtained, please see our Certifications page