Unique Combination of Endpoint Security Solutions that Minimize Security Risk and Maximize ROI

Business Drivers and Challenges

With the barrage of threats from both inside and outside the corporate walls, mounting regulations enforcing strict security and operations standards, and tightened IT budgets, organizations face the daunting task of effectively managing their risk and protecting vital information at the endpoint.

It's no small task and today's mobile workforce multiplies the challenge exponentially. Organizations must now extend protection and control of their users' behavior and corporate endpoints to:

  • Remediate application and OS vulnerabilities to stay ahead of threats
  • Maintain desired security configurations to reduce risk and improve operational efficiency
  • Prevent data leakage, loss or theft to ensure data protection
  • Protect against malware, zero-day and targeted threats to secure the organization and its vital information
  • Protect all computing assets, from servers and laptops laptops to removable media like USB sticks and CDs / DVDs
  • Deny use of unauthorized removable devices and unwanted or unlicensed applications to ensure a trusted security environment


In facing this challenge organizations have deployed many point products, leaving them with no consolidated and consistent policy-based approach. In these situations, there is no feasible way for business, IT and security groups to interact with each other because each solution is in its own silo.

Lumension’s policy-driven, operational security solutions enable organizations to effectively:

  • manage risk across disparate groups
  • comply with security policies and regulations
  • consolidate IT resources
  • reduce costs and improve overall efficiencies

A policy-framework is used to mitigate non-compliant behavior or vulnerabilities before problems occur. Operational security solutions make certain that desired security postures are consistently and continuously enforced throughout the enterprise.

Lumension’s solutions are used across a wide range of industries to address endpoint security and operational challenges.

  • Financial – Provides financial institutions with data security safeguards by enforcing remediation of endpoints and enforcing removable device use and encryption policies. Also ensures compliance with numerous regulations such as SOX, PCI DSS, GLBA and many more.
  • Healthcare – Ensures the confidentiality and integrity of electronic provided health information (EPHI) by remediating endpoint vulnerabilities and enforcing device control and encryption policies. Also ensures compliance with numerous regulations including HIPAA / HITECH, NHS, PCI DSS as well as internal policies.
  • Manufacturing – Secures intellectual property and other sensitive data, such as patents, customer records, financial records, business plans, competitive analysis and positioning by enforcing endpoint configurations and patch-levels. Provides the necessary controls to manage the data flowing to and from network endpoints with detailed auditing and actionable reports. Enables compliance with multiple regulations, mandates and internal policies.
  • Public Sector - International – Provides government bodies with the ability to protect sensitive data and mission-critical endpoint systems with vulnerability management, application whitelisting and device control and encryption. Also enables compliance to be achieved simultaneously with numerous regulations, mandates and policies.
  • Public Sector - US – Enables government agencies to comply with civilian and DoD standards and mandates that include vulnerability management, secure configurations, endpoint security and data protection, including USB device control and data encryption. Also ensures compliance with FISMA and other pertinent regulations, mandates and policies.
  • Retail – Provides merchants who process credit card transactions mechanisms to help ensure compliance with PCI DSS and provides IT security defense mechanisms such as vulnerability management and policy-based endpoint control.
  • Utilities – Enables Responsible Entities to achieve compliance with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Cyber Security Standards.