New Readers

 Home News and World Report Buyers Guide Global Excellence Technology Case Studies Editorial Awards About Info Security
LANDesk Security Suite provides a multi-layered approach to security, ensuring no endpoint is overlooked


IT departments are now more complex than ever – overseeing a multitude of operations and process concerns has become a fulltime necessity as the number of threats, targeted attacks, applications, wireless devices and compliance demands continues to grow. What is frightening about this ever-growing IT environment is that IT departments are only as strong as their weakest links. IT infrastructure is a “chain” of links, from core servers to network servers and a myriad of devices—including desktops, laptops and portable storage media. While these end-user devices are often not only under-protected, many of them are not even connected—at least not in a way that enables IT administrators to effectively manage operations. These links are just floating out in the ether, waiting to be exploited directly, used as a host to transport malware into the network or recognized and incorporated into the rest of the network chain. Failure to recognize and secure them quickly can result in the loss of invaluable data.But there is more to this issue than simply finding and securing assets. There are hundreds of solutions that deal with different types of vulnerabilities, but the fact that there are so many tools is part of the problem. Because when systems or data is compromised, when weaknesses are exploited, when critical patches need distribution, IT administrators do not have time to hunt through 25 different consoles. Rather, bringing together as many security technologies as possible to secure the IT environment is a key tactic.

Tomorrow's Technology Today
Endpoint Security Solution


LANDesk Security Suite, available as an add-on to LANDesk Management Suite or standalone, offers more layers of integrated, multi-threat protection for Windows and Mac systems than other solutions. Layered features include patch management, anti-malware, device control, data protection, application whitelisting, application control, firewall, host intrusion protection (HIPS) and more. Organizations can secure and manage endpoints inside or outside the firewall without any network reconfiguration. The latest version of LANDesk Security Suite (October 2010) includes updated anti-spyware engines, Device Control Management (DCM) and software management. The latest version also incorporates an FDCC Scanner and related content, which enables government entities to scan their desktops for Federal Desktop Core Configuration standards.With LANDesk’s robust approach, IT resources from core and network servers to desktops, laptops and portable storage media can be secured —preventing data leakage and decreasing vulnerability to attack. LANDesk Security Suite can enforce these policies on computers anywhere in the world and makes dynamic changes based on whether or not machines are connected to trusted networks.The security measures employed by Security Suite include device control Security Content Automation Protocol (SCAP), application control, advanced vulnerability assessment and remediation, antivirus, anti-malware and anti-spyware protection and enforcement of Windows firewall and existing antivirus solutions.LANDesk Security Suite also ensures regulatory standards enforcement via comprehensive standards assessments. Standards measured include: HIPS, SANS, NIST, NSA, PCI, DSS, FDCC, HIPAA and Sarbanes-Oxley. Results are reported in a robust dashboard that includes trend graphs along with security policy and spyware reports.

LANDesk Security Suite is unique in that it is a single dashboard that provides a personal firewall, patch management, application control, whitelisting, blacklisting, compliance assessment and a host of other cutting-edge security solutions to keep the enterprise safe. Unlike a number of other solutions, LANDesk Security Suite provides strong vulnerability assessment and remediation, which limits access to authorized networks or IP addresses in order to ensure increased system protection and reduced attack potential. This solution also provides location-aware controls, which preserve productivity and reduce the risk of data loss and infection through dynamic policies that adjust security settings, including application control, anti-malware configuration and removable storage restrictions. These settings can be based upon the specific end-user's environment and customized down to the level of a single machine. Thus, LANDesk Security Suite offers an unprecedented amount of scalability from a single console that allows IT technicians to deploy a number of security solutions, track assets and ensure that industry compliance measures are met on anywhere from one to thousands of machines . LANDesk Security Suite was named a “Visionary” in Gartner’s Magic Quadrant for Endpoint Protection Platforms in December 2010. According to Gartner, Visionaries invest in the leading-edge features — such as advanced malware protection, data protection and/or management capabilities — that will be significant in the next generation of products, and will give buyers early access to improved security and management.


Unknown devices in enterprise IT networks are a very real threat and are often encountered on a daily basis. With telecommuting and portable storage media, it’s becoming more and more difficult for IT administrators to incessantly monitor and secure the endpoints within their infrastructure.With a comprehensive toolset such as LANDesk Security Suite, IT administrators can not only secure their vast chain of IT infrastructure links, securing the gateway to their organizations, but can also create a precision-milled chain that reliably and continuously transmits power between all the crucial gears in the enterprise machinery. When endpoint security is optimized and systems are running at full capacity, the entire enterprise maintains productivity and progresses toward its business objectives.

LANDesk Software
698 West 10000 South
Suite 500
South Jordan, Utah 84095 USA

Bookmark and Share  

Follow us on twitter   Join us on LinkedIn   Photos on flickr   Watch us on YouTube   Become our fan on Facebook   Google   

Volunteer To Be A Judge
Apply today to be a preliminary-round judge for the 2011 awards. If you qualify, you'll be assigned categories based on your experience and industry. Apply now to be a Judge>>
More Tomorrow's Technology Today...
Current threat scenarios and how technologies are providing solution Learn more>>