More

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors

    In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like: What are the coming situational issues surrounding the security of our data? How are we as an organization really doing in securing our valuable information today? What do we need to do in the future to do better? How will we pay for it?

    From BYOD to Windows XP end of life, there is no shortage of situational issues. Meanwhile, the bad guys are getting better and data breaches around the world and across industries are significantly affecting the bottom line. Planning for improved security in 2015 is no easy task.

    Some IT departments will look to invest in new approaches. That’s why Lumension has partnered with analyst and President of Securosis, Mike Rothman, for the 2015 Endpoint and Mobile Security Buyer’s Guide. In addition to outlining some of the hot issues and recommended strategies, Rothman also outlines 10 questions every buying IT department should ask vendors to receive the best value for your money. 

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 1

    Click through for 10 questions IT departments should ask vendors to receive the best value and security for your money, provided Lumension in partnership with Securosis.

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 2

    What specific controls do you offer for endpoint management? Can the policies for all controls be managed via your console? How do policies differ based on device type? (PC, Mac, iOS, Android, etc.)

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 3

    Does your organization have an in-house research team? How does their work make your endpoint security product better?

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 4

    How do you handle Zero-day malware? What about dormant malware that doesn’t execute immediately?

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 5

    What products, devices, and applications can be patched with the offering? How quickly after the vendor issues a patch can we install it in our environment?

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 6

    What standards and/or benchmarks are offered out of the box with your configuration management offering?

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 7

    What kind of agentry is required for your products? Is the agent persistent or dissolvable? How are updates distributed to managed devices? How do you ensure agents are not tampered with? How do you handle mobile, remote, and disconnected devices?

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 8

    How do you support mobile devices and/or virtual desktops (VDI)? Do you offer any capabilities specifically to handle employee-owned devices (BYOD)? Do you do anything to manage applications on endpoint devices?

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 9

    Where does your management console run? Do we need a dedicated appliance? What kind of hierarchical management do you support? How customizable is the management interface?

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 10

    What kinds of reports are available out of the box? What is involved in customizing specific reports?

    2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors - slide 11

    What have you done to ensure the security of your platform? Is strong authentication supported? Have you performed a penetration test on your console? Does your engineering team use any kind of secure software development process?

    Latest Articles