Latest News

Lumension Endpoint Security Suite Integrates Cloud Based Integrity Service

SCOTTSDALE, Ariz. April 25, 2012 rd Lumension®

National Software Reference Library

  • Increased visibility, control and security with enhanced flexibility;
  • Explicit identification and application risk rating for increased security, control and optimized management of the application ecosystem – thereby improving endpoint security from both admin and user sides, reducing the burden / costs of doing so, and safely enabling end user productivity;
  • Lumension trust rating system for increased security, control and optimized management of the application ecosystem;
  • Explicit application validation through Lumension’s integrity assurance of SHA-256 hashes for all executable files that provides IT admins and end users with better visibility into and understanding of application risk and,
  • Simplified policy management through highly detailed and structured application metadata – vendor, version, and installation date, etc.

The integration of L.E.I.S. within L.E.M.S.S allows for quick identification of potentially harmful "grey" applications and it provides IT operations with application visibility across their endpoint environment. As a result, Lumension’s Intelligent Whitelisting solution is further enhanced through the more efficient creation of custom application libraries. IT administrators can now quickly set custom policies for specific departments or project teams and seamlessly utilize Lumension’s cloud-based L.E.I.S. to verify the prominence and authenticity of all applications discovered within the endpoint environment.


L.E.M.S.S. simplifies endpoint system management by expanding operational visibility through the integration of Lumension Patch and Remediation, Security Configuration Management and Power Management. Endpoint Security is made more effective with additional integration of Lumension Application Control, Lumension AntiVirus, Lumension Device Control and Lumension Disk Encryption. All applications and endpoint solution workflows are managed through a single console and supported on the endpoint through a single agent architecture.

Alan Bentley

L.E.M.S.S. v7.2 will be generally available June, 2012.

Also challenging for IT is securing the mobile devices now common in most workplace environments. In a report by Ponemon Institute, 48% of IT report mobile devices as their greatest security concern in 2012 yet 42% have no security effort in place to safeguard this new way of doing business. To address this growing insecurity, L.E.M.S.S. is also integrating mobile device management onto the platform planned for Fall 2012.

Organizations relying on L.E.M.S.S. will soon have the ability to manage, inventory and secure mobile device hardware and software, set policy configuration and desired security levels, and remotely wipe Apple, Android, BlackBerry® and Windows® Mobile devices. The solution will have Apple and Android capabilities with BlackBerry, Microsoft® Exchange and Windows Mobile device capabilities to come in subsequent releases.

Pat Clawson

Supporting Resources

Scottsdale, Arizona Texas Florida Washington D.C. Ireland Luxembourg Singapore United Kingdom Australia

Secunia 2011 Year End Report


Kim Doyle

Ruth Jones


Speed Communications

480) 444-1229

+44 20 7842 3263

[email protected]

[email protected]

SOURCE Lumension

Leave a comment

seks shop - izolasyon
basic theory test book basic theory test