Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
These applications or modules, use varying approaches to safeguard the endpoint. One may purchase any combination of these modules to best suit the enterprise's needs. LEMSS unifies the functions of IT operations and security through a single console, server and agent architecture to seamlessly address IT risk and systems management requirements across the enterprise. LEMSS delivers modularly licensed capabilities across anti-virus; patch, configuration and power management; application and device control; and asset management. The solution provides a 'defense-in-depth' approach to endpoint security, ensuring that systems are managed effectively from both an operational and security perspective.
The LEMSS server contains the following components: the Lumension Endpoint Management and Security Suite Application Server and the Lumension Endpoint Management and Security Suite Database Server. System requirements include Windows 2003, Web Edition/SP2, Windows 2008 R2, SQL Server 2005, Express/SP3/SQL Server 2008 R2, IIS 6.0, .NET Framework 3.5, MS internet Explorer 7 and Silverlight. Microsoft Silverlight is required during the installation and when accessing the Installation Manager. If one doesn't have an instance of SQL Server available, the software will load SQL Server 2008 R2, Express Edition. We cannot comment on the installation process as we evaluated this solution in the provider's cloud-based environment. From the documentation, it appears to be fairly straightforward.
Once installed, the LEMSS Agent scans the endpoint for inventory and uploads the scan results to the Lumension LEMSS server. The agent also supports snap-ins for the various Lumension LEMSS modules. By installing these agent modules, functionality can be expanded. The tool uses Windows Firewall and requires users to have file sharing and network discovery enabled so that the endpoints can be discovered by LEMMS. SSL is used for transmitting data between the LEMSS Server and LEMSS Agents.
The asset discovery capability was good and integrated with Active Directory to scan by IP range and import inventory lists from the asset management system. Also, there were multiple ways to get an endpoint in easily. We found the user interface a bit cumbersome to maneuver. It took some time and effort to get through the basic setup of users and policies.
Admins can create as many agent policy sets as desired, and then assign those policies to agents or groups to have all the modules available to configure in the policy based on what has been licensed.
Lumension offers eight-hours-a-day/five-days-a-week standard support included with a subscription or with an active maintenance agreement of all Lumension-licensed products. Premium Support offers all the benefits of standard, plus 24/7 access to experienced, senior-level support engineers, as well as free training at $4.50/node/year. Documentation is plentiful.
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.