Lumension takes wraps off new enterprise security product
LEMSS 7.3 promises to protect against more pernicious attacks, such as RMI, says vendor.


Endpoint security company Lumension has unveiled the latest version of its Lumension Endpoint Management and Security Suite (LEMSS), which offer enterprises enhanced protection against advanced persistent threats (APTs).
The company is particularly keen to emphasise LEMSS 7.3's ability to protect against reflective memory injections (RMIs) that it claims can be virtually impossible to detect or remove.
MDM is moving very quickly with BYOD initiatives and what people require seems to be changing almost weekly.
Alan Bentley, SVP worldwide at Lumension, told IT Pro: "These types of attack compromise legitimate applications through their memory.
"The difficulty with memory-based threats is, if it is not doing anything through the OS, is not using OS functions or is not writing anything to disk, it will go undetected by traditional antivirus."
Bentley explained that anything sat in the memory, such as an RMI, can be got rid of by rebooting the affected machine, it is often too late by then, as the code from the RMI has been used to compromise the target application with malicious code.
While this is not a method of malware infection that is seen very often, Bentley believes it is something that is going to increase in popularity among the cyber criminal community.
The organisation also intends to introduce new mobile device management (MDM) functionality to LEMSS, although that is not included in the current 7.3 release.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"This whole MDM space is moving very quickly with the bring your own device (BYOD) initiatives and what people require seems to be changing almost weekly. So we decided to start where we knew our customers wanted to go," said Bentley.
"We talked to a number of our customers and asked if we were to bring in on platform MDM, what that would need to look like and have decided to build it up ourselves. Just like the rest of LEMSS, it is about giving visibility to administrators and assigning different policies and protections according to device type, ownership and so on," he concluded.
LEMSS with MDM capability is expected to be available in the latter half of the year.

Jane McCallion is Managing Editor of ITPro and ChannelPro, specializing in data centers, enterprise IT infrastructure, and cybersecurity. Before becoming Managing Editor, she held the role of Deputy Editor and, prior to that, Features Editor, managing a pool of freelance and internal writers, while continuing to specialize in enterprise IT infrastructure, and business strategy.
Prior to joining ITPro, Jane was a freelance business journalist writing as both Jane McCallion and Jane Bordenave for titles such as European CEO, World Finance, and Business Excellence Magazine.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
The big book of selling data protection
Whitepaper Agile risk management starts with a common language
By ITPro Published
-
Detection is not enough: Exposed assets require rapid mitigation to reduce and eliminate risk
Whitepaper Agile risk management starts with a common language
By ITPro Published
-
Modern enterprise cybersecurity
whitepaper Cultivating resilience with reduced detection and response times
By ITPro Published
-
IDC InfoBrief: How CIOs can achieve the promised benefits of sustainability
whitepaper CIOs are facing two conflicting strategic imperatives
By ITPro Published
-
Security operations use case guide
Whitepaper Improve your cyber resilience and vulnerability management while speeding up response times
By ITPro Last updated
-
Creating a proactive, risk-aware defense to thrive in today’s dynamic risk environment
Whitepaper Agile risk management starts with a common language
By ITPro Last updated
-
Turn banking technology risks into business advantages
Whitepaper Five proven practices to make it happen
By ITPro Published
-
Take your business further with a dedicated internet connection
whitepaper Achieve internet speed and reliability to match your business ambitions
By ITPro Published