Lenovo as a Security Specialist: The What and Why of ThinkShield

Lenovo as a Security Specialist: The What and Why of ThinkShield

Lenovo sees itself as the ideal security partner. The technology specialist works with specialized partners to offer companies a complete security strategy. It starts below the operating system and focuses on prevention rather than response.

“Lenovo ThinkShield is how Lenovo approaches cybersecurity.” Burke Stephenson, Cybersecurity Sales Manager at Lenovo, summarizes the purpose of ThinkShield in one sentence that even grandma will understand. In reality, ThinkShield is an umbrella, under which both solutions and a vision are sheltered.

Below the operating system

“ThinkShield provides security for customers, not only from the operating system to the cloud but also for everything that happens below the OS,” Stephenson clarifies. “The majority of cybersecurity solutions at the moment cover aspects from the OS to the cloud, but solutions are generally not active below the operating system.”

“If the customer wants, Lenovo can check what’s happening below the operating system, even before the device is turned on,” he continues. This specifically means that Lenovo builds security into the entire logistics production chain. “All components are sourced securely. We test and validate everything. With Build Assure, we can prove that all hardware and all firmware are securely integrated. Customers can then validate this upon delivery.”

The solution is reminiscent of the Intel Tiber Transparent Supply Chain, but goes beyond that. Stephenson emphasizes that their validation system also works with AMD laptops.

“Lenovo’s Build Assure and supply chain security are provided by Lenovo itself,” Burke further clarifies, “but detection and protection at the hardware level is done with the help of an external partner via ThinkShield Hardware Defense. The solution is powered by Sepio.”

As an independent software vendor, Sepio is hardware-agnostic and thus provides support for detecting all types of hardware within an enterprise, not just Lenovo laptops, but also other IT, OT, IoT, IIoT devices, devices without MAC or IP addresses, dormant devices, and more.

Seven layers

Stephenson refers to the Open Systems Interconnection (OSI) model of security, which distinguishes seven layers. Layer 1 is the physical layer, which Lenovo as a hardware manufacturer can help protect. Layer 7 is the top application layer. “We are positioned to provide security from layer 1 to layer 7,” he indicates.

We are positioned to provide security from layer 1 to layer 7

Burke Stephenson, Cybersecurity Sales Manager Lenovo

However, above the hardware layer, there are already many solutions. Lenovo does not have the ambition to compete there. Therefore, ThinkShield is complemented with solutions from various partners. “We partner with best of breed solutions,” says Stephenson. Lenovo has enlisted specialists in, among others, Unified Endpoint Management (UEM), Mobile Device Management (MDM), and Endpoint Detection and Response (EDR) that work from the OS, and handles layer 1 security itself together with Sepio.

This translates concretely into collaborations with, among others, SentinelOne, Absolute and Eclypsium, the aforementioned Sepio and Blancco. “ThinkShield Firmware Defense, powered by Eclypsium, is also vendor-independent. This solution provides complete detection of every component in any device, including critical network equipment, and also offers support for OT,” he adds.

Complete coverage

Lenovo’s intention with ThinkShield is to provide complete security with a focus on prevention. “Other parties strongly emphasize detection and response,” Stephenson believes. “While prevention, in our opinion, still remains the best strategy.” He calls it working left of bang, referring to an American book about the Marine Corps strategy that indicates it’s better to quickly intervene on bad intentions than to have to react afterwards to violent actions. Lenovo ThinkShield is built around this vision.

Lenovo wants to offer ThinkShield broadly. “All partners we collaborate with are vendor-agnostic,” Stephenson illustrates. “The layer 1 security is linked to our hardware, but we can integrate other aspects of security regardless of the devices the customer uses. Large customers often have multiple OEMs across their environment, and ThinkShield can handle that.”

read also

Lenovo strengthens ThinkShield with firmware protection

For example, Lenovo can create a root of trust within enterprises, which immediately detects shadow IT. “This way, we see dormant devices,” Stephenson continues, “or even spoofed devices. If someone connects a keyboard from another manufacturer that a hacker has tampered with to include a payload, we detect that. Threats don’t only come from malware; hardware that employees connect themselves can also cause serious damage. By immediately receiving a notification when such a suspicious device is connected, companies can intervene faster and prevent problems.”

Tailored for large and small

How Lenovo integrates ThinkShield depends on the customer. Stephenson: “We can, for example, conduct a risk assessment, investigate security gaps, and then work together to develop comprehensive security. We are well-versed in NIS2, DORA, and other regulations, and with ThinkShield, we can help enterprises comply with the rules.”

Therefore, one Lenovo ThinkShield implementation is not the same as another. A conversation with the customer is essential to ensure the solution works tailor-made. “We further have a multi-level approach, allowing us to support companies of various sizes. ThinkShield is relevant for businesses with 50 employees and companies with 50,000 employees.”

Commitment

More than just a product, Lenovo ThinkShield is a commitment. Lenovo is the world’s largest hardware manufacturer. With an offering of servers, laptops, and workstations, the manufacturer is excellently positioned to provide hardware security.

With ThinkShield, Lenovo takes on that responsibility, linking its self-built unique protection to an extensive partner ecosystem. This creates a single security solution that begins with hardware production and ends with applications in the cloud.


This is an editorial contribution, in collaboration with ITdaily partner Lenovo.