1.0 Getting Started

ZENworks Security provides a three-tiered approach to protect the managed devices in your enterprise by mitigating software vulnerabilities, encrypting device drives, and securing device features . By accessing Security in ZENworks Control Center, you have first level navigation access to take action on a variety of security related functions directly from the Getting Started pages. For more information about the capabilities launched from these pages, continue reading:

  • Mitigating Vulnerabilities. ZENworks helps you stay in front of emerging threats by tracking software vulnerabilities for devices through the use of Common Vulnerabilities and Exposures (CVE) data and then responding to those vulnerabilities by applying the appropriate patches. This enables you to establish regularly scheduled maintenance patching to ensure that your devices have the most recent security and quality updates.

    For information on how to get started with mitigating vulnerabilities using ZENworks, see Mitigating Vulnerabilities.

  • Encrypting Devices. Manage encryption of fixed disk volumes, fixed disk folders, and removable drives on devices in your environment by activating Full Disk Encryption and Endpoint Security and creating, configuring, and applying encryption-based policies.

    For information on how to get started with encrypting your manage devices, see Encrypting Devices.

  • Securing Devices. Secure Windows and mobile devices by creating, configuring, and applying policies to manage application, storage, communication hardware, and mobile device security in your environment.

    For information on how to get started with securing your manage devices, see Securing Devices.