Cool Solutions

Breach Defense with Unified Endpoint Management

Gil Cattelain

By:

February 6, 2019 9:04 am

Reads:289

Comments:0

Score:Unrated

Print/PDF

An IBM-funded study in 2018, conducted by Ponemon, revealed the cost of a data breach. With costs per record rising by 4.8 percent to $148, data breaches on average cost companies $3.86 million. These are average costs for a low number of records lost, but larger breaches carry much larger costs.

The study also uncovered some hidden costs to breaches. For example, up to one-third of the cost of a breach could include lost business and trust that can take time to rebuild. Technical investigations, public notifications, potential data recovery, and a host of legal and regulatory costs add to the total, making the per-record cost estimation $148.

You don’t need to look far for an example. Marriott Starwood’s reservation system had been compromised as far back as 2014. In a press release in late November 2018, the company announced personal data for some 500 million guests were exposed. Names, phone numbers, email addresses, passport numbers, dates of birth, credit card numbers, and itineraries were all potentially compromised.

Avast also released a study finding millions of computers open to vulnerabilities from at least one app that is out of date. The message is clear: companies must avoid high cost security breaches and remain compliant. If they don’t have the solutions and tools in place, they also risk losing their customers and partners.

Breach Defense with Unified Endpoint Management begins with considering the following solutions:

Automated Patching

The Avast study shows us that, in 2019 terms, choosing not to update is a vulnerability. Compliance and follow through ensure airtight security even at scale. At a glance, breach defense enables teams to identify and assess vulnerabilities. Micro Focus ZENworks offers reduced overhead for patch management with a speed up test and deployment phase.

Teams that can respond to a problem within days save significant costs in the event of a breach. To assist in this endeavor, ZENworks offers pre-tested patches for both Windows and Linux, deployable from a single console.

Endpoint Security

A policy-based approach simplifies complex networks but requires a careful balance of usability, security, and self-service. Managing a platform of a certain magnitude requires strict compliance management.

End-user interaction is a common breach point, so breach defense incorporates protection for USB drives, downloadable files, mobile devices, and other common vectors for attack.

That starts with driver-level protection, where administrators can restrict access to parts of the system with some of the highest level privileges. Removable storage policies and data encryption protect the endpoint and govern when and how devices can be used. Administrators can designate files that can or cannot be copied, log usage of a specific device, or enable password protection and other precautions.

With sensitive data stored in the cloud and locally accessible, administrators can create a privilege-based network and manage their resources effectively.

Encryption

Automated protection for end-user devices provides enhanced security through any access point. When coupled with remote management, there are a greater number of tools to manage potential compromises that can occur from physical theft.

Remote management is a major factor in breach defense. Upon detection, administrators should have the capability to remotely encrypt a device (preferably through a web-based console).

Management also requires attention to overhead costs, like configuration. A unified and consistent web interface ensures efficiency. Administrators and operations can’t waste time hunting for basic functionality.

Mobile Security

The growth of the Bring Your Own (BYO) movement requires a solution that secures with respect to privacy and freedom of device usage. With ZENworks, administrators and workers have secure access to the data they need with remote capabilities set up in defense.

Mobile email, for example, works within secure containers that enable access to corporate accounts. These containers also hold contact lists, which include both employee and customer data.

Scheduling and management capabilities empower employees in the field with cloud-based scheduling for meetings, appointments, and the attachments they need to review beforehand.

Breach Defense with ZENworks

Security is a prime concern for any company safeguarding sensitive data, and the costs of getting it wrong are staggering. The balance between security and usability can also help or hinder internal efforts.

ZENworks provides a unified solution that reduces the effort with remote capabilities and powerful protections both locally and in the cloud. Unified Endpoint Management remains a popular choice for breach defense.

Thanks for reading!

Get free email alerts on the topics of this article:

Endpoint Managment
Get Alerts!

Your subscription request was successful.

0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this post.
Loading...

Tags: , , , , , , ,
Categories: Expert Views, General, PR Blog, Unified Endpoint Management, ZENworks

0

Comment

RSS