" /> ZENworks Security

ZENworks Security

October 2019

ZENworks secures your endpoint devices from common vulnerabilities and protects the data that lives on those devices. To accomplish this, ZENworks provides a variety of security capabilities across multiple products.

1.0 Mitigating Software Vulnerabilities

Software vulnerabilities pose a constant threat to the security of an organization. Maintaining patch currency on devices is essential to reducing this threat. Even more critical, however, is being able to identify when a device is impacted by a software security vulnerability, or Common Vulnerability and Exposure (CVE), that has been reported by the NIST National Vulnerability Database and then being able to easily remediate the device.

ZENworks Patch Management lets you do both, providing policy-based capabilities to easily deploy patches to devices on a regular maintenance schedule as well as identifying, tracking, and remediating software security vulnerabilities through easy-to-use dashboards and remediation options.

To get started mitigating software vulnerabilities, go to the Security Getting Started page in ZENworks Control Center. The page includes instructions and videos to help you.

For additional information, refer to the following:

2.0 Encrypting Devices

Device theft and loss is an ever increasing reality with today’s mobile workforce. Ensuring that data on lost or stolen devices can’t be accessed by the wrong people is a must. ZENworks provides three different encryption options to protect your data: You can identify patches based on the CVE information and then remediate the vulnerable devices by applying the relevant patch remediation policy or bundle. The process by which ZENworks identifies these vulnerabilities is as follows:

  • Full Disk Encryption: Encrypts partitions on a fixed disk, either all partitions or selected partitions. Supports encryption of multiple fixed disks. Also includes optional pre-boot authentication to increase security. Provided by ZENworks Full Disk Encryption.

  • Removable Data Drive Encryption: Encrypts removable storage devices that enumerate as removable data drives in Windows. Uses native Microsoft Bitlocker as the encryption mechanism while providing additional ZENworks-only value such as encryption key management. Provided by ZENworks Endpoint Security Management.

  • Folder Encryption: Encrypts specific folders and files on fixed disks. Uses native Microsoft Encrypting File System (EFS) as the encryption mechanism while providing additional ZENworks-only value such policy-defined and user-defined encrypted folders, secondary authentication to access encrypted folders after Windows login, and administrator access to encrypted folders for recovery and security purposes. Provided by ZENworks Endpoint Security Management.

To get started encrypting the data on your devices, go to the Security Getting Started page in ZENworks Control Center. The page includes instructions and videos to help you.

For additional information, refer to the following:

3.0 Securing Devices

Most users tend to be fairly lax about security, preferring short or well-known passwords to more complex, secure passwords or accessing company data from a hotspot at the local coffee shop or airport.

ZENworks reduces security concerns by letting you control the security on Windows and mobile devices. One Windows devices, this includes capabilities such as controlling application execution, Wi-Fi access, removable drive storage access, VPN enforcement, and hardware access. On Mobile devices, this includes control of all security and device features exposed through the operating systems mobile device management (for example, iOS MDM or Android MDM).

To get started securing your devices, go to the Security Getting Started page in ZENworks Control Center. The page includes instructions and videos to help you.

For additional information, refer to the following:

4.0 Legal Notice

For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/.

© Copyright 2008 - 2019 Micro Focus or one of its affiliates.

The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice.