Endpoint management

Endpoint management
Outsourcing Trends Post-PandemicOutsourcing Trends Post-Pandemic

At a time when IT staff must do more with less, 100 leaders share whether outsourcing IT management is becoming a higher priority this year.

If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it.  The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world.  What do others think ?  How could this impact your organization ?   Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge

Top Answer : The message here is: one is never out of the woods ever, so pay attention! Just because today's news eclipses yesterday's doesn't mean companies get to shove the bad under the rug and stay silent. Remember, vulnerabilities discovered 10-15 years back are still at the top of the list of the most exploited.

Is endpoint security for mobile devices more difficult than it is for laptops?

Top Answer : I think mobile devices were better designed from the beginning as opposed to desktop operating systems. Mobile started way ahead of where desktops started. But the fact that the mobile device management (MDM) products existed at all shows a glaring problem with the way that SaaS companies thought about mobile applications. The way that SaaS companies should have approached mobile applications and data protection from the beginning is to let you set the policies in their app, and then the app will make sure things aren't cached and there's no copy of your data roaming around. You would do it centralized as opposed to using some janky tool that lived as you manage your fleet. Then there are laws passed on whether or not you have to reimburse somebody for their phone. No small start-up wants to reimburse people for their phones or have a clear DoD policy when they start out because there are costs involved. It's a huge pain point, but at least it's not as bad as laptops in my opinion.

7 views
1 comments
1 upvotes
Related Tags
Mobile MaturityMobile Maturity

This report helps IT organizations understand the rate of growth in mobile enterprise management.

What are your thoughts on SaaS management platforms (SMP)?

Top Answer :

37 views
0 comments
3 upvotes
Related Tags
Business Application Development
Architecture & Strategy
Maintenance
Requirements & Design
Testing, Deployment & QA
Mobile Development
Development
Selection & Implementation
Business Analysis
Applications Vendor Landscapes
Optimization
Backup
Data Center
Public and Hybrid Cloud
Telephony
Network
Compute
Storage
Business Applications
Cloud
Crisis Management
Data & Business Intelligence
Artificial Intelligence
Business Intelligence Strategy
Data Management
Enterprise Integration
Integrations
Machine Learning
Governance
Data Lake
Big Data
Data Warehouse
Disruptive & Emerging Technologies
5G
Blockchain
Cryptocurrencies
Virtual Reality
IoT
Reality
Digital Innovation
Bots
Augmented Reality
End-User Services & Collaboration
Collaboration solutions
End User Equipment
End-User Computing Devices
Endpoint management
Productivity tools
Document Management
End-User Computing Applications
End-User Computing Strategy
Mobile
Voice & Video Management
Continuous Integration
Technical Product Management
DevOps
Continuous Deployment
Development
Quality Assurance
Customer Relationship Management
Enterprise Content Management
Customer Success
Enterprise Information Management
Finance
Enterprise Resource Planning
HR
Legal
Marketing Solutions
Retail
Human Resource Systems
Marketing
Product Recommendation
Sales
Risk Management
GDPR
SOX Compliance
Governance, Risk & Compliance
Infrastructure & Operations
Cloud Strategy
I&O Finance & Budgeting
Operations Management
Network Management
DR and Business Continuity
Server Optimization
Leadership
Attract & Select
Cost & Budget Management
Engage
Culture
Manage Business Relationships
Innovation
Organizational Design
Program & Project Management
Train & Develop
Values
Talent management
Performance Measurement
Organization Structure
Manage & Coach
Availability Management
Financial and Vendor Management
Reporting
Service Desk
Management Tools
Enterprise Service Management
People & Process
Process Management
Asset Management
Project & Portfolio Management
Portfolio Management
Project Management Office
Pulse
Security
Confidentiality, Integrity, Availability
Secure Cloud & Network Architecture
Endpoint Security
Data Privacy
Identity and Access Management
Security Operations Center
Security Strategy & Budgeting
Security Vendor Landscapes
Threat Intelligence & Incident Response
Threat & Vulnerability Management
Vendor Management
Infrastructure Vendor Landscapes
Budgeting
Roadmap
Outsourcing
Strategy & Operating Model
Business Continuity
Architecture Domains
Strategy
Tool Recommendation
hi, does anyone have a policy around BYOD mobile devices and blacklist apps? if so, how well do your users respond to it.? Our challenge is that we have a number of apps we'd like to blacklist, and concerned they will revolt

Top Answer : Will they really revolt? Or just complain?   If they are corporate issued devices, you own them and dictate how they can be used.   If it is their devices, they can only access data and/or apps since you allow it.   Ultimately, it comes down to educating them about the risks, and management understanding how they are going to deal with these risks.   In regulated industries (finance, banking, healthcare, government, etc.) they understand that there are limits with BYOD.

28 views
4 comments
2 upvotes
Related Tags
How has GDPR and CCPA changed your use or procurement cybersecurity tools?

Top Answer : Not much directly but in some situations avoiding an agent, a plugin, or something that requires a cookie will mitigate privacy risks.  Many security technologies in how they are architected, deployed, and how the vendor gathers and shares information actually is generating a substantial amount of privacy risk