Improving Security Through Layered Endpoint Management

Published Oct 18, 2018 1:59:00 PM in Tech News

Layered endpoint management can be the key to improving security measures. Learn how you can implement this strategy here. They say 2017 was the year of ransomware. In 2018, cybercriminals have shifted to cryptocurrency, installing mining malware onto corporate networks to passively accumulate cash. While ransomware was obvious, locking people out, crypto mining is difficult to notice. A recent survey found that 59% of organizations had been hit by a crypto attack, with Kaspersky Lab additionally sharing how one variant, PowerGhost, has effectively spread across corporate networks. While the variant may be new, PowerGhost works like most malware: exploiting out-of-date software and unpatched systems.

When you think about protecting data, consider the analogy of defending a castle from attack. You build thick walls, dig a moat, install a drawbridge; it seems well protected, but what if someone scales that wall from a boat, digs a tunnel, or crosses your bridge in a disguise? In each case, when one protection fails, the castle is vulnerable to attack.

When we think of securing data, every protection we apply is a single layer of defense. When that defense is permeated (unpatched systems, misused credentials), data is vulnerable. The best defense is layered: when multiple security controls are combined to protect data. In this case, when one layer is compromised, it is not an immediate breach - and ideally, it triggers an alarm. Layered security, also known as layered defense or defense in depth, is adapted from military strategy and includes the security tools, training, policy, and physical security measures that combine to provide a stronger defense against attack, even as those attacks evolve.

Layered security holds the greatest potential to meet these new threat variants, offering multiple layers of redundancy. The key to an effective layered security strategy is visibility: you need to know what your risks are and have a way to mitigate those risks. FileWave’s device management helps provide that visibility while additionally making critical security layers “stronger”:  

Visibility over devices, applications & settings

Many times, patches fail to deploy to all systems. Through network discovery, system admins can identify and remediate non-compliant systems to minimize risk and identify unknown devices that may be exposing your network to threats.

Identify unpatched vulnerabilities

The need to manage vulnerabilities for applications and operating systems across a complex device landscape is why unpatched devices are the top source of data breaches. FileWave provides the means to assess and remotely deploy patches to multiple platforms (Mac and Windows) with minimal network load and fewer end user disruptions.

Self-heal critical security layers

One of the first things most malware does is disable anti-malware solutions. In order to keep security layers where they belong and configured correctly, FileWave applies self-healing capabilities that automatically detect, repair, and reinstall missing or corrupted applications.

Research has proven that simply adding more layers does not lead to an increase in securityeffectiveness. In order to respond to rapidly shifting threats, best practices focus on visibility and fortified response capabilities. Best practices include adding in automated responses that help shore up your defenses with no human intervention required. FileWave helps strengthen your layered security strategy by identifying gaps in your security and ensuring your critical security layers remain effective, helping fortify them against attacks.

More From FileWave

6 IT Security Best Practices for 2019

Published 12-11-2018 in Tech News

Learn more about best practices in IT security. 

3-Step Guide to K-12 Device Management for Winter Holidays

Published 12-4-2018 in Tech News

See how to take advantage of K-12 winter breaks for better endpoint management.

Managing the Total Cost of Enterprise Devices Through Effective Endpoint Management

Published 11-27-2018 in Tech News

Learn how to reduce the total cost of enterprise devices. 

Subscribe Here!

Upcoming Demos