Improving Security Through Layered Endpoint Management

Published Oct 18, 2018 1:59:00 PM in Tech News

Layered endpoint management can be the key to improving security measures. Learn how you can implement this strategy here. 


They say 2017 was the year of ransomware. In 2018, cybercriminals have shifted to cryptocurrency, installing mining malware onto corporate networks to passively accumulate cash. While ransomware was obvious, locking people out, crypto mining is difficult to notice. A recent survey found that 59% of organizations had been hit by a crypto attack, with Kaspersky Lab additionally sharing how one variant, PowerGhost, has effectively spread across corporate networks. While the variant may be new, PowerGhost works like most malware: exploiting out-of-date software and unpatched systems.

When you think about protecting data, consider the analogy of defending a castle from attack. You build thick walls, dig a moat, install a drawbridge; it seems well protected, but what if someone scales that wall from a boat, digs a tunnel, or crosses your bridge in a disguise? In each case, when one protection fails, the castle is vulnerable to attack.

When we think of securing data, every protection we apply is a single layer of defense. When that defense is permeated (unpatched systems, misused credentials), data is vulnerable. The best defense is layered: when multiple security controls are combined to protect data. In this case, when one layer is compromised, it is not an immediate breach - and ideally, it triggers an alarm. Layered security, also known as layered defense or defense in depth, is adapted from military strategy and includes the security tools, training, policy, and physical security measures that combine to provide a stronger defense against attack, even as those attacks evolve.

Layered security holds the greatest potential to meet these new threat variants, offering multiple layers of redundancy. The key to an effective layered security strategy is visibility: you need to know what your risks are and have a way to mitigate those risks. FileWave’s device management helps provide that visibility while additionally making critical security layers “stronger”:  

Visibility over devices, applications & settings

Many times, patches fail to deploy to all systems. Through network discovery, system admins can identify and remediate non-compliant systems to minimize risk and identify unknown devices that may be exposing your network to threats.

Identify unpatched vulnerabilities

The need to manage vulnerabilities for applications and operating systems across a complex device landscape is why unpatched devices are the top source of data breaches. FileWave provides the means to assess and remotely deploy patches to multiple platforms (Mac and Windows) with minimal network load and fewer end user disruptions.

Self-heal critical security layers

One of the first things most malware does is disable anti-malware solutions. In order to keep security layers where they belong and configured correctly, FileWave applies self-healing capabilities that automatically detect, repair, and reinstall missing or corrupted applications.

Research has proven that simply adding more layers does not lead to an increase in securityeffectiveness. In order to respond to rapidly shifting threats, best practices focus on visibility and fortified response capabilities. Best practices include adding in automated responses that help shore up your defenses with no human intervention required. FileWave helps strengthen your layered security strategy by identifying gaps in your security and ensuring your critical security layers remain effective, helping fortify them against attacks.

More From FileWave

Apple WWDC 19 Updates

Published 06-4-2019 in What's New

This year at WWDC 2019, Apple unveiled iOS 13, bringing a whole range of new features to the iPhone. Apple also previewed macOS Catalina and launched a new iPadOS.

FileWave Launches Version 13.1

Published 05-29-2019 in In the News

The endpoint management leader’s newest update features a Google collaboration for the new Android Enterprise API and supports Apple’s spring release

FileWave 13.1 Release

Published 05-29-2019 in Product Releases

FileWave 13.1 brings support for Google’s new Android Management API, functionality support for the latest Apple OS releases, and more.

Subscribe Here!

Upcoming Demos