Intelligent CISO Issue 02 | Page 86

To establish strong endpoint security and prevent unwanted attacks , IT teams must apply strict security policies on their endpoints . privacy needs to be maintained . Photos , contacts , and other personal data should not be managed by a company ’ s mobile device management app .

To establish strong endpoint security and prevent unwanted attacks , IT teams must apply strict security policies on their endpoints . privacy needs to be maintained . Photos , contacts , and other personal data should not be managed by a company ’ s mobile device management app .

On the other hand , security needs to be maintained , too . To that end , the IT team should create a container on the user ’ s personal device , a secure , managed area that isolates business email , CRM , and other enterprise apps and data from the rest of the user ’ s personal apps / data .
To establish strong endpoint security and prevent unwanted attacks , IT teams must apply strict security policies on their endpoints . Laptops , for instance , should always run a firewall , prevent the creation of unwanted network shares , and encrypt data via BitLocker or FileVault . Such security policies can protect enterprises from the security risks posed by mobility .
Predicting the development of data and endpoint management
Going forward , machine learning and AI will help make data and endpoint management a proactive , rather than a reactive process . For instance , these technologies could prevent data theft by detecting anomalies such as unusual login activities or an unusually large number of documents being uploaded to the cloud .
They could analyse the root cause of patch deployment failures and suggest fixes . They could also detect system idle times – during lunch hours , for instance – to deploy patches as soon as possible rather than wait until after hours or weekends , which can leave systems unnecessarily vulnerable .
Meanwhile , the Internet of things ( IoT ) will introduce many organisations to a new breed of endpoints and connected devices . Unlike their iOS and Android-powered predecessors , IoT devices will be running many different operating systems and applications , all of which may be vulnerable yet must be managed and secured .
Finally , most business applications are moving to the cloud and accessed via browser , effectively making the browser an endpoint . That means to defend against attacks , IT teams need to manage browsers and perform all security operations for them just as if they were desktops , laptops or any other device .
As organisations continue to adopt mobility and the cloud , they must also adopt the practices necessary to support this new reality . Data and endpoint security and management are priority one in IT departments . For the vast majority of companies around the world , their future success depends on recognising and committing to that priority . u
86
Issue 02 | www . intelligentciso . com