One of the biggest risks to enterprises is the remote user; especially the remote user who is on public Wi-Fi and never in the office. What’s interesting - is most of the folks never in the office are some of the highest performing sales, marketing and customer relationship managers your firm has. All of them are smart and all of them know enough about IT to be a danger to themselves and others.
They also, usually have a problematic relationship with IT and corporate rules in general. From the busy IT manager, or director and sometimes the CISO - who they have their personal cellphone – “a problem” can occur and even if not q true issue “the problem” frequently leave a breathless “I’m-just this-close-to-landing-a-maior-deal-and-I-need-to-update-my-Flash-player-and-I-can’t-because-I-am-locked-down, -call-me-back-Kay?” We all know someone like this who of course neglects their asset id and user id when hysterically leaving voice mail. The help desk is for “other” people.
If these folks are on sketchy public-Wi-Fi which is blocking SSL VPN and IPSEC tunnels your System Center Configuration Manager (SCCM) infrastructure cannot help you fix this “problem” which - woke the CISO up at 4:00AM. Unless you have some other remote management solution in place you are reduced to giving up admin passwords, and walking through a really non-technical person how to install the update; remotely over a poor-quality cell phone connection.
Mobility demands capability and the capability to help the “high performing problem” is sadly not found in the storied windows domain centric solution of Microsoft’s SCCM. What’s required is a solution to be able to deliver what is needed, when it’s needed no matter where it’s needed. This is the modern business challenge which “inside the network” tools can’t deliver. A global workforce requires a global solution to make the “problem” go away.
Contact Us Today
According to Zion Market Research, the global cyber security market was valued at $105.45 billion in 2015, is expected to reach $181.77 billion in 2021, and is anticipated to grow at a CAGR of 9.5% between 2016 and 2021. That said, if even one of the world’s technology conglomerates was equipped to provide a one-stop, foolproof security and compliance solution, we would not see statistics like this.Explore
The Smokey the Bear wildfire prevention campaign began in 1944 and its message of wildfire prevention remains as relevant and urgent today as it was in 1944. Just ask any American living in wildfire prone states. Smokey asserted in 1944, “Care Will Prevent 9 out of 10 Forest Fires." And although the message evolved it became very direct with, "Remember... Only YOU Can Prevent Forest Fires." Perhaps it’s time to unleash “Cyber Smokey” or perhaps a “Cy-key” (pronounced as “Psyhce”) with an equally direct message of, “Remember… YOU need to play your role to Prevent Data Breach.”Explore
An enterprise’s breach notification procedures and vulnerability management programs, and need for real-time malware detection and protection, have come under increasing scrutiny in light of the disclosures of the Equifax data breach. As a result of the failure of Equifax to address a software vulnerability in a timely manner, a series of events began which culminated in regulatory, criminal and state attorney general investigations.Explore
The modern-day CIO, CISO and senior management team members engaged in information security are faced with a daunting task. Chris Roberts (@Sidragon1) posted a description of the CISO role which seems accurate for many organizations: “Being a Chief Information Security Officer is easy. It’s like riding a bike. Except the bike is on fire, you’re on fire, everything is on fire and you’re in Hell.” WHY IS THE ROLE OF CISO SO CHALLENGING?Explore