Wednesday 29 January 2020

10 Ways Asset Intelligence Improves Cybersecurity Resiliency and Persistence

10 Ways Asset Intelligence Improves Cybersecurity Resiliency and Persistence

10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence
Bottom Line: By securing every endpoint with a persistent connection and the resiliency to autonomously self-heal, CIOs are finding new ways to further improve network security by capitalizing on each IT assets’ intelligence.
Capturing real-time data from IT assets is how every organization can grow beyond its existing boundaries with greater security, speed, and trust. Many IT and cybersecurity teams and the CIOs that lead them, and with whom I’ve spoken with, are energized by the opportunity to create secured perimeterless networks that can flex in real-time as their businesses grow. Having a persistent connection to every device across an organizations’ constantly changing perimeter provides invaluable data for achieving this goal. The real-time data provided by persistent device connections give IT and cybersecurity teams the Asset Intelligence they need for creating more resilient, self-healing endpoints as well.
Recommended For You Webcast, March 5th: How AI Can Find Opportunities and Shorten Your Sales CyclesRegister Now
How Asset Intelligence Drives Stronger Endpoint Security
Real-time, persistent connections to every device in a network is the foundation of a strong endpoint security strategy. It’s also essential for controlling device operating expenses (OPEX) across the broad base of device use cases every organization relies on to succeed. Long-term persistent connections drive down capital expenses (CAPEX) too, by extending the life of every device while providing perimeterless growth of the network. By combining device inventory and analysis, endpoint data compliance with the ability to manage a device fleet using universal asset management techniques, IT and cybersecurity teams are moving beyond Asset Management to Asset Intelligence. Advanced analytics, benchmarks, and audits are all possible across every endpoint today. The following are the 10 ways Asset Intelligence improves cybersecurity resiliency and persistence:
  • Track, trace and find lost or stolen devices on or off an organizations’ network in real-time, disabling the device if necessary. Every device, from laptops, tablets, and smartphones to desktops and specialized use devices are another threat surface that needs to be protected. Real-time persistent connections to each of these devices make track-and-trace possible, giving CIOs and their teams more control than had been possible before. Real-time track-and-trace data combined with device condition feedback closes security blind spots too. IT and cybersecurity teams can monitor every device and know the state of hardware, software, network and use patterns from dashboards. Of the endpoint providers in this market, Absolute’s approach to providing dashboards that provide real-time visibility and control of every device on a network is considered state-of-the-art. An example of Absolute’s dashboard is shown below:
  • 10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence
  • Asset Intelligence enables every endpoint to autonomously self-heal themselves and deliver constant persistence across an organization’s entire network. By capitalizing on the device, network, threat, and use data that defines Asset Intelligence, endpoint agents learn over time how to withstand breach attempts, user errors, and malicious attacks, and most importantly, how to return an endpoint device to its original safe state. Asset Intelligence is the future of endpoint security as it’s proving to be very effective at enabling self-healing persistence across enterprise networks.
  • Asset Intelligence solves the urgent problem created from having 10 or more agents installed on a single endpoint that collide, conflict and decay how secure the endpoint is. Absolute Software’s 2019 Endpoint Security Trends Report found that the more agents that are added to an endpoint, the greater the risk of a breach. Absolute also found that a typical device has ten or more endpoint security agents installed, often colliding and conflicting with the other. MITRE’s Cybersecurity research practice found there are on average, ten security agents on each device, and over 5,000 common vulnerabilities and exposures (CVEs) found on the top 20 client applications in 2018 alone.
  • Asset Intelligence sets the data foundation for achieving always-on persistence by tracking every devices’ unique attributes, identifiers, communication log history and more. Endpoint security platforms need a contextually-rich, real-time stream of data to know how and when to initialize the process of autonomously healing a given endpoint device. Asset Intelligence provides the centralized base of IT security controls needed for making endpoint persistence possible.
  • Having a real-time connection to every device on a perimeterless network contributes to creating a security cloud stack from the BIOS level that delivers persistence for every device. CIOs and CISOs interested in building secured perimeterless networks are focused on creating persistent, real-time connections to every device as a first step to creating a security cloud stack from each devices’ BIOS level. They’re saying that the greater the level of Asset Intelligence they can achieve, the broader they can roll out persistence-based endpoints across their networks that have the capacity to self-diagnose and self-heal.
  • Device fleets are churning 20% a year or more, increasing the urgency CIOs have for knowing where each device is and its current state, further underscoring Asset Intelligence’s value. Gavin Cockburn of ARUP is the global service lead for workplace automation and endpoint management, including how the firm acquires devices, manages and reclaims them. ARUP is using the Absolute Persistence platform for managing the many high-value laptops and remote devices their associates use on global projects. During a recent panel discussion he says that device replacements “becomes part of our budgeting process in that 33% of devices that we do replace every year, we know where they are.” Gavin is also using API calls to gain analytical data to measure how devices are being used, if the hard drive is encrypted or not and run Reach scripts to better encrypt a device if there is not enough security on them.
  • The more Asset Intelligence an organization has, the more they can predict and detect malware intrusion attempts, block them and restore any damage to any device on their perimeter. When there’s persistent endpoint protection across a perimeterless network, real-time data is enabling greater levels of Asset Intelligence which is invaluable in identifying, blocking and learning from malware attempts on any device on the network. Endpoint protection platforms that have persistence designed in are able to autonomously self-heal back to their original state after an attack, all without manual intervention.
  • Persistent endpoints open up the opportunity of defining geofencing for every device on a perimeterless network, further providing valuable data Asset Intelligence platforms capitalize on. Geofencing is proving to be a must-have for many organizations that have globally-based operations, as their IT and cybersecurity teams need to track the device location, usage, and compliance in real-time. Healthcare companies are especially focused on how Asset Intelligence can deliver geofencing at scale. Janet Hunt, Senior Director, IT User Support at Apria Healthcare recently commented during a recent panel discussion that “our geo-fencing is extremely tight. I have PCs that live in the Philippines. I have PCs that live in India. I have one PC or actually two PCs that live in Indonesia. If somebody goes from where they say that they’re going to be to another part of Indonesia, that device will freeze because that’s not where it’s supposed to be and that’s an automatic thing. Don’t ask forgiveness, don’t ask questions, freeze the device and see what happens. It’s one of the best things we’ve done for ourselves.” Gavin Cockburn says, “We actually do some kind of secretive work, government work and we have these secure rooms, dotted around the organization. So we know if we put a device in that room, what we do is, what we say is this device only works in this area and we can pinpoint that to a pretty decent accuracy.” From healthcare to secured government contracting, geofencing is a must-have in any persistent endpoint security strategy.
  • Automating customer and regulatory audits and improving compliance reporting by relying on Asset Intelligence alleviates time-consuming tasks for IT and cybersecurity teams. When persistent endpoint protection is operating across an organization’s network, audit and compliance data is captured in real-time and automatically fed into reporting systems and dashboards. CIOs and their cybersecurity teams are using dashboards to monitor every device’s usage patterns, audit access, and application activity, and check for compliance to security and reporting standards. Audits and compliance reporting are being automated today using PowerShell, BASH scripts and API-based universal asset commands. Gavin Cockburn of ARUP mentioned how his firm gives customers the assurance their data is safe by providing them ongoing audits while project engagements are ongoing. “We need to show for our clients that we look after their data and we can prove that. And we show that again and again. I mean similar story, we’ve seen machines go missing, either breaking into cars, re-image three times. We wipe it every time. Put the new hard drive in, think it might be a hard drive issue, it wipes again. We never see it come online again, “ he said.
  • Asset Intelligence improves data hygiene, which has a direct effect on how effective all IT systems are and the customer experiences they deliver. CIOs and their teams’ incentives center on how effective IT is at meeting internal information needs that impact customer experiences and outcomes. Improving data hygiene is essential for IT to keep achieving their incentive plans and earning bonuses. As Janet Hunt, Senior Director, IT User Support at Apria Healthcare said, “right now we are all about hygiene and what I mean by that is we want our data to be good. We want all the things that make IT a valued partner with the business operation to be able to be reliable.” The more effective any organization is at achieving and sustaining a high level of data hygiene, the more secure their perimeterless network strategies become.
  •  Author: Louis Columbus
    I'm serving as Director, Global Cloud Product Management at Ingram Cloud. Previous positions include product marketing at Plex Systems, senior analyst at AMR Research (now Gartner), marketing and business development at Cincom Systems, Ingram Micro, a SaaS start-up and at hardware companies. I am also a member of the Enterprise… View full profile ›

    The Secret To Get Anything You Want In Life

    Getty
    When was the last time you asked for something?  
    I mean, boldly and clearly asking for something you wanted.
    For most people, the concept of asking for what they want doesn’t even get put onto their mental to-do list.
    In my time consulting with business and entrepreneurs, the one common thread I have seen separate the amateurs from the pros is their ability to ask for what they want..So why do so few people actually do it?
    One thing’s for sure: you don’t get what you don’t ask for.
    The good news is, it’s totally possible to make your asks while maintaining your composure and worth. Here are 5 tips to help you ask for what you want and get everything you want in life.
    1. Ask someone who can actually give it to you.
    When it comes to networking and asking people for help, I can’t keep track of the times clients have said they “network” but when I find out who they are talking to, it is abundantly clear why they aren’t landing interviews. No matter how great your people skills are, if you are talking to the wrong people, you won’t ever get the right job.
    This one sounds obvious, but it’s not.
    2. Be clear in what you are asking for.
    There is nothing worse than someone saying, “I am not happy and need help,” but when asked what can be done to help them, they have no ideas or direction on their specific needs.  
    Start to focus on exactly what you are asking for.  If it is a new job, be clear on the exact function or type of job you want to do, what city you want it in and what industry would be ideal. People cannot help you if you are not clear. Like my grandma used to always tell me: a confused mind always says no.  
    When you can give someone a powerful visual of what you are looking for, it will help stick in their memory. The phenomenon of the pictorial superiority effect affirms that people tend to remember visuals over audible words. When talking to someone, create as much of a visual as possible. This means being specific in your ask.
    For example, if you are a consultant, and someone asks what kinds of business you are looking to work with, don’t answer, “Oh, I will work with anyone” ... This is a blank slate. Instead, get specific, for example: “I really thrive when working with medium-sized businesses that are in the finance industry.” 
    Suddenly, the person you’re talking to knows where to look, and who to talk to. 
    3. Be vulnerable.
    When it comes to support and trust in a person or a brand, 86% of people say authenticity matters. If you aren’t being authentic with your request, you aren’t going to get what you want.
    The truth is, authenticity requires a level of vulnerability and being open about your needs and wants. It is hard to be authentic when you consider how vulnerable it makes you, especially if someone responds to you with a “no.” 
    Remember, there’s a fine line between addressing an insecurity and shining a spotlight on a weakness. There’s a fine line between what’s personal and what’s private, and I recommend assessing within yourself: what feels personal and vulnerable? Alternatively, what feels private? Stepping into opening your heart and creating connections through personal stories and truth is a powerful career move.  
    4. Ask again.
    When it comes to making asks, realize that you don’t have to live in scarcity. You have every reason to be able to keep asking for what you want because remember: some of the greatest works of art were rejected before the artists were recognized for their magic. 
    Commit yourself to be persistent in the pursuit of what you want. Realize that creativity is actually the result of persistence. You will begin to find the connection between seemingly unrelated things. Your persistence will begin to show you avenues to get your “yes” that weren’t so easy to see in the beginning.  When it comes to success, persistence does play a contributing factor and research shows it even trumps talent. 
    I am not saying to spam a few contacts over and over with your request, but just because someone said no today, doesn’t mean they would still say no in a month, or a year. 
    On that note, never underestimate the power of a follow-up email. Take note to follow up with people who didn’t reply, as it’s a key leadership move not to take their silence as a rejection. Perhaps after you follow up, if you don’t hear back, it’s then time to simply ask someone else to support you in achieving what you want.
    5. Be gracious when you receive a no.
    Rejection once doesn’t mean rejection forever. And if it does, choose to respect the grace.  
    You don’t want to react with anger or aggression when someone turns down your request or doesn’t hire you. This will only burn more bridges for your future. You never know what led them to say no in the first place; perhaps it was out of their control.  
    Also realize that how you relate to someone’s “no” is one of the biggest determinants of your long term career success. It’s not personal, and it’s not a rejection. People simply offer up what they’re game to offer, and you can always relate to someone’s “no” or non-response as a permission slip for you to also say no sometimes. You’re human, and that means you cannot do everything… neither can the people you’re asking!
    Instead, thank them for their time and choose to view it as a learning lesson and opportunity to become better. Your response to rejection actually affects your health. People who have a “glass-half-full” attitude are less likely to have poor cardiovascular health, blood pressure and risk for viral infections. 
    I hear it all the time, a company says no, and the candidate replies with dignity and affirms their long term interest and the company ends up circling back around later to offer an opportunity.  
    Don’t be afraid to step into your voice and speak from your heart to get what you want. Trust me, you will be surprised by how many people are willing to help.
    Now get out there and go after what you want!

    Persistence will pave the way to realising your dream in Germany

    Sanjay Arora email your queries to careers@tribunemail.com
    Q. I have done my BSc Nursing and have three-year work experience in an Indian hospital. How can I get a nursing job in Germany? — Sudha Gupta
    A. You have to really beat the odds to get a job in Germany in this profession. If you are really determined and have a budget of around Rs2 to 3 lakh, you can do it.
    The first and foremost condition is to learn German language. You will need to obtain at least a B1 language certificate before you write your first job application. If you do it through the official Goethe institute, it would take at least 6 months and will cost you around Rs75,000.
    You need to have all of your credentials professionally translated in German. In addition, you will have to find job openings via portals like Monster.com, or use the Federal Labour Ministry’s website www.make-it-in-germany.com/en/jobs/job-listings/
    The next step is to apply. Please remember, if you can’t apply in German language, you obviously won’t be able to communicate in German once you’re on the job. Enclose your B1 (better B2) language certificate and your translated credentials along with your application.
    If you get an interview call, you will have to travel to your hospital for an interview. Unfortunately, video interviews for international applicants are still unheard of in German healthcare system. Many hospitals usually expect applicants to volunteer for one or two workdays alongside an experienced nurse in the department they have applied for.
    So, you will have to pay for your travel, although chances are, you’ll be offered to stay at the hospital’s nurses dorm or guest house. If this trial goes well, you will get a job contract.
    You can now sign your job contract and fly back to India and file for recognition of your degree at the German authority in charge in the state you’re going to work.
    This will be followed by a wait of 3 to 8 months. Only when your education is found to be equivalent to the German nursing education will you receive a work permit.
    The next step will be to apply for a work visa at the German Embassy. While you’re waiting, do relearn and upgrade your German.
    It is possible that your credentials are found to be only partially equivalent to German nursing education. Your employer will probably downgrade your job contract to “nursing assistant”. This will enable you to get a visa, go to Germany and work at your facility at a lower salary. Alongside, you will attend a vocational school to adapt your nursing education to German standards. A large number of our nurses in Germany have taken this route.
    After you get work visa, you can quit your job and move to Germany.
    The whole process from interview to the first work-day takes approximately 18 months in most of the cases.
    Please be aware that most of the agents/ consultants will charge you Rs5 to 10 lakh with no guarantee of a job and with the risk of being left high and dry after online German language training.
    From the above long process, you may think that one has to be lucky to be able to do it. However, the shortage of nurses in Germany is such that you may well be lucky. You need ruthless persistence for 18 months and it can change your life.
    — The expert is a Panchkula-based employability expert and Chief Mentor, Maven Career Coaching

    No comments:

    Post a Comment