Protect your organization’s devices using the E-Visor Teams App and Microsoft EndPoint protection technologies.
Hello again, everyone!
Today I am super excited to share with you some significant improvements that will show up in the next GA release of our E-Visor Teams App:
An end-to-end view of the health of users’ devices from the cyber security perspective, without those users needing to be an expert or an IT Admin to be able to see how secure the devices they are using are. This update to our app comes as part of the promise we have to all our existing customers who are embracing this new hybrid work reality, dealing with people working from anywhere and from devices beyond their corporate ones to access corporate information, SaaS, and other resources.
Overview – Simplicity is the key to get quick results
Before jumping into our solution discussion, let me mention a fundamental aspect we are looking to solve in a practical manner: the constant dilemma that some “Cyber Experts” are struggling with: The CyberSecurity Dilemma not helping our Zero Trust Efforts – Simplicity is key
It is funny to see how many non-technical people, and even some technical people, see a HUGE mountain to climb when talking about CyberSecurity, Zero Trust, Defense in Depth, and the never ending list of acronyms used (SSO, SAML, EDR, AV, AS, MDM, MAM, Reverse Proxy, CASB, SIEM etc. etc.).
Organizations are providing all kinds of technologies to protect customers; however, that does not guarantee a successful landing of your awareness campaigns, but why?
Users can easily get overloaded by information: Do not expect people will know things to the same level you do and, do not get me wrong, we all are learning about new risks and techniques used by attackers continuously.
The question is how to simplify and provide a key message so non-technical people can get just what they need to know and what need to see. Hopefully this info is available in just one click in a summarized way that can drive auto-resolution and fewer (or shorter) calls to your help desk and additional support tiers in your organization.
When talking to people about zero trust at Synergy, we want to keep it SIMPLE for everyone (yes, even the IT/Cyber experts):
End user simplicity!
I should know from a quick review, without training or a technical dictionary, if my devices are at risk or not. It’s as simple as that; all that info should be in a centralized location to get guidance for things that can drive self-service.
- No need for multiple links, applications, or technologies! Users need simplicity, just a scorecard and some info to take corresponding actions
Administrator simplicity BUT comprehensive!
IT support should not have to open multiple management consoles to review logging and alerts, end-user device status, and more. The quick “go to place” should also be provided to them so they can effectively assist users while saving time and resources.
- Let me be straight on this: most of the IT management consoles are great for broad goals, such as to create rules that reveal high level insights. Typically, they lack the necessary diagnostics and cyber inspection with insights across multiple technologies as they work in silos. Even reporting from solutions across the same provider are moving really slowly towards a centralized view. Furthermore, not all organizations and teams may have such analytics capabilities available, so:
Let’s see how the E-Visor Teams app can help the entire organization deal with these challenges!
My Devices – E-Visor Teams App
- Understand, and able to identify, actionable insights that can optimize your devices’ security posture
- All of this using a multi-layer/technologies approach
- See what kind of benefits this will offer to you
Simplified “one pane of glass” to see end-to-end cyber security health of devices in Teams:
SummaryOperating Systems Get to know the supportability status and more for your W10 devices and beyond
- Device protection 101 If your device is not patched, you are vulnerable. Regardless of how many apps you have on top of the operating system, there is a limit to the protection that can be offered and probably a significant list of capabilities that cannot be fully leveraged.
* Note that “compliant” here reflects if the technical configuration of the device is aligned with the technical compliance policies set by your organizationAdvanced Threat Protection Status Sophisticated attacks are on the rise and, to combat this, there are new technologies to review suspicious activities happening in the devices, even if they are not “seen” by the human eye at first. If you own, for instance, Microsoft Defender for EndPoint (MDE), you can mitigate those attacks and make IT aware of those risks. We, of course, also help provide information related to activity on your devices.
DetailsThe following picture shows the all new “My Devices” section. Notice that you can filter using the boxes on top to narrow in on devices by platform, health state, and more.
Operating System Information
Get to know general information about devices that have been used with your user account to access corporate resources:
Corporate Device vs Personal Device Configuration
Depending on device configuration, see if your devices have been configured as corporate managed or personal devices. This validation has drastic implications about what kind of corporate resources you have access to and if the user experience can be simplified with less authentication prompts when accessing applications:
Corporate Compliance Status
Organizations can define a security configuration baseline and define when a device can be used to access corporate resources. The terms used in this evaluation are “Compliance” or “Compliant device”. The criteria set by your organization at the technical configuration level will define if the device is compliant or not.
Corporate Advanced Protection Status
Beyond defining what is “good” or “acceptable”, organizations have to be prepared to assume they have been attacked and should have the correct resources to effectively protect, detect, and respond to cyber-attacks. For that, we are pleased to share this new E-Visor Teams app integration with Microsoft Defender for EndPoint (MDE)
The great part of being able to see this in our app is that if you are concerned about a potentially impacted device and you received instructions to keep it offline, you can see your application virtually from every client that supports Microsoft Teams; even the Teams client from a browser can show these capabilities.
In this blog, we presented several of the E-Visor Teams App capabilities that provide an end-to-end #ZeroTrust view of device states along different workloads:
- Microsoft provides a comprehensive set of technologies to protect your devices:
- Windows 10 updates
- AAD device management benefits
- Intune compliance policies
- MDE advanced threat protection
- Give both your users and Cyber Team the support and information they need, with a simplified view of all that activity
Once again, consider the E-Visor Teams App your journey partner. Wherever you are at in your device protection strategy adoption and strategy, Let’s do it together!
Before closing for today, do not miss our next blog post around simplified identity and access management for access to applications using AAD Identity Governance access with the E-Visor Teams App