Graham Cluley Security News reported this week, CorrideThank you to the amazing team for your support!
You know that old thought experiment about AI designed to make paper clips?
Many security teams think similarly when it comes to achieving compliance goals. It would be a lot easier without all the pesky users.
This mindset has brought us to the current state of endpoint security dominated by MDMs that hamper device performance and turn every laptop into a big brother. This approach to security is bad for culture and morals. Moreover, it doesn’t really work. If so, companies with MDMs and annual security training will not experience data breaches.
Kolide is an endpoint security and fleet management solution that takes a different approach. We help our clients achieve their compliance goals by enlisting end-user support, whether they are auditors, clients or leadership.
Kolide works by notifying employees of security issues, educating them on why compliance is important, and giving them step-by-step instructions to fix the issue themselves.
By reaching out directly to employees and educating them on company policies, Kolide helps build a culture where everyone contributes to security.
For IT admins, Kolide helps prove compliance via a single dashboard. From there, you can monitor security across your fleet, whether it’s running on Mac, Windows, or Linux. (You read that right; Kolide can Finally, visibility into Linux users).
At a glance, you can see which employees are having issues such as having an encrypted disk, an up-to-date OS, a password manager installed, and more. And this data collection isn’t happening behind the scenes. End users can see exactly what data is being collected and why. User Privacy Center.
I read this far because I’m interested in approaches to endpoint security involving the end user. Click here for details on how it works. If you like one, you can sign up for a free trial. No credit card required.
If you’re interested in sponsoring my site for a week and reaching IT-savvy users interested in computer security, you can find out more here.