Graham Cluley Security News reported this week, CorrideThank you to the amazing team for your support!

You know that old thought experiment about AI designed to make paper clips?

Many security teams think similarly when it comes to achieving compliance goals. It would be a lot easier without all the pesky users.

This mindset has brought us to the current state of endpoint security dominated by MDMs that hamper device performance and turn every laptop into a big brother. This approach to security is bad for culture and morals. Moreover, it doesn’t really work. If so, companies with MDMs and annual security training will not experience data breaches.

Kolide is an endpoint security and fleet management solution that takes a different approach. We help our clients achieve their compliance goals by enlisting end-user support, whether they are auditors, clients or leadership.

Kolide works by notifying employees of security issues, educating them on why compliance is important, and giving them step-by-step instructions to fix the issue themselves.

By reaching out directly to employees and educating them on company policies, Kolide helps build a culture where everyone contributes to security.

For IT admins, Kolide helps prove compliance via a single dashboard. From there, you can monitor security across your fleet, whether it’s running on Mac, Windows, or Linux. (You read that right; Kolide can Finally, visibility into Linux users).

At a glance, you can see which employees are having issues such as having an encrypted disk, an up-to-date OS, a password manager installed, and more. And this data collection isn’t happening behind the scenes. End users can see exactly what data is being collected and why. User Privacy Center.

I read this far because I’m interested in approaches to endpoint security involving the end user. Click here for details on how it works. If you like one, you can sign up for a free trial. No credit card required.


If you’re interested in sponsoring my site for a week and reaching IT-savvy users interested in computer security, you can find out more here.


cropped-BTA_Logo-B-1-scaled-1
YOUR FUTURE STARTS HERE.

BLUE TRAINING ACADEMY

Register now for our membership to gain access to our elite training program and fast forward your career today!

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

cropped-BTA_Logo-B-1-scaled-1
Security Blog

Blue Training Academy

Blue Training Academy was developed in 2018 as a educational and training facility for continuing education and certification courses. Blue Training Academy is an educational institution that allows for all sectors of the public and Criminal Justice field to gain ongoing training and education.

Copyright ©️ All rights reserved. | Blue Training Academy Blog