ZENworks at the RSA Security Conference

Micro Focus Expert
Micro Focus Expert
1 0 2,163

ZENworks will be in attendance at the RSA Security Conference, located at North Expo #4508. Visitors are invited to discuss the impact of preventable malware and unified endpoint management solutions built for implementation.

Ransom and malware attacks devastated some of the largest brands in 2018. WannaCry lived up to its name, dishing out as much as $10 billion in damages. The costs per record lost are at all-time highs, and the threat is very real.

Once malicious software is in the network, it exploits existing vulnerabilities to spread and gain access to other networked devices and the sensitive data they contain. Attacks can cripple an entire enterprise.

The attacks that make headlines, and even those that don’t, are rarely zero-day exploits. In fact, Microsoft patched the vulnerability that allowed WannaCry to wreak havoc as far back as March of 2017. Yet the cost to enterprises was staggering.

How is this possible?

The answer is complex. Too many businesses lack the resources to effectively manage a network of devices at scale. The burden on IT is tremendous, and a single slip can compromise the entire network in an age where the Bring Your Own Device (BYOD) movement is growing. This logistical challenge is compounded by the balance of privacy and usability.

ZENworks provides Unified Endpoint Management built to solve these challenges. It is a single dashboard with full control. Here’s how it works.

ZENworks Patch Management

The first step toward solving the problem of exploits comes from automating patch management. Not simply automating deployment, but reviewing patches by OS and vendor. ZENworks handles collection, analysis, and delivery.

IT can easily identify non-compliant devices and take the necessary action. Additionally, patches are pre-tested to ensure they pose no immediate threat to your infrastructure.  

Endpoint Security Management

A policy-based and adaptive infrastructure provides a comprehensive solution to security. Administrators can use ZENworks as a centralized dashboard for micromanaging any device connected to the network. They can control how files can be moved, or what can be copied. Admins can also remotely control devices, with advanced controls available based on proximity, to remotely secure data.

Additionally, ZENworks allows IT to blacklist apps with application-level control. You can even disable apps based on proximity. Administrators can also block outgoing traffic to prevent a malicious app from propagating. Driver level protection ensures the most sensitive permissions are hidden behind layers of security, with policy-based backups of critical data for recovery as needed.

Data Encryption

Strong data encryption is required, both for employees and customers. ZENworks provides automated encryption through any access point, with remote functionality.

Potential compromises from physical theft of devices are a real concern, especially in the BYOD movement. A user’s device can contain sensitive corporate data that can be encrypted or wiped from a web-based console.

Balancing Privacy and Security

As BYOD grows, IT teams are left with the paradoxical balancing act of security, usability, and privacy. IT requires security, but users need privacy and usability to feel comfortable with a device. Especially when that device may be for personal use.

ZENworks helps IT administrators walk this fine line with several tools built around this challenge. Users commonly schedule meetings, read emails or take phone calls from a personal device. Administrators can run those sensitive applications within secure containers that provide access to the corporate network.

Visit ZENworks at RSA

ZENworks provides a unified solution that reduces the overhead that comes with configuration. Remote capabilities and powerful protections, both locally and in the cloud, make Unified Endpoint Management a popular choice for networks of scale.

Attendees at RSA are welcome to discuss Breach Defense solutions at our Micro Focus booth. We’re located at North Expo #4508.

Don’t forget to follow Micro Focus Security on Twitter for more updates and keep tabs on the Conference with the Hashtag “#RSAC”.

Thanks for reading!

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.