Absolute Software Top 6 Security Considerations in Migrating to Microsoft Windows 10 you access via the cloud. You can obtain realtime information about each device’s assets, status and location. You can also UPDATE IN PROGRESS define specific conditions and receive alerts so that you can respond immediately to any potential security risk or device incident. For example, if you were to detect a potential security risk during or after a migration to Windows 10, you could invoke commands such as data delete, device freeze, file retrieval or other remote security measures. If there is an unauthorized user on a particular device security actions can still be performed— regardless of any malicious attempts they may make to bypass the solution. C O N SIDER AT I O N N O . 3 : R I SK R ED U C T I O N Even with the enhanced security features of Windows 10, you want to be able to maximize protection on each endpoint to limit your vulnerabilities. Endpoints are particularly vulnerable to data breaches caused by internal incidents, such as malicious employees, theft, lost devices, negligence or human error. In fact, during a recent 12-month-period 67% of breaches were caused by internal incidents, according to a survey by Forrester Research.1 Persistence technology offers the highest level of protection against unauthorized or accidental attempts to remove the software agent, allowing you to track and secure devices regardless of the user or location. Because Persistence technology is embedded in the core and can maintain a connection to the device, you will never lose visibility during the migration from one OS version to another. And you can utilize the same level of protection on any new devices you provision or purchase with Windows 10. C O N SIDER AT I O N N O . 4 : C O MP L I A N CE By using Absolute you not only reduce the risk of a damaging breach, but you can also be more comprehensive, efficient and accurate in meeting regulatory compliance requirements. With a persistent endpoint security solution, you can more readily prove to auditors that IT compliance processes are being properly implemented and enforced before, during and after the migration to Windows 10. For example, if a device is lost, stolen or misplaced during the migration you can: ·· Provide proof that sensitive data was not accessed ·· Provide proof that data was securely deleted before it could be breached ·· Remotely freeze a device to revoke access to the corporate network, regardless of the location of the device ·· Provide chain-of-custody proof to show that data was secure when the device was lost or stolen ·· Remotely delete data from a device when it is decommissioned or transferred between users C O N SIDER AT I O N N O . 5 : C O MP L E X I T Y Migrating to a new OS is challenging for IT, with many aspects to manage. Because Persistence technology is built into the core, IT doesn’t need to deploy a new agent when migrating to a new OS. This is one less thing to worry about. Also, with the centralized visibility and control provided by Absolute, IT can simplify overall management of its endpoint security, while using a wide range of remote functions to enhance security without having to physically handle any devices. This remote connectivity to each device is available regardless of whether it is on or off the network, providing remote data retrieval and deletion no matter where the device is located. C O N SIDER AT I O N N O . 6 : C O N SI S T EN CY Because the same technology can be used across new Windows 10 endpoints along with all other endpoints—including tablets and smartphones, as well as non-Windows devices such as Mac OS X or Android—the organization benefits from a consistency of approach and security processes across all devices. With centralized visibility, control and management, the IT team can design alerts that can be implemented across all devices, or can be tailored to specific devices or users. This consistency of security processes and controls makes it much easier to protect data on mobile devices—while at the same time offering maximum security on new Windows 10 devices or existing devices that are migrating to the new OS version. Whitepaper | 3 TA K IN G T HE NE X T S T EP Moving to a new OS version can be an opportunity for an organization and its users to improve productivity by leveraging innovative new features and functions. But it is also a time of increased security risk if IT doesn’t have the right technology to control and monitor the migration with visibility into all endpoints at all times, regardless of their location. The migration to Windows 10 is particularly challenging because, as a free upgrade, users may feel they can undertake the process without corporate approval. In addition, the ubiquity of mobility in today’s era makes the organization more vulnerable during and after the migration, with IT needing to account for a far wider range of endpoints across a much broader and more unpredictable geographic area. As IT leaders evaluate how to achieve the highest levels of security during and after the migration, they will see clear benefits, including unprecedented visibility and control, while reducing risk, enhancing compliance preparedness, decreasing complexity and providing a platform for consistent security and management across all devices at all locations. Are you ready to take the next step in assuring the safest migration path to Windows 10? Here’s where to get started: absolute.com. FOOTNOTES Business Technographics Global Security Survey, 2014, Forrester Research, July 2014 1 © 2015 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. All other trademarks are property of their respective owners. ABT-NA-CS-TT-Microsoft-10-Security-Considerations-E-071315 Whitepaper | 4 Please complete the form to gain access to this content Email * First name * Last Name * Access Now
you access via the cloud. You can obtain realtime information about each device’s assets, status and location. You can also UPDATE IN PROGRESS define specific conditions and receive alerts so that you can respond immediately to any potential security risk or device incident. For example, if you were to detect a potential security risk during or after a migration to Windows 10, you could invoke commands such as data delete, device freeze, file retrieval or other remote security measures. If there is an unauthorized user on a particular device security actions can still be performed— regardless of any malicious attempts they may make to bypass the solution. C O N SIDER AT I O N N O . 3 : R I SK R ED U C T I O N Even with the enhanced security features of Windows 10, you want to be able to maximize protection on each endpoint to limit your vulnerabilities. Endpoints are particularly vulnerable to data breaches caused by internal incidents, such as malicious employees, theft, lost devices, negligence or human error. In fact, during a recent 12-month-period 67% of breaches were caused by internal incidents, according to a survey by Forrester Research.1 Persistence technology offers the highest level of protection against unauthorized or accidental attempts to remove the software agent, allowing you to track and secure devices regardless of the user or location. Because Persistence technology is embedded in the core and can maintain a connection to the device, you will never lose visibility during the migration from one OS version to another. And you can utilize the same level of protection on any new devices you provision or purchase with Windows 10. C O N SIDER AT I O N N O . 4 : C O MP L I A N CE By using Absolute you not only reduce the risk of a damaging breach, but you can also be more comprehensive, efficient and accurate in meeting regulatory compliance requirements. With a persistent endpoint security solution, you can more readily prove to auditors that IT compliance processes are being properly implemented and enforced before, during and after the migration to Windows 10. For example, if a device is lost, stolen or misplaced during the migration you can: ·· Provide proof that sensitive data was not accessed ·· Provide proof that data was securely deleted before it could be breached ·· Remotely freeze a device to revoke access to the corporate network, regardless of the location of the device ·· Provide chain-of-custody proof to show that data was secure when the device was lost or stolen ·· Remotely delete data from a device when it is decommissioned or transferred between users C O N SIDER AT I O N N O . 5 : C O MP L E X I T Y Migrating to a new OS is challenging for IT, with many aspects to manage. Because Persistence technology is built into the core, IT doesn’t need to deploy a new agent when migrating to a new OS. This is one less thing to worry about. Also, with the centralized visibility and control provided by Absolute, IT can simplify overall management of its endpoint security, while using a wide range of remote functions to enhance security without having to physically handle any devices. This remote connectivity to each device is available regardless of whether it is on or off the network, providing remote data retrieval and deletion no matter where the device is located. C O N SIDER AT I O N N O . 6 : C O N SI S T EN CY Because the same technology can be used across new Windows 10 endpoints along with all other endpoints—including tablets and smartphones, as well as non-Windows devices such as Mac OS X or Android—the organization benefits from a consistency of approach and security processes across all devices. With centralized visibility, control and management, the IT team can design alerts that can be implemented across all devices, or can be tailored to specific devices or users. This consistency of security processes and controls makes it much easier to protect data on mobile devices—while at the same time offering maximum security on new Windows 10 devices or existing devices that are migrating to the new OS version. Whitepaper | 3 TA K IN G T HE NE X T S T EP Moving to a new OS version can be an opportunity for an organization and its users to improve productivity by leveraging innovative new features and functions. But it is also a time of increased security risk if IT doesn’t have the right technology to control and monitor the migration with visibility into all endpoints at all times, regardless of their location. The migration to Windows 10 is particularly challenging because, as a free upgrade, users may feel they can undertake the process without corporate approval. In addition, the ubiquity of mobility in today’s era makes the organization more vulnerable during and after the migration, with IT needing to account for a far wider range of endpoints across a much broader and more unpredictable geographic area. As IT leaders evaluate how to achieve the highest levels of security during and after the migration, they will see clear benefits, including unprecedented visibility and control, while reducing risk, enhancing compliance preparedness, decreasing complexity and providing a platform for consistent security and management across all devices at all locations. Are you ready to take the next step in assuring the safest migration path to Windows 10? Here’s where to get started: absolute.com. FOOTNOTES Business Technographics Global Security Survey, 2014, Forrester Research, July 2014 1 © 2015 Absolute Software Corporation. All rights reserved. Absolute and Persistence are registered trademarks of Absolute Software Corporation. All other trademarks are property of their respective owners. ABT-NA-CS-TT-Microsoft-10-Security-Considerations-E-071315 Whitepaper | 4
Related Resources Absolute Software Forrester's Targeted-Attack Hierarchy Of Needs: As... Read more Absolute Software Best Practices for Healthcare Data Breach Preventi... Read more Absolute Software Top 10 Data Security Tips to Safeguard Your Busine... Read more Absolute Software The Cost of a Data Breach: Healthcare Settlements ... Read more Absolute Software The Enemy Within: Insiders are still the weakest l... Read more Load more
© 2024 Infotech Crowd. All rights reserved. Privacy Policy Cookies Policy Advertise with us Back to top