Endpoint security for people, not paper clips • Graham Cluley

Kolide - Endpoint security for people, not paperclips

Graham Cluley Security News is sponsored this week by the folks at Collide. Thanks to the amazing team there for their support!

You know the old thought experiment about the AI ​​designed to make paper clips that quickly decides that in order to maximize paper clips, it will have to get rid of all humans?

Many security teams have a similar idea when it comes to meeting compliance goals: it would be so much simpler if it weren’t for all those pesky users.

That way of thinking has brought us to the current state of endpoint security, which is dominated by MDMs that hamper device performance and turn every laptop into Big Brother. This approach to security is bad for culture and morale, and besides, it doesn’t actually work. If it did, then no company with an MDM and annual security training would have a data breach.

Kolide is an endpoint security and fleet management solution that takes a different approach. We help our clients achieve their compliance goals – whether for auditors, clients or management – ​​by sourcing end-user support.

Kolide works by notifying your employees of security issues, educating them on why compliance matters, and giving them step-by-step instructions to resolve issues themselves.

By reaching out directly to employees and educating them about company policies, Kolide can help you build a culture where everyone contributes to safety because everyone understands how and why to do it.

For IT administrators, Kolide helps you prove compliance through a single dashboard. From there, you can monitor the security of your entire fleet, whether they run on Mac, Windows or Linux. (You read that right; Kolide can finally give your Linux users visibility.)

At a glance, you can see which employees have their drives encrypted, OS updated and password manager installed, among a host of other issues. And this data collection doesn’t happen in the shadows; end users can see exactly what data is collected and why in the User Privacy Center.

If you’ve read this far, it’s because you’re intrigued by an approach to endpoint security that involves end users. Click here to learn more about how it works. If you like what you see, you can sign up for a free trial with no credit card required.

If you are interested in sponsoring my site for a week and reaching an IT-savvy audience that cares about computer security, you can find more information here.


Leave a Reply

Your email address will not be published. Required fields are marked *