What is endpoint management?
...
Franklin OIT works in concert with EITS to provide security on our networks, and we have different roles but the same goal: To protect data available through the endpoints associated with our clients. EITS uses tools that monitor the network for bad-actors who have successfully attacked a computer on the network, and will inform Franklin OIT if the endpoint is in our area or range of the network. Repairing compromised devices after they are exploited is considered a reactive approach to maintaining endpoint security. EITS also proactively monitors the network for known vulnerabilities. This means that an endpoint may not have been compromised yet, but it is susceptible to attack because either the version of the operating system or version of an installed software package is vulnerable to attack. It's important to proactively patch, or update to a newer version of software when a vulnerability has been discoveredavailable to maintain a secure environment. Patching the vulnerability secures the endpoint and effectively remediates the threat.
Franklin OIT takes a proactive role in Endpoint Management. We use several tools which allow us to maintain an inventory of computer endpoints, along with installed software, to identify vulnerabilities and track our progress in patching them. We use tools that automatically update computer operating systems and application software to newer, more secure versions. If there is a particularly nefarious vulnerability, referred to as a zero-day, we can look at the inventory to see what endpoints are affected and target them for upgrades. This is why we use tools like ivanti Ivanti and JAMF to keep inventories of computers and installed software versions. These tools gather specific and limited information used to inform Franklin OIT's endpoint security strategy and allow us to rapidly respond to security threats by targeting affected endpoints in our inventory.
Collectively, ivanti Ivanti and JAMF are Endpoint Management Tools that help a large organization like the Franklin College of Arts and Sciences manage many thousands of endpoints. We talked about how these tools help us keep our devices secure through regular patching, but they also help us manage settings and preferences to assure compliance with the strict security requirements needed in an enterprise environment – onewhere many computers and associated devices share a common network. Although your computer may not contain sensitive or restricted data, if left unmanaged it could provide an entry point on the network to other systems that do have sensitive or restricted data.
...