Posts tagged with "UEM"



How ISEC7 Addresses Government Endpoint Protection Needs
30. October 2023
Whether your organization's digital workplace and/or mobile enterprise supports federal field operators in high-risk locations, tactical warfighters, CSfC deployments or internal data administration, ISEC7 can support your unique requirements within a government setting. Zero Trust Endpoint Protection As executive orders push the government towards a Zero Trust architecture strategy, ISEC7 can help government agencies deploy a Zero Trust security strategy, incorporate Zero Trust elements into...

New iOS 17 and watchOS 10 Enterprise Features: Everything You Need to Know
Blog | Endpoint Protection · 12. September 2023
At their latest Worldwide Developer Conference (WWDC) this past summer, Apple announced several new features in their soon-to-be-released iOS 17 and watchOS 10, noting an emphasis on communication changes and on-device intelligence. For this blog post, we will focus on the new enterprise features, allowing easier and more advanced management of end-user devices while simultaneously improving the end-user experience and privacy. UEM vendors are currently working on integrating all new enterprise...

Public Security Announcement: Ivanti EPMM Vulnerabilities
Blog | Endpoint Management · 08. August 2023
Two critical vulnerabilities were discovered last week, affecting Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. EPMM is a Mobile Device Management (MDM) and Unified Endpoint Management (UEM) solution offered by Ivanti to help organizations manage and secure mobile devices, such as smartphones and tablets, as well as other endpoints like computers and servers, from a centralized platform.

Solution Highlight: How ISEC7 Can Help with Your ZTA Deployment
Blog | Endpoint Protection · 30. May 2023
The concept of Zero Trust Architecture (ZTA) promotes a security approach that assumes no implicit trust in any user or device, regardless of its location or network context. Lately, we explained why every organization should have a cybersecurity strategy in place, using a 7-pillars approach to categorize all the different layers, modules, and functionalities that such a strategy can possibly include. Today, we will discuss how ISEC7, your Managed Security Service Provider (MSSP), can help your...

Demystifying Cybersecurity: Zero Trust Architecture in a Nutshell
Blog | Endpoint Protection · 08. May 2023
Nowadays most employees are provided with the ability to work remotely and access their work data and services from virtually any location, on any device, and at any time. While this may be an improvement in terms of offering employees more of a work-life balance, employees still have one *little* thing to worry about: SECURITY. Easier access to more services from more devices and locations translates into an exponentially increased surface of attack, so a comprehensive security strategy must...

How ISEC7 Addresses Government Endpoint Protection Needs
Blog | Endpoint Protection · 18. April 2023
Whether your organization's digital workplace and/or mobile enterprise supports federal field operators in high-risk locations, tactical warfighters, CSfC deployments or internal data administration, ISEC7 can support your unique requirements within a government setting. Zero Trust Endpoint Protection As executive orders push the government towards a Zero Trust architecture strategy, ISEC7 can help government agencies deploy a Zero Trust security strategy, incorporate Zero Trust elements into...

2022: The Year in Review & Looking Forward to 2023
13. December 2022
Coming out of 2021, a year that was spent entirely in a global pandemic, 2022 was expected to be the year of rebuilding and returning to “normalcy” in some way. However, 2022 saw the outbreak of a war between Russia and Ukraine in addition to households across the world being directly impacted by inflation and recession. As a result, many were forced to do “more with less” to cope with these struggles. This applies to organizations, which have had to work around inflation while still...

Considerations When Moving to the Cloud
30. November 2022
In the past few years, with the rise of mobile devices and the need to access all services from anywhere on any type of device, organizations have been leveraging cloud providers to host more and more services, seeking to optimize both cost and availability. It seems like the obvious way forward for most organizations is to partially move to the cloud while maintaining their current on-premises infrastructure (a hybrid environment), or to move to the cloud completely. Moving to the cloud has...

Public Security Announcement: Microsoft Teams Vulnerabilities
Blog | Endpoint Protection · 01. November 2022
This week we highlight Microsoft Teams vulnerabilities and advise how you can protect and secure your infrastructure. Click to learn more.

Lessons Learned from a System Major Hack
Blog | Endpoint Protection · 18. October 2022
How Can We Prevent This? Once we understand what happened and how, it is now time to learn from it and build a plan to remedy it and ensure such scenarios cannot happen in the future. You know the saying, “Fool me once...” However, in this case, we know that this very company was allegedly hacked a couple of years ago and ended up paying a ransom to the hacker to delete the stolen data and “keep it quiet”; but based on what occurred, it looks like they did not learn from this and still...

Show more