About the Author

Michael Dortch

Ransomware and Cybersecurity: Where You Stand Depends on Where You Sit

Optical illusion created by clay columns forming shapes of two ladies talkingDo you see two facing profiles or three clay columns? Well, that depends…

One of the more fascinating aspects of the recent presidential election in the US has been the delineation of sharp differences in points of view among the electorate. Those doing well celebrate indicators of economic and social improvement, while those struggling see little to no evidence of such things.

Or, as my wise mother liked to say, “Where you stand depends on where you sit.”

Similar dichotomies exist when the focus shifts to cybersecurity in general, and ransomware in particular. And some of them are disturbing at best and threatening to the ability of businesses to do business at worst.

Ransomware

Research conducted by IBM X-Force and reported widely in December found that 40 percent of spam emails sent in 2016 contained ransomware, and that one in two executives surveyed have experienced a ransomware attack at work. Yet just 31 percent of surveyed consumers had even heard of ransomware—yet.

Law enforcement encourages those who suffer ransomware attacks to report those attacks. Many also argue that paying ransoms just rewards and encourages criminals and future attacks. Yet IBM X-Force found that “Seventy percent of businesses hit by ransomware paid the hackers to regain access to systems and data.” Further, “Nearly 60 percent of business leaders said they would be willing to pay the ransom to regain access to financial records, intellectual property, business plans and consumer data,” HealthcareITNews.com reported.

Cybersecurity skills

Beyond ransomware, there are divergent views of the availability of skilled cybersecurity personnel. As reported by Computerworld in November, the US federal government argues that there’s no cybersecurity skills shortage, citing as evidence a successful job fair held by the Department of Homeland Security in July. But a study conducted by Intel Security and the Center for Strategic and International Studies and released the day before that job fair “pointed to a ‘talent shortage crisis’ of cybersecurity skills.”

Executive perception vs. reality

Perhaps the most troubling disconnect is between the perception of cybersecurity readiness among some business executives and the realities confronting their enterprises. As reported by DarkReading in November, Accenture “surveyed 2,000 top security execs representing companies with annual revenue of $1B or more, to gauge their perceptions of cyber risk and the effectiveness of current security efforts and investments.”

Accenture found that the enterprises they surveyed experienced about 106 coordinated attack attempts per year, and that approximately one in three such attacks resulted in a security breach. Yet 75 percent of those surveyed said they can sufficiently defend their organizations, while 70 percent said that their enterprises had “a strong attitude towards cybersecurity.” Further, “[t]he majority of respondents say internal breaches have the biggest impact; however, 58 [percent] prioritize developing perimeter security over focusing on high-impact insider threats,” DarkReading reported.

The bottom line

Regardless of your point of view regarding ransomware and other cybersecurity issues—or the viewpoints of others around you—some things are incontrovertible.

  • Ransomware and other threats are growing in number, sophistication, and scope.
  • These threats are not going away anytime soon.
  • Your enterprise, regardless of its size or primary business, grows more dependent upon its IT infrastructure every single day.
  • To survive and thrive, your enterprise needs the most modern and effective IT infrastructure and cybersecurity solutions and processes it can muster.

Resolve now to hit the ground running in 2017 with the solutions and processes your enterprise needs to modernize IT and protect itself effectively against even the most persistent and pervasive threats. Explore our LANDESK, AppSense, and Shavlik offerings online, or talk to your representative today, to see how we can help you to have a happy, secure, and successful New Year.

Blog-CTA-Whitepaper-527x150

Tips for Defending Against Winter Colds, Flus—and Cyber Threats

GettyImages-600171016If you haven’t yet had a serious cold or flu this winter, consider yourself lucky. And if you have, or are going through one right now, my heartfelt condolences.

While beginning recovery from one of my own worst colds since childhood—and helping my wife get over hers—some parallels began to occur to me between fighting these personal health threats and fighting off threats to cybersecurity.

Herewith, some tips for both. (Disclaimer: I am not a doctor or provider of healthcare in any official capacity, in case that wasn’t yet clear. The cold and flu tips offered below are based solely upon my personal experiences and research. That should keep our legal eagles happy.)

Prevent.

As the aphorism goes, “an ounce of prevention is worth a pound of cure.” And while no efforts to prevent infection are always entirely effective, each may help at least a little.

For colds and flus, this means it’s worth trying everything from over-the-counter supplements rich in vitamin C and zinc to foods high in antioxidants (including coffee—yay!) and probiotics (especially fermented goodies such as sauerkraut and kimchee). It’s also worth striving to avoid exposure to people and places where germs proliferate, such as your office or any family gatherings. Good luck with that.

For cybersecurity, prevention efforts are also never totally effective, but always nonetheless worthwhile. These can range from whitelisting and blacklisting specific types of applications and files to training users to avoid phishing emails and bogus Web sites. Locking down all network endpoints, refusing to support user-provided or mobile devices, or forbidding Web access may increase cybersecurity as well. However, such moves may also hobble user productivity, and motivate some to find and use work-arounds, with potentially catastrophic results.

Detect.

With colds and flus, the sooner you are aware that you’ve got something, the sooner you can take steps to fight it, and the more effective those steps are likely to be. This means paying close attention to things you might ordinarily ignore or take for granted, such as your breathing, your appetite, your body temperature, and new but apparently minor aches or pains. Taking over-the-counter or homeopathic symptom-alleviating remedies may help you get through your obligations, but be careful. They can also mask warning signs that you’re about to get worse.

Effective detection is critical to effective cybersecurity as well. You need timely visibility into every circumstance that might be an actual or attempted attack. “Symptoms” to watch for can include unusual resource access or admin privilege requests, unexpected spikes or dips in network traffic, appearances of unauthorized files or programs. To maximize security, you need to be able to monitor all of your endpoints, and all of their files and applications, for any and all suspicious activities. No pressure.

Remediate.

Despite your diligence and vigilance, unless you live in a completely germ-free environment, never leave it, and never have visitors, you will likely catch a cold, the flu, or both at some time. So in addition to your prevention and detection efforts, you need to be prepared to limit the effects of those germs that do get through to you. This is where over-the-counter, homeopathic, and even prescription remedies become critical allies.

If you’ve got a cough, add freshly grated raw ginger and raw, unfiltered honey to your tea of choice, and drink them several times a day. If you’re prescribed medicines, take them exactly as prescribed, and complete all of them to minimize the likelihood of a relapse. Just because you’re feeling better doesn’t mean the threat is entirely remediated.

Remediation in cybersecurity means limiting the effects of successful threats as quickly and completely as possible. This includes identifying and isolating all infected systems, killing any malware running on them, deleting that malware, and preventing its spread to other systems. Anything short of this set of goals leaves your organization vulnerable to follow-on and new threats.

A multi-layered approach is best.

Where colds, flus, and cybersecurity are concerned, there is no single “silver bullet.” There isn’t even a single weapon of choice. Instead, you need an arsenal of tools and processes that you can use in concert to prevent, detect, and remediate even the most aggressive threats.

Your healthcare provider(s) of choice and some online research can help you make giant steps toward successful prevention, detection, and remediation of cold and flu bugs. And LANDESK can definitely help you to do the same where your organization’s cybersecurity is concerned. Check out our past blog posts and other resources to learn more about fighting ransomware and malware. Then, check out our LANDESK, AppSense, and Shavlik security solutions online, or talk to your representative. The sooner you get started, the more protected you’ll be—from colds and flus, and from online threats to your IT resources, your users, and your business.

Blog-CTA-Whitepaper-527x150

Don’t Get Taken on a Holiday Phishing Expedition

GettyImages-533726355Ah, the holidays. A time of joy, reflection, and often, missives expected and surprising, from locales far and near.

I have unexpectedly received just such a missive, and shared it below, with commentary I hope you will find helpful.

personal memo

  • Return address

For starters, the envelope containing this delightful letter said it was from Manulife Financial, a legitimate company. In Canada, not Hong Kong.

The address of Mr. Lee’s unnamed investment bank is 9 Wing Hong Street, Cheung Sha Wan, Kowloon, Hong Kong. A quick search of Google Maps reveals that this is the location of a building known as the Global Gateway Tower. This property is managed by Henderson Property Agency Limited, which has not updated the property’s Web site since 2014. Hmm.

  • Email address

Mr. Lee, the letter’s putative author, apparently has no work email, as the “private email address” he provided to me is andylee598@yahoo.com.

  • Logo

As for the letter itself, it never states the name of the investment bank that employs its author, Andy Lee. But it does have a logo—one that closely resembles an inverted version of the logo of Toronto Dominion Bank. Another Canadian institution not based in Hong Kong.

  • Incorrect name

Also, he was apparently too excited to get my name completely right. It’s correct on the envelope, but the letter’s header says that it’s a “personal memo for Michael Dalton.” Not quite my name, but close. And the inside salutation? “Dear Michael E.” Which is my correct middle initial, a matter of public record.

  • False information

According to the letter, my relative, James Dortch, was an engineer and co-owner of Jameson & Erikson Electric Inc., “a Hong Kong based [sic] Private Electricity Company,” before he “died intestate in a ghastly car crash.” There is no such company, according to Google Search. And while Mr. Lee writes that “[a]ll efforts made by our bank to locate his relatives have been unsuccessful,” my cousin James is very much alive—you can easily find him on Facebook.

  • The mega-rich relative I never knew about

Nonetheless, Mr. Lee claims that James Dortch left an account containing “sums up to USD$47.5 Million United States Dollars” with “an open beneficiary status.”

Further, Mr. Lee asserts that if I will simply contact him, he will set the wheels in motion to make it possible for me to claim my late relative’s multi-million-dollar legacy. For his work “from the inside to make sure all needed information and evidences are provided” to back up my claim, Mr. Lee would receive 50 percent of that $47.5 million, and I’d get the rest. All I have to do is email Mr. Lee with a number at which he can call me to initiate the claims process.

Upon reflection, I believe I will forego Mr. Lee’s generous offer. And if you or anyone you know gets a letter like this, during the holidays or at any other time, you should, too. It took me about seven minutes of cursory online research to confirm that this is a really badly done attempt at phishing. But I have no doubt at least someone reading this right now knows someone who has fallen or almost fallen for a similarly transparent scam.

Stay vigilant!

The holidays are a great time for giving, and receiving. Just make sure you investigate every invitation you receive, and only give what you want to those you know. And if someone sends you an invitation such as the one I received, keep your holidays happy. Tell them politely but firmly to “go phish”—elsewhere.

The Cybersecurity Skills Shortage: Threat AND Opportunity for IT?

RET_005To paraphrase iconic singer/songwriter Donovan Leitch, who borrowed the idea from a Buddhist saying, “First, there is a cybersecurity skills shortage, then there is no shortage, then there is.”

A recent Computerworld article highlighted a US Department of Homeland Security (DHS) blog post, in which a DHS official argued that the much-publicized cybersecurity skills shortage is a myth.

In that post, the DHS official offered as evidence the 14,000 applicants, including 2,000 walk-ins, who attended a DHS job fair last July. “[W]hile not all of them were qualified, we continue to this day to hire from the wealth of talent made available as a result of our hiring event. The amount of talent available to hire was so great, we stayed well into the night interviewing potential employees.”

Perhaps unsurprisingly, the Computerworld article contrasts DHS’s interpretation of its job fair experience with the findings of numerous others outside of government. “For instance, a report released one day before the government’s job fair in July, Intel Security, in partnership with the Center for Strategic and International Studies (CSIS), pointed to a ‘talent shortage crisis’ of cybersecurity skills.”

Of course, the question isn’t whether there is or is not a cybersecurity skills shortage. The real question is, how can your company avoid the negative effects of such a shortage, now or in the future?

If skills are the question, technology is the answer

The right combination of skills, technologies, and processes can maximize the business value of the skills already in place at your organization. That combination can also help your organization to deal with any difficulties in expanding your cybersecurity team, by instead expanding the reach of the people you already have and the knowledge and experience they possess.

These benefits are equally applicable beyond cybersecurity. Technologies and processes that automate mundane tasks effectively and enable well-managed collection, sharing, and application of knowledge can aid your organization’s IT asset management (ITAM), IT service management (ITSM), and other efforts as well.

However, given the highly publicized challenges and risks associated with ransomware and other cybersecurity threats, cybersecurity may be the starting point that delivers the most benefits soonest.

LANDESK, AppSense, and Shavlik solutions—and the skills and experience of their developers, resellers, and partners—can help you to ensure that your business can do business safely and efficiently. No matter how the availability of skilled, experienced personnel may ebb and flow. Visit us online, or contact your representative, to begin implementing the solutions and processes that protect and enable your people and your business.

Plain Language: A Key Element of Friendly Business IT and Cybersecurity

hi

 

In my halcyon days of yore—known to most of you as the 1980s—I happened to get to consult with two of the greatest software visionaries you’ve probably never heard of. Here’s who they are, and why they matter to your IT and cybersecurity management efforts.

Two visionaries, one vision: simplicity

One was Paul Heckel. Paul wrote a book that I submit is still a worthwhile read if you can find it. It’s called “The Elements of Friendly Software Design.” Paul, who also worked at Xerox Corp.’s famed Palo Alto Research Center (PARC), turned many of the concepts from his book into a product called Zoomracks. The tool was an early personal information management system that used a then-innovative interface that mimicked filing cards in racks, a popular manual system at the time. It stored everything as plain text, and made it easy for users to scan racks and cards visually, then “zoom in” on the specific information they were seeking. In 1989, Zoomracks was named “Best Database” by Compute! magazine, but then faded into obscurity (and several contentious lawsuits about which you can read more at Wikipedia).

The other visionary was James Edlin. He co-created WordVision, one of the first fully-featured, visually oriented writing tools for the then-nascent IBM PC. The software used a colorful representation of playing card suits to group writing and editing functions logically, and did “WYSIWYG” (“what you see is what you get”) better than anything else at the time. WordVision was simple for even PC newbies to install and use. To quote a 1983 InfoWorld review from the Google Books archive, “You [didn’t] have to know your DOS from your elbow.” And it was priced at only $79.95.

Both Zoomracks and WordVision had one major common characteristic too many IT and cybersecurity tools and implementations lack today. Each was designed from the outset to interact with non-expert, non-technical users in plain, easily understood language, whatever task those users were attempting to perform. From “quick start” installation guides through on-screen prompts to error messages, each made it almost impossible for users to get lost, confused. I watched a lot of people noodle with each product, and never saw anyone be frustrated into the “rage quit” state all too frequently found in today’s video games—and, sadly, too many business applications.

Three things to do now

Here are three simple, effective steps IT and cybersecurity teams can take immediately to bridge the gap between plain language and confusing jargon. Steps like these can improve both user productivity and perception of those teams.

  1. De-obfuscate frequently encountered instructions and error messages. (Ask your users. They’ll be glad to tell you.)
  2. Create brief, clear “cheat sheets” that include all the steps for frequently performed tasks and tell users specifically where and how to get help if they need it. (“Read the manual” and “Call tech support” are just two examples of what not to tell those users.)
  3. Try to include at least one tip or trick in every non-emergency-related communication with users. Such as that coordinated, repeated cybersecurity training and outreach you’re already or about to start doing. (Some of those users can even provide guidance and contributions here, if asked nicely.)

Plain language. A powerful, underused tool that can improve users’ productivity, experiences, adherence to IT and cybersecurity policies, and perceived value of IT. Might even help to reduce helpdesk calls, too. Why would you not use it?

If you want to check out some good examples of communicating about cybersecurity and IT in plain language, start right here. Explore our posts on asset management, ransomware, security management, or systems management. Then explore the plain-language benefits of our solutions, online or by contacting your LANDESK, AppSense, or Shavlik representative.

Blog-CTA-Whitepaper-527x150

Cybersecurity: A Marketing Opportunity for IT

GettyImages-593296284The good folks at TechTarget operate multiple IT-related websites. One of these is the IT Knowledge Exchange, “a TechTarget Expert Community” that features questions and answers, discussions, and blogs posted by IT folks of various roles and levels of expertise.

Cybersecurity training

A recently posted discussion question asks this: “What systems and policies have you put in place to make business employees more IT proficient and self-sufficient?” I believe that cybersecurity training and outreach from IT can contribute greatly to making users “more IT proficient and self-sufficient,” and provide additional benefits to users, IT, and the business.

Most ransomware and other malware enters most enterprises via legitimate-looking but bogus phishing emails and website links. According to the Verizon 2016 Data Breach Investigations Report, more than 20 percent of phishing emails get opened. The report adds that more than 12 percent of those who open those emails click on the links to malware in the messages.

IT can and should provide training, content, and repeated contacts to help users to understand this and be more diligent in looking for, spotting, reporting, and not opening bogus emails. Doing so can help to transform those users from weakest links to first lines of enterprise cybersecurity defense.

Transforming the perception of IT

Such outreach can also help to transform the perception of IT by users and line-of-business leaders. These constituents often view IT as “the bad guys” who impose rules and tools that frustrate and annoy. Helping to make users more secure and more security-savvy can get more of them to see IT as enablers and accelerators of user productivity and business agility. Which can only be good for IT and the rest of the business.

If you’re in IT and already providing cybersecurity training and outreach, keep up the good work. Remember that cybersecurity is a marathon and not a sprint, and that repetition enhances retention and understanding. In other words, that one-time run-through of cybersecurity basics during employee onboarding and orientation is a beginning, not an end.

If you’re not already conducting coordinated, repeated cybersecurity training and outreach, start now. Share some of the resources in the LANDESK ransomware blog post archive with your users. Not all at once, of course. Maybe something new once a week or once a month, accompanied by any news you want to share about new cybersecurity-related applications, patches, processes, or tips. Maybe even content or inspiration you find at TechTarget’s IT Knowledge Exchange or other online discussion areas.

Of course, your training and outreach efforts can be made even more effective if you’re delivering the best possible cybersecurity protections behind the scenes. And of course, we can help you there as well. Check out our solutions online, or contact your LANDESK, AppSense, or Shavlik representative.

Blog-CTA-Whitepaper-527x150

No More ‘Small, Mid-Sized’ Businesses: Size Is out—Maturity Is In

Map pin flat above city scape and network connection conceptAs we approach another new year, some may already be thinking about resolutions for 2017.

Here’s a suggestion: Stop talking about your company in monolithic, size-focused terms such as “SMB” (“small to mid-sized business”) or “large enterprise.”

In all but the smallest companies, there is rarely if ever a situation where one size fits all. Why? Because in most enterprises (regardless of size) multiple initiatives and efforts are underway simultaneously. And while your business may be deeply experienced in some areas, some of those initiatives likely involve areas of focus at which you and your colleagues are novices.

IT presents several immediate and obvious examples. Your company may be expert in its primary business or businesses. But unless one or more of those is, in fact, IT, it’s unlikely that your company is as good at IT as it is at whatever it does best.

With this in mind, it may be more valuable and relevant to think less about companies in terms of “small” and “large”, and more about companies in terms of “start-up” and “scale-up” of specific initiatives. Or about processes that are more mature and less mature. Or environments or situations that are more complex or less complex.

Why words matter

This may seem at first like a pointless exercise in rhetorical hair-splitting. However, it turns out that how you frame discussions can have important effects on how those discussions play out and the results they produce.

Or, to be a bit more succinct, word choice matters.

Especially when you’re considering or pursuing initiatives important to your business.

Depending on the words you use to describe it, an initiative to, say, improve IT security or asset management may come across as a daunting, boil-the-ocean exercise, or as a worthy enhancement to the processes that run the business. And since every significant initiative involves engaging the support of others, how you present the initiative can have a major effect on its probability of success.

The challenge of word choice is equally significant regardless of the size of your enterprise. There are lots of smaller companies that face IT and other challenges as complex as those faced by larger organizations. And not every challenge faced by a larger enterprise is necessarily more complex than those faced by their smaller counterparts.

Another challenge: making sure the words used to assess challenges and plan solutions are based on accurate, credible information wherever possible. This means that in many cases, a central, well-managed repository of relevant information, stored and organized with an agreed-upon taxonomy, is the best foundation for communications based on or related to that information.

LANDESK solutions

LANDESK has both the solutions and the thought leaders to help you use the right words to pursue your IT initiatives successfully, and to back those words up with the best available information about your environment.

  • ITAM

Are you considering or pursuing an IT asset management (ITAM) initiative? You can read about how different people view assets differently, as well as what should be in your ITAM database, in this excellent blog post by ITAM Evangelist Patricia Adams: What is IT Asset Management?

You might also want to check out Patricia’s on-demand webinar in which she introduces her ITAM Attainment Model. There is also the very useful Info-Tech ITAM Report in which LANDESK was named a “Champion” vendor.

  • Risk management

How about risk management? Read Effective Risk Management Without Boiling the Ocean, another great post by our CSO, Phil Richards. In it, Phil discusses why a risk register aids risk and security management initiatives, and suggests some of the words that can help avoid boiling the risk management ocean.

  • Service management

Service management, within and even beyond IT? Got you covered there, too. LANDESK Service Desk combines social, mobile, and self-service support with data connectors and multiple integrations with other tools and data. Its ability to deliver a federated view of your configuration management database (CMDB) and other features are why Garter named LANDESK a “Visionary” in its 2015 IT Service Management and Support report.

Of course, we have other resources and solutions to help you succeed with initiatives in these and other areas as well. Check them out online, or contact your LANDESKAppSense, Shavlik, or Wavelink representative to learn more.

Let LANDESK help you make 2017 the year in which your organization increases the maturity of its IT initiatives and processes, to the benefit of the entire business.

ITSM-CTA-Blog-Banner (1)

LANDESK Accolades in 2016—and Why They Matter to Your Business

GettyImages-491790670Before joining LANDESK a little more than 15 months ago, I spent much of the preceding three-and-a-half decades as an industry analyst, reporter, and consultant.

In all of those roles, my colleagues and I paid close attention to the accolades accorded to the vendors we followed by their peers and other outsiders. We saw many of those kudos as real-world validations that those vendors were delivering real value to their clients and partners, as well as being good corporate citizens of their respective communities.

In case you hadn’t noticed, the people and products of LANDESK have received a fair number of interesting accolades throughout 2016. Here’s a quick review.

February

April

June

July

September

Now, I may be a bit biased, but I see this list as both impressive and meaningful to any people or companies doing business or considering doing business with LANDESK.

Collectively, the accolades represent and underscore our company’s commitment to hire the best people, deliver the best solutions, and treat customers, partners, and our communities with the utmost respect.

When I was a callow young marketer, a far more seasoned colleague said this: “If I say it about myself, it’s just advertising. If someone else says it about me, it’s PR, and far more credible.”

While that colleague was half-joking, there’s a lot of truth underlying the humor. What others say about us often speaks far more emphatically and credibly than anything we say about ourselves.

So when looking at LANDESK or any other vendor, look beyond the offerings. Check out the above accolades, and pay attention to those accorded to every vendor with which your company does business, and every vendor that seeks to do business with your enterprise.

After all, you want to make absolutely sure that your company is always in the best possible company, don’t you?

InfoTech-blogbanner

Last Week’s Internet Outage: What Your IT Team Should Do Next

GettyImages-537812190As you have probably read—and may have directly experienced—there were major Internet outages on Friday, October 21, caused by a distributed denial of service (DDoS) attack on Dyn’s Managed DNS Infrastructure.

That resource provides Domain Name Service management for Web sites around the world, including some of the most popular, which is why those sites were inaccessible during the attack.

The next day, a statement was issued by Dyn regarding the attack and its aftermath.

What Dyn CSO Kyle York knew as of October 22:

“At this point we know this was a sophisticated, highly distributed attack involving tens of millions of IP addresses….The nature and source of the attack is under investigation, but it was a sophisticated attack across multiple attack vectors and internet locations. We can confirm…that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed tens of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.”

Others have already begun to try to sort through those possibly responsible and their motivations.

LANDESK experts weigh in

Meanwhile, here’s what some of our security-minded experts, including Chief Security Officer Phil Richards, VP of Engineering Rob Juncker, Principal Product Manager Eran Livne, and Senior Product Manager Chris Goettl, know and recommend:

  • Friday’s DDoS attack on Dyn was implemented with Mirai and variants of Mirai, which is readily available, “off-the-shelf” malware.
  • The attack succeeded largely by enslaving very large numbers of (largely residential/consumer) Internet-connected devices, from Webcams to “smart home” accessories, as well as poorly protected computers.
  • Those “Internet of Things” (IoT) devices were and are particularly vulnerable because many if not most come with default passwords users can’t change. (Some manufacturers have already announced recalls of compromised devices.)
  • Enterprise IT leaders and teams can’t do much about residential IoT devices. But those IT people should use the attack as a reminder and warning that they need strong passwords on every connected device that has a password that can be changed. IT also needs to implement tools and processes that help them to detect, prevent, and remediate malware, to keep their computers from becoming botnet slaves.

Solutions

LANDESK Password Central enables users to recover, reset, and synchronize their own passwords with no IT intervention required. The solution also ensures that passwords comply with company-defined policies and are strong enough to provide adequate protection.

LANDESK Security Suite includes multiple features designed to improve detection, prevention, and remediation of malware. And there are several other LANDESK, AppSense, and Shavlik solutions that can increase and improve patch management of client and server operating systems, virtual infrastructures, and third-party applications.

Visit LANDESK online, or talk with your LANDESK, AppSense, or Shavlik representative today. Together, we can help to ensure that your enterprise is as protected as possible from future attacks—even those that aren’t targeted directly at your enterprise.

Blog-CTA-Whitepaper-527x150