Will endpoint security for laptops ever get easier?

724 viewscircle icon4 Comments
Sort by:
vCISO and COO in Software4 years ago

Apple display port (DP) works really well. When I was at Juul, because we big brothered every single machine, I reimaged my machine once a month. I would just wipe it, re-DP it, redeploy everything, restart from crash plan, and then I'd be good to go again. We had hundreds of laptops stolen, but they all had DP on them so the thieves couldn't do anything with them.

Lightbulb on2 circle icon1 Reply
no title4 years ago

It's reasonably magical. I've used DP as well, and even if somebody steals your laptop, it just goes back to the company and redoes itself. It's pretty slick. We had somebody buy one and bring it back to us, in fact. They were like, "I can't use this thing and I think I got scammed."

VP - Head of Information Technology in Software4 years ago

The way that laptops touch consumers and businesses sets expectations on the part of the consumer that they carry into their business life. They think, "Of course my kid should be able to install a video game on my work laptop because it's a laptop." There are a lot of things that are vulnerable in a laptop that probably don't need to be anymore, but they still are because of the tension with consumers, businesses, and where we use the products.

If you're a developer or an engineer writing code, then you need your laptop to do certain things. There's a big chunk of the company that doesn't need half of those things, but they still need a full laptop. We're just not totally there yet. I think we know the answer, but we're not doing it. Managing people's expectations of what their laptop can do is part of it.

Lightbulb on1 circle icon1 Reply
no title4 years ago

We're getting closer. At my last two companies, I played with Microsoft Autopilot and a combination of Intune. That worked pretty well for deploying stuff.

Lightbulb on2

Content you might like

Ease of getting my data into the DAaaS platform9%

Tools that make it easy to create use cases with the DAaaS platform41%

A pre-existing library of dashboards and report templates to help me quickly get up-and-running32%

The ability to try out the DAaaS platform for free before buying10%

Services from the DAaaS vendor (consulting, support, training)3%

Confidence that my data is safe in the cloud2%

View Results

Ransomware58%

DDoS28%

BEC Attacks8%

Man-in-the-middle Attacks3%

Other

View Results