Are you still relying on device cert checks at user laptops for conditional access? If not, what are the alternative controls you recommend?
CTO in Software, 11 - 50 employees
We use Microsoft Intune.CTO in Software, 2 - 10 employees
MFA and Zero trust architecture e.g OktaContent you might like
Patch management: to reduce attack surface and avoid system misconfigurations39%
Malware and ransomware prevention: to protect endpoints from social engineering attacks58%
Malware and fileless malware detection and response: to protect against malicious software49%
Threat Hunting: to detect unknown threats that are acting or dormant in your environment and have bypassed the security controls32%
Not planning to change endpoint security strategy10%
185 PARTICIPANTS
Insider threats – rogue admins19%
Encrypting my data51%
Deleting my backup copies11%
Resident malware8%
Data theft – data exfiltration11%
Other1%
142 PARTICIPANTS
CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.Read More Comments
- Device
- User
- Location
- Application
When contextual information raises any red flag's further identity proofing can be engaged to ensure access to assets is appropriate.