Hackers are constantly unleashing creative new phishing attacks to get credentials to gain access to a PC, tablet or smartphone.
Zero-day attacks and the use of tools that find vulnerable systems require new defences to protect organisations.
In just a few short years, we have seen the shift from mobile device management to endpoint mobility management to unified endpoint management (UEM), which provides a higher level of management functionality and far more effective security capabilities.
Among the most important advances in UEM is the integration of augmented intelligence and cognitive technology, as IBM has done with IBM MaaS360 with Watson.
The integration with Watson changes the game on several fronts.
First, it reduces the number and scope of manual tasks and mobile minutiae that systems managers and admins spend time on by discovering key insights and alerts and delivering them right to the MaaS360 console.
Second, it speeds changes to security policies and rules.
And third, the use of cognitive technology enables further refinement of policies and standards so they are contextual to the specific needs of the organisation rather than more general rules.
In many cases, the problem with endpoint security is not a lack of input information from logs, threat intelligence, behaviour tracking and other data.
Rather, it’s the difficulty of building a meaningful understanding of what is occurring and how to respond.
Cognitive technologies use augmented intelligence to sort through all of the information and activity to provide security analysts and IT admins with actionable intelligence and more useful dashboards focused on endpoint devices.
UEM tools with augmented intelligence will change management and security processes by delivering more context about threats, customised for the unique needs and infrastructure of a specific organisation.
As such, actions are driven by prioritisation based on the organisation, not a general perspective.
As the number of vulnerabilities and threats increases each month, being able to prioritise them accurately is critical.
Cognitive technologies enable both IT and security teams to take a far more proactive approach to cyberdefense, determining the following:
Legacy approaches to managing endpoint vulnerabilities can’t keep up or provide the kind of true insight organisations require to make informed and optimal decisions.
Improving endpoint management tools with augmented intelligence and cognitive technologies is the answer.