Wednesday, September 21, 2016

Five Steps for IT Management Success When Deploying Bromium with End Users [feedly]

Five Steps for IT Management Success When Deploying Bromium with End Users
// A Collection of Bromides on Infrastructure

  • Deploying Bromium frees-up end-users from having to worry about ransomware, viruses, Trojan horses, worms and other forms of malware.
  • Bromium is a trouble free-experience for end users with hundreds of thousands of endpoints deployed globally and billions of micro-VMs launched globally.
  • The key is helping end users understand how compliance protects your organization.

sunglasses-hand-smartphone-deskWhat's it like to be a Bromium end user? In an ideal world, they wouldn't even notice Bromium was there. And they wouldn't notice a lot of other things, too.

Learn: Here's how Bromium works

Things like viruses, Trojan horses, worms or sypware, for example. The whole point of Bromium is that it lets you go about your online business without risk of a breach. So your end users could spend a whole day browsing through the content from a hacker's convention on the dark web – or just do their jobs – and still emerge without a trace of malware.

How to make security easy for the end user.

In practice, Bromium's ability to isolate the desktop from these threats is as close to ideal as you can get. But in reality, there are times when an end user believes the security on their computer is slowing things down or preventing them from accessing a site or application. What should you do in these situations? We talked with our IT Director, Lee Hutchinson, to get his advice.

Here are his five steps to success.

  1. Minimum requirements. Make sure the machine running Bromium meets our minimum requirements. It seems so simple, but it's the number one flag we get from our customers.
  2. Determine a standard configuration. This might be company-wide or by department. For example, marketing often hits a lot of social media sites and cloud-based tools. You'll want to add trusted sites as appropriate for different groups.
  3. Train your IT team. Put Bromium on their computers first and let them bang around. They should understand how it works and where the software might limit certain behaviors (like how apps look differently when opening an attachment). That will help them understand what issues are attributable to the Bromium configuration and what's new behavior.
  4. Explain how it works. Since most users won't even notice Bromium is running, Lee suggests educating folks as needed; although there might be cases when a department could use a briefing. For example, if Legal is used to downloading PDFs and is struggling with the extra step Bromium enforces, it's an opportunity for you to talk to the team and explain what's happening so they understand the value of taking the extra step.
  5. Create a culture of success. This is probably the most important step. It starts with the IT team believing security is a high-value practice. With that attitude, as they reach out to end users they can share their commitment to keeping the company safe and show resilience in problem solving that helps the end user feel good too.

Lee reminds us that, "It is practically impossible to test all possible technology combinations and configurations, so there is always a possibility that someone, somewhere, will run into an issue with their computer security system with any security technology that's actually stopping threats." When that happens, you need to let us know. We are here to help.

The bottom line: he recommends  never switching the protection off completely. After all, the inconvenience you may get from a security system is nothing compared to that you will experience if a cyber threat gets through.


Shared via my feedly newsfeed

Sent from my iPhone

No comments:

Post a Comment