Featuring Panelists:

Denis O’Shea, Mobile Mentor Founder, and CEO

David Lambert, Microsoft Technical Specialist

Technical support from:

Demetrius Cooper, Mobile Mentor Digital Identity Lead

Terrence Brown, Mobile Mentor Modern Work & Security Manager


In this webinar, presenters Denis O’Shea and David Lambert explain the nuances involved with getting the ongoing journey to Modern Endpoint Management right using Microsoft 365. They also demonstrate how Modern Endpoint Management underpins critical security strategies like Zero Trust framework and the Essential Eight.

 

 Key discussion points:

What is the Endpoint Ecosystem and how does Modern Endpoint Management work to make it work efficiently?

The Endpoint Ecosystemstem is defined as the combination of devices, operating systems, applications, sign-in experience, and supporting processes for employees. With a surge and remote work, a 500% increase in cybercrime, and the influx of BYO devices, it is more important than ever that we work to secure and support the endpoint ecosystem in our businesses.  Modern Endpoint management aims to effectively secure the Endpoint Ecosystem with a set of cutting-edge strategies.

How to balance endpoint security and employee experience through Modern Endpoint Management?

The journey to modern endpoint management is continuous. Each time you change a setting, a policy, a conditional access policy, etc. you change your security posture and impact end-users in your tenant. This can often have unintended consequences. However, there is an attainable destination to aim for with Microsoft 365 capabilities. The 6 pillars of modern endpoint management allow us to move past legacy IT strategies and embrace the modern approach. The pillars are as follows:

  1. Zero Trust Architecture

    Zero Trust assumes that every access request is a breach unless explicitly verified. Zero Trust architecture allows us to move past the traditional “castle and moat” approach to security and adopt a modern approach that is effective for remote, hybrid, and in-office works alike.

  2. Passwordless Authentication

    Passwordless authentication allows businesses to become phish-resistant while providing an excellent user experience by embracing biometrics.

  3. Zero-Touch Provisioning

    The Zero-Touch Provisioning  process allows teams to remove the burden of manually imaging machines and streamline the onboarding process

     

  4. Moving data to the cloud

    Migrating data to the cloud allows us to eliminate attachments thus negating their associated risks that often lead to breach.

  5. Applying Over-the-Air Updates for applications and operating systems

    Over-the-air updates aid in making the security experience invisible to end users. By applying over-the-air updates, we eliminate the need for VPNs to update devices.

  6. Remote Support for Remote Workers

    Remote support allows us to remove friction that once existed for remote workers and office-based IT. The process for resolving technical issues for end-users becomes more streamlined and effective.

How can you enable Zero Trust with Microsoft 365?

With Microsoft 365 E3 licenses, groups can achieve the basic framework of a Zero Trust Architecture.  E5 licenses allow for the capability to automate and streamline many of the components that support a Zero Trust architecture.

Microsoft 365 uses Azure AD to manage identity, Windows Hello for biometric and multi-factor authentication, Intune for managing endpoints. This ecosystem leverages conditional access policies to establish policy engines that enable Zero Trust and results in robust and invisible security for employees.

What does the journey to Modern Endpoint Management look like?

The journey to move from a legacy state to a modern state of endpoint management is not simple.  There are no shortcuts, but there is a validated process to position your journey for success. The following steps encapsulate the journey team will need to take to get to a state of modern endpoint management:

  1. POC

    The process of technology validation

  2. Pilot

    Testing specific use-cases

     

  3. Production

    Rollout to user groups

     

  4. Migration

    Migrate devices and applications

     

  5. Consolidation

    Decommission legacy tools

 


 

Contact us learn more about balancing security and employee experience