Using Machine Learning to Simplify Endpoint Security
Using Machine Learning to simplify Endpoint Security
Could it be the key to reducing Cyber as well as Natural Disasters?
Mother Nature continues to flex her muscles with extreme weather events around the world. Whether it is the threat of wildfires in the Amazon, California and Sydney or the floods in northern England and Venice. These events are worrying but are timely reminders of why researchers are working on how to use machine learning as a disaster preparedness and response tool. Because machines can quickly analyse massive amounts of data from numerous sources, the goal is to use that information to help community leaders and emergency response teams make more informed decisions.
Like natural disaster preparedness and response, machine learning also has important implications for endpoint security and the disaster that could originate on an endpoint while under cyberattack. Machine learning is key to improved security by way of a direct pull-through from IT asset management.
An IT Asset Management Job with a Security Outcome
Within the context of IT asset management, organisations are busier than ever trying to manage the growing number of endpoint devices, applications and data. IT complexity has reached all-time highs. Machine learning has been a very valuable tool for managing that complexity and, while doing so, can also make direct contributions to better security and more resilient endpoints. With the power of machine learning, you’re not only gaining improved visibility into your assets, you’re learning more about the actions and events happening there and finding patterns.
With patterns inevitably come outliers and so often that’s where vulnerabilities hide. Being able to recognise outliers and remediating any resulting risk is how endpoints – and enterprises – become more resilient.
Keeping machines up to date is an IT management job, but it’s a security outcome. Knowing what devices should be on the network is an IT management problem, but it has a security outcome. And knowing what’s going on and what processes are running and what’s consuming network bandwidth is an IT management problem, but it’s a security outcome. We should not see these as distinct activities so much as seeing them as multiple facets of the same problem space.
The growing number of assets is a challenge, certainly. And as security becomes an increasingly critical risk, organisations have been layering on more and more security tools – ten or more agents on each endpoint, says our research. But increased security spend does not equate to improved security. That much is painfully clear. Instead, you’re left with a complex environment full of competing, fallible agents and, consequently, a false sense of security.
Visibility is key and machine learning can deliver a complete data set that then gives you invaluable insight on what is happening on your endpoints. This way, you can work to reduce complexity and improve endpoint resiliency.
Header image source: Jirsak/shutterstock.com
To see how Absolute’s range of software offerings can support your endpoint security needs, refer to our flyer.
Read more insights…
blog
A Culture of Continuous Innovation from the TOUGHBOOK CF-31 to the TOUGHBOOK 40
In a busy first half of 2024, the TOUGHBOOK G2, 33, and 40 rugged mobile devices have all received major updates. It’s a good time therefore to pause and revisit Panasonic’s DNA of continuous improvement that improves functionality for the end user.
blog
Keeping Our Ambulances Connected: The Tech Behind NHS’ Life-Saving Upgrades
Under the nationwide Ambulance Radio Programme (ARP), Ambulance Services Trust in England and Wales are implementing a major technology upgrade to enhance efficiency and patient safety. Every trust will deploy Panasonic TOUGHBOOK devices in their rapid response vehicles and ambulances.
article
Panasonic TOUGHBOOK 40mk2 – Revolutionising the Rugged Device Market with AI
The Panasonic TOUGHBOOK 40mk2’s AI-enabled Intel® processor and enhanced connectivity brings AI processing at the edge to the market-leading rugged notebook, vastly improving efficiency for mobile field service workers.
blog
Keeping the Defence Sector Connected: Meet the TOUGHBOOK 40 TACTICAL
The TOUGHBOOK 40 TACTICAL revolutionises military vehicle operations with its specialised module, military interfaces, and shock-proof mount. It offers exceptional in-vehicle connectivity, stemming from our latest collaboration with roda computer GmbH in the defence sector.
Sorry there was an error...
The files you selected could not be downloaded as they do not exist.
You selected items.
Continue to select additional items or download selected items together as a zip file.
You selected 1 item.
Continue to select additional items or download the selected item directly.
Share page
Share this link via:
Twitter
LinkedIn
Xing
Facebook
Or copy link: