What Is Endpoint Security
What Is Endpoint Security
What Is Endpoint Security
For
Sales, Pre-sales, & Delivery
BEGINNERS
This book is intended to simplify cyber security as much as possible and help beginners, semi-technical,
and non-technical practitioners with leading questions to field. To explain certain concepts, ideas have
been stretched to normal real-life scenarios. Please do send in your thoughts and questions for us to
make this more engaging.
The attempt to flatten the learning curve and build consensus among buyers, technology owners, and
service providers guided us to structure the book into technology chapters. Each chapter has basics
explained, a la what is the technology and how it helps, sales cue, pre-sales cue, and delivery cue.
Sales cue deals with what questions sales leaders can ask prospective clients to develop needs and use
cases. Similarly, in this section, we have also dealt with what possible questions may a prospective
client ask of the sales leader while exploring the use cases. And between the sales leaders and the
prospective clients, what parameters can they agree on while finalising the terms and conditions of
the sales transaction.
Pre-sales cue deals with what could be possible sizing guidelines or benchmarks for the technology, to
which other systems can the solution connect with, steps of implementation of the solution, services
levels parameters they can agree to, and where things can go wrong.
Delivery cue deals with daily, weekly, monthly operations activities, which level of capability (L1, L2,
L3) can manage what activities, typical set of reports for the solution, and what factors can be looked
at for a holistic governance of the solution.
This compilation is by no means the most exhaustive, but it aims to build enough thrust for beginners-
to-cyber-security sales, pre-sales, and delivery personnel to move to the next level of expertise. With
your continued support, we can augment this book easier to comprehend, manage the simplicity, and
still address frequently asked questions in the market
OpenAI has been used to generate answers to frequently asked questions and where necessary,
answers have been augmented by practical suggestions. Since OpenAI has been used, we have decided
to make this book open and free to use.
While reading the book, if you see a text-portion in saffron italics (for example: malware signatures),
it means the term has been explained in the next sub-section. If there are terms you want more
explanation on, please do give us the feedback and we shall try and add them to the sections. Italic
also shows new terms and some sample programs.
Hope you enjoy reading or referring to it more than we enjoyed compiling it.
Signature-based EDR is like a computer detective who knows what different criminals look
like because they have pictures of their faces, their special fingerprints, which are unique to
each bad guy. These pictures are called "signatures." So, if a criminal matches one of these
pictures, the detective can say, "Hey, I know you're a bad guy!" It's like having a book of known
bad guys' photos, and if a new bad guy looks exactly like one in the book, we catch them.
Signatureless EDR is like a super-smart detective who doesn't need pictures and can spot
troublemakers even if they've never seen them before. Instead, this detective watches how
people act and figures out if they're doing something suspicious. Imagine if you're playing a
game, and you notice someone cheating even if you've never seen them before. They can tell
when someone is acting strange or doing something sneaky, even if it's a brand-new bad guy
nobody has seen before. This detective relies on patterns and behavior, not just pictures, to
catch the bad guys.
Signature-based EDR relies on pictures/ fingerprints or "signatures" to catch bad guys, while
Signatureless EDR relies on their wits and instincts to catch them.
The endpoint is the last line of defense against cyber threats, and the goal of endpoint security
is to prevent these devices from becoming compromised and used to access sensitive
information or launch attacks on the network.
Endpoint security typically involves a combination of hardware and software solutions,
including antivirus software, firewalls, and encryption technologies. The objective of endpoint
security is to protect the network by securing each endpoint and preventing the spread of
malware and other cyber threats.
3.1 What is an Anti-virus solution?
An anti-virus (AV) solution is a type of software that is designed to prevent, detect, and
remove malicious software, also known as malware, from a computer or network. Malware
can include viruses, trojans, worms, spyware, and other types of malicious software that can
cause harm to a computer or steal sensitive information.
An anti-virus solution typically works by continuously scanning a computer's files and
incoming emails and network traffic for known malware signatures.
If malware is detected, the anti-virus software will either remove it or quarantine it to prevent
it from spreading to other parts of the computer or network. Some anti-virus solutions also
include additional security features, such as firewalls, intrusion detection and prevention
systems, and real-time threat intelligence updates.
In short, an anti-virus solution is an essential tool in maintaining the security of a computer or
network and protecting against the spread of malware.
3.1.1 What are viruses, trojans, worms, spyware?
A virus is a type of malware that infects a computer by attaching itself to other legitimate
software. Once installed, a virus can spread to other parts of the computer and cause damage,
such as corrupting files or slowing down the system.
A trojan is a type of malware that disguises itself as legitimate software and is used to gain
unauthorized access to a computer. Trojans are often used by hackers to steal sensitive
information, such as passwords and credit card numbers.
A worm is a type of malware that is designed to spread itself from one computer to another,
often over a network. Unlike a virus, a worm does not need to attach itself to other software
and can spread on its own.
Malware signatures are a set of unique patterns or characteristics that are used to identify a
specific type of malware. These signatures can include file names, code patterns, or other
unique identifiers that are unique to each type of malware.
Anti-virus (AV) software uses malware signatures to detect and remove malware from a
computer or network. When an AV software scans a computer or network, it compares the
files and incoming data to its database of known malware signatures. If a match is found, the
AV software can identify the type of malware and take the appropriate action, such as
removing the malware or quarantining it.
Malware signatures are constantly updated by anti-virus vendors to keep up with new and
evolving malware threats. This allows anti-virus software to stay current and effectively
protect against the latest cyber threats.
In short, malware signatures are a key component of anti-virus software, allowing it to
accurately identify and remove malware from a computer or network.
3.1.3 Anti-virus types
An EDR (Endpoint Detection and Response) solution is a comprehensive cybersecurity tool designed
to protect and monitor endpoints (such as computers, servers, and mobile devices) within a network.
It typically consists of several components that work together to detect, respond to, and mitigate
security threats. Here are the key components of an EDR solution:
1. Agent Software: EDR solutions usually require the installation of agent software on
each endpoint you want to protect. This agent collects data, monitors activities, and
communicates with the central EDR server or cloud-based platform.
2. Central Management Console: The central management console is the user interface
that security administrators use to configure, monitor, and manage the EDR solution.
It provides a centralized view of endpoint security status, alerts, and actions.
3. Data Collection and Analysis Engine: EDR solutions collect a vast amount of endpoint
data, including logs, system events, network traffic, and more. A data collection and
analysis engine processes this data in real-time to identify security threats and
suspicious behaviour.
4. Threat Detection and Analysis: EDR solutions use various methods for threat
detection, such as signature-based detection (identifying known threats), behaviour-
based analysis (detecting unusual or malicious behaviour), and machine learning
algorithms (predicting and identifying emerging threats).
5. Alerting and Reporting: When a potential security threat is detected, the EDR solution
generates alerts and reports. These alerts are sent to security administrators or a
security operations centre (SOC) for further investigation and action.
6. Incident Response and Remediation: EDR solutions often include incident response
capabilities. They allow security teams to take immediate action to contain and
mitigate threats. Actions may include isolating compromised endpoints, blocking
malicious processes, or removing malicious files.
7. Forensic Analysis Tools: EDR solutions provide tools for forensic analysis, which helps
security professionals investigate security incidents, understand the scope of an
attack, and identify the root cause.
8. Integration with SIEM: EDR solutions can integrate with Security Information and
Event Management (SIEM) systems to provide a broader view of security events across
the organization. This integration enhances threat detection and response capabilities.
9. Machine Learning and AI: Many modern EDR solutions leverage machine learning and
artificial intelligence to continuously improve threat detection and reduce false
positives. These technologies can analyse vast amounts of data to identify complex
threats.
10. Cloud-Based or On-Premises: EDR solutions can be cloud-based, where data is sent to
and managed in the cloud, or on-premises, where data remains within an
organization's own network. Cloud-based solutions offer scalability and ease of
management, while on-premises solutions provide more control over data.
To gain a better understanding of the prospective client's current security situation and
identify potential areas where an anti-virus solution could provide additional protection, ask
the following questions. These can help you determine if the prospective client has a genuine
need for an anti-virus solution and how your solution can meet their specific requirements.
1. What types of devices does your organization use, and how are they connected to the
internet and each other?
2. What operating systems and platforms are these endpoints running (e.g., Windows,
macOS, Linux)?
3. Are any endpoints remote or mobile?
4. What types of data and information does your organization handle, and how is it
stored and protected?
5. Are there specific industry regulations or compliance standards (e.g., Indian IT Act, The
Digital Personal Data Protection Act, Reserve Bank of India, Insurance Regulatory and
Development Authority of India, Securities and Exchange Board of India, National
Payments Corporation of India, CERT-In, CEA (Cyber Security in Power Sector), HIPAA,
GDPR, or any other domestic or international regulation, directions, guidelines) that
your organization must adhere to?
6. How does EDR fit into your compliance strategy?
Clients looking for an anti-virus solution may ask a variety of questions to determine if a
particular solution will meet their needs. Some common questions include:
1. What types of threats does the solution protect against?
2. How does the solution detect and prevent malware?
3. Can you provide an overview of your EDR solution? What makes your EDR solution
unique or different from others on the market?
4. Do you offer both cloud-based and on-premises deployment options? What are the
advantages and disadvantages of each deployment option?
5. What is the false positive rate of the solution? How does your EDR solution detect
security threats on endpoints? What response capabilities does it offer in case of a
detected threat?
6. Which operating systems and devices does your EDR solution support? Is it compatible
with our organization's existing endpoints?
7. How often are the virus definitions updated? Does the solution have a proven track
record of protecting against the types of threats faced by the client's industry or
organization?
8. Does the solution integrate with other security technologies, such as firewalls or
intrusion detection systems? Can your EDR solution integrate with our existing security
tools or SIEM system? What is the process for setting up these integrations?
9. How does the solution handle outbreak and rapidly evolving threats? How does your
EDR solution stay updated with the latest threat intelligence? Can you describe your
approach to threat detection and threat hunting?
All antivirus technology owners ask for advance payments, almost always 100% in advance.
So, unless clients pay similarly, the service providers come under heavy cash-flow situations.
Therefore, agreeing on 100% advance payments or back-to-back (client pays services/ system
integrator and system integrator pays antivirus technology owners via distributors) payment
options with clients always keeps the cash-registers green and healthy.
For further reference, the payment terms for antivirus solutions can vary depending on the
specific solution being offered. Some common payment options include:
1. Subscription-based: Many antivirus solutions are offered on a subscription basis,
where clients pay a monthly or annual fee to access the solution and receive ongoing
updates and support.
2. Per-device: Some antivirus solutions charge clients based on the number of devices
that the solution is installed on. This can be a useful option for organizations that need
to protect a large number of devices.
3. Per-user: Some antivirus solutions charge clients based on the number of users that
the solution is protecting, rather than the number of devices.
4. One-time fee: Some antivirus solutions are sold as a one-time fee, with no ongoing
subscription or maintenance costs.
5. Volume pricing: Some antivirus vendors offer volume pricing for clients that purchase
large numbers of licenses, as an incentive to increase sales.
These are just a few examples of the types of payment options that are available for antivirus
solutions. The specific payment terms will depend on the solution being offered. It's always
recommended to carefully review the terms and conditions of an antivirus solution before
making a purchase.
Sizing for an anti-virus solution involves determining the necessary resources and capacities
required to effectively protect a computer or network from malware and other security
threats. To do this, you will need to consider the following factors:
1. Environment size: The size of the environment, including the number of endpoints
and servers, will impact the size and capacity requirements of the anti-virus solution.
2. Threat landscape: The threat landscape will impact the number of malware detections
and the frequency of malware updates required, which will impact the processing
power, storage, and network bandwidth required.
3. Performance requirements: The performance requirements of the environment,
including the response time and processing power required, will impact the size and
capacity of the anti-virus solution.
4. Resource constraints: The available resources, including processing power, storage,
and network bandwidth, will impact the size and capacity of the anti-virus solution.
5. Scalability: The scalability of the environment, including the ability to add or remove
endpoints or servers as needed, will impact the size and capacity of the anti-virus
solution.
6. Security requirements: The security requirements of the environment, including the
need for real-time threat protection, will impact the size and capacity of the anti-virus
solution.
7. Encryption: Check for existing encryption and whether encryption keys are available
with client or not.
8. Make in India Clauses: Check for Make in India clauses in the compliance. Sometime
data residency and sovereignty compliance guidelines may build complications.
Once you ascertain these, then choose the type of anti-virus solution and the work on the
sizing using the technology and practice teams. In general, it is important to ensure the
solution is appropriately sized for the specific environment and security requirements. This
can help to minimize the risk of performance issues and ensure that the solution is effective
in protecting against malware and other security threats.
3.3.2 To what will Antivirus solution connect to?
There are several things that can go wrong when implementing an antivirus solution,
including:
1. Compatibility issues: The antivirus solution may not be compatible with the systems
and devices that it is intended to protect, leading to performance issues or even
system crashes.
2. Configuration errors: The antivirus solution may be configured incorrectly, leading to
false positives or false negatives, or causing the solution to miss threats.
3. Updates not installed: If antivirus definition updates are not installed regularly, the
solution may be unable to protect against new threats.
4. Human error: The antivirus solution can only be as effective as the people using it.
User error, such as clicking on malicious links or disabling the antivirus solution, can
expose the system to risk.
Service Level Agreements (SLAs) in antivirus services can vary depending on the specific needs
of an organization and the level of service offered by the provider. However, some common
SLAs that can be committed in antivirus services include:
1. Availability: The percentage of time that antivirus software and related systems are
available and functioning as intended.
2. Response time: The amount of time it takes for the antivirus support team to respond
to and resolve a reported issue.
3. Update frequency: The frequency at which the antivirus software is updated to
protect against new threats.
4. Threat detection rate: The percentage of malware incidents detected by the antivirus
software.
5. False positive rate: The percentage of benign files that are incorrectly flagged as
malware by the antivirus software.
6. Incident resolution time: The amount of time it takes to resolve a malware incident,
from the time it is reported to the time it is fully resolved.
7. Data privacy: The measures taken by the antivirus service provider to protect sensitive
data, such as client information, during the course of providing antivirus services.
These are just a few examples of the types of SLAs that can be committed in antivirus services.
The specific SLAs that are included in a contract will depend on the needs and requirements
of the organization. But, please keep in mind, it is not always possible to accurately provide a
resolution time commitment and hence, take penalty conditions in contracts.
3.3.6 Why can't any vendor commit resolution time/ SLA accurately?
An L1 (Level 1) Antivirus Engineer is responsible for the initial triage and response to alerts
generated by the antivirus system. Some of the common activities performed by an L1
Antivirus/EDR Engineer include:
1. Monitoring and triaging alerts: The L1 engineer monitors the alerts generated by the
antivirus and EDR system, assesses their severity, and takes appropriate actions to
investigate and contain the threat.
2. Conducting basic analysis: The L1 engineer performs basic analysis of the alerts to
determine the nature of the threat and identify any affected systems. They may also
search for additional indicators of compromise and communicate their findings to the
L2 or L3 team.
3. Responding to incidents: The L1 engineer responds to security incidents, such as
malware infections or suspicious activity, by initiating remediation steps, such as
isolating or quarantining affected systems.
4. Escalating incidents: If the L1 engineer is unable to contain or remediate a security
incident, they escalate the issue to the L2 or L3 team for further investigation and
response.
5. Maintaining documentation: The L1 engineer maintains detailed documentation of
the alerts, incidents, and their responses, including any remediation steps taken, for
future reference and reporting purposes.
6. Conducting basic maintenance: The L1 engineer may perform basic maintenance
activities on the antivirus and EDR system, such as updating virus definitions or running
scans, to ensure its ongoing effectiveness.
Overall, the L1 Antivirus/EDR Engineer plays a critical role in the initial response to security
incidents and in ensuring the overall effectiveness of the antivirus and EDR system. They work
An L3 (Level 3) Antivirus Engineer is responsible for the overall management of the antivirus,
including designing, implementing, and maintaining the solution. Some of the common
activities performed by an L3 Antivirus Engineer include:
1. Design and architecture: The L3 engineer is responsible for designing and architecting
the antivirus and EDR system, ensuring that it meets the organization's security
requirements, is scalable, and integrates effectively with other security technologies.
2. Technical leadership: The L3 engineer provides technical leadership to the L1 and L2
teams, serving as a subject matter expert and providing guidance and direction on
Sl
Head Service Engineer work particulars Frequency
No.
Monitoring and Monitor the EDR console to identify any security incidents or
1 Daily
Incident Response alerts triggered by potential threats on endpoints
Investigate and triage security incidents to assess their severity,
2 Incident Triage Daily
impact, and root cause.
Threat Hunting and Conduct proactive threat hunting activities using 's EDR capabilities
3 Daily
intelligence to identify hidden or advanced threats on endpoints.
Endpoint Health Review the health and status of endpoints, ensuring that the
4 Daily
Checks agent is operational and up to date.
Provide technical support and troubleshooting assistance to end-
Troubleshooting and
5 users and other IT or security teams related to EDR functionalities Daily
Support
and deployments.
Security Policy Review and fine-tune security policies within the console to align
6 Daily
Management with the organization's security requirements.
Vulnerability Use the platform's vulnerability assessment features to identify
7 Assessment and vulnerable endpoints and collaborate with IT teams to prioritize Daily
Patching patching.
Analyze and investigate suspicious files or incidents to determine if
8 Malware Analysis Daily
they represent real threats.
Creating and Create or modify detection and response rules in to improve
9 Daily
Modifying Rules threat detection or response capabilities.
Collaborate with other security teams, such as SOC (Security
Engagement with
10 Operations Center) or incident response teams, to share Daily
Other Security Teams
intelligence and coordinate response efforts
Maintain documentation of incidents, investigations, and actions
11 Documentation Daily
taken for future reference and reporting.
Conduct training sessions and workshops for end-users to raise
End-User Training and
12 awareness about cybersecurity best practices and proper use of Daily
Education
the EDR solution.
Review external threat intelligence sources to stay informed about
Analyzing Threat
13 the latest threats and vulnerabilities, and apply relevant Daily
Intelligence
information to improve the organization's security posture.
Integrate with other security tools, such as SIEM or SOAR
Security Tool
14 platforms, to streamline incident response workflows and enhance Daily
Integration
overall security operations.
Stay updated on the latest trends, technologies, and best practices
15 Continuous Learning in cybersecurity and EDR to enhance your expertise and Daily
effectiveness in the role.
Root Cause Analysis Revisit previous security incidents and conduct root cause analyses
8 Monthly
Review to identify systemic issues and opportunities for prevention
Reevaluate the baseline behavior and security posture of
Endpoint Baseline
9 endpoints. Update baselines as needed to improve threat Monthly
Review
detection accuracy
Vendor Engage with representatives or participate in vendor webinars to
10 Monthly
Communication stay informed about product updates, features, and best practices
Review and remove any outdated or unnecessary policies, rules, or
11 Endpoint Cleanup configurations to maintain a streamlined and efficient EDR Monthly
environment
Compile monthly security metrics and reports to track the overall
Security Metrics and
12 security posture and demonstrate the effectiveness of the EDR Monthly
Reporting
solution to stakeholders
Collaborate with management to plan budget allocations for
Budget and Resource
13 cybersecurity initiatives and resource requirements for ongoing Monthly
Planning
EDR operations.
Dedicate time for self-learning and professional development in
14 Continuous Education the field of cybersecurity to enhance expertise and stay up-to-date Monthly
with industry trends
Participate in strategic planning sessions to align EDR initiatives
15 Strategic Planning Monthly
with the organization's broader cybersecurity and business goals
Sl
Head Service Engineer work particulars Frequency
No.
Communicate with the EDR Service Engineer team to assign tasks,
1 Team Coordination Daily
prioritize activities, and ensure smooth workflow
Review and oversee the handling of security incidents and alerts
2 Incident Management triggered by the EDR platform. Provide guidance and support in Daily
incident response efforts.
Performance Monitor the performance and health of the EDR solution and
3 Daily
Monitoring endpoints to ensure optimal functioning.
Collaborate with other IT and security teams, such as SOC, IR, and
Engagement with
4 IT operations, to ensure effective communication and Daily
Stakeholders
coordination.
Review and analyze daily metrics and reports related to EDR
5 Reporting and Metrics Daily
performance, security incidents, and response times
Allocate resources appropriately to address high-priority tasks and
6 Resource Allocation Daily
incidents efficiently.
Escalation Manage escalations from the EDR Service Engineer team and
7 Daily
Management provide guidance in resolving complex issues.
Vendor Interact with representatives or support teams to address
8 Daily
Communication technical issues, feature requests, or other inquiries
Training and Support the professional development of the EDR Service Engineer
9 Daily
Development team by providing training, mentorship, and guidance
Review security policies and configurations within the EDR
Policy Review and
10 platform. Ensure they align with security best practices and Daily
Update
organizational requirements
Ensure that the EDR operations adhere to relevant regulatory
11 Compliance Oversight Daily
requirements and compliance standards
Collaboration with Liaise with upper management to provide updates on EDR
12 Daily
Management operations, progress, and key performance indicators
Continuous
Identify areas for process improvement and implement strategies
13 Improvement Daily
to enhance the effectiveness and efficiency of the EDR service
Initiatives
Interact with key customers to address their concerns, gather
14 Customer Engagement Daily
feedback, and ensure satisfaction with the EDR service
Risk Assessment and Assess potential risks to the EDR infrastructure and develop
15 Daily
Mitigation mitigation plans to minimize security vulnerabilities
The governance of an antivirus solution refers to the policies, processes, and practices that
are put in place to manage, monitor, and maintain the solution over time. The goal of antivirus
governance is to ensure that the solution is effective, efficient, and aligned with the needs
and goals of the organization. Some key aspects of antivirus governance include:
1. Policy development: Developing clear policies that outline the scope, purpose, and use
of the antivirus solution, as well as the responsibilities of users and administrators.
2. Deployment planning: Carefully planning and executing the deployment of the
antivirus solution, including considerations such as testing, training, and support.
The governance of an EDR (Endpoint Detection and Response) solution involves establishing
policies, procedures, and controls to effectively manage and secure the use of the EDR
technology within an organization. Proper governance ensures that the EDR solution aligns
with the organization's security objectives, compliance requirements, and overall IT strategy.
Here's a step-by-step guide on how to govern an EDR solution effectively:
1. Define Governance Objectives: Clearly define the goals and objectives of governing
the EDR solution. Consider factors such as improving cybersecurity posture, reducing
incident response times, and ensuring compliance with industry regulations.
2. Establish a Governance Team: Form a cross-functional governance team that includes
representatives from IT, security, compliance, legal, and other relevant departments.
Assign roles and responsibilities within the team.
3. Develop EDR Policies and Procedures: Create comprehensive policies and procedures
specifically related to the use of the EDR solution. These documents should cover areas
such as incident response, data privacy, access control, and compliance.
4. Policy Review and Approval: Ensure that the EDR policies and procedures are reviewed
and approved by senior management or relevant stakeholders. Obtain their buy-in and
support.
A mobile threat defense (MTD) solution is a type of software designed to protect mobile
devices against various security threats such as malware, malicious apps, phishing attacks,
and unauthorized access. MTD solutions typically use a combination of technologies such as
endpoint protection, mobile device management (MDM), mobile application management
(MAM), and threat intelligence to secure devices and protect sensitive data. Some MTD
solutions also provide features such as real-time monitoring, device management, and
reporting to help organizations manage and mitigate mobile security risks. The goal of MTD is
to prevent data breaches and protect sensitive information on mobile devices, both for
personal and business use.
4.1.1 EMM, MDM, MTD: What are these?
Enterprise Mobility Management (EMM), Mobile Device Management (MDM), and Mobile
Threat Defense (MTD) are related to securing mobile devices but serve different purposes.
EMM is a broader concept that encompasses MDM and provides additional functions beyond
just device management. EMM solutions provide a comprehensive approach to managing and
securing mobile devices, applications, and data across an organization. EMM solutions
typically include MDM capabilities, but also provide additional features such as mobile
application management (MAM), security and access control, and the ability to manage both
corporate and personal devices.
MDM refers to the process of managing and securing mobile devices such as smartphones
and tablets that are used for both personal and business purposes. MDM solutions provide
centralized control over devices, allowing IT administrators to manage device configurations,
enforce security policies, and remotely wipe devices in case of theft or loss.
MTD, on the other hand, is a type of software that focuses on protecting mobile devices from
specific security threats such as malware, phishing attacks, and unauthorized access. MTD
solutions typically use threat intelligence and endpoint protection to provide real-time
monitoring and protection against security threats.
A 20- point difference is as per the table below:
In summary, while EMM provides a more comprehensive solution for managing and securing
the entire mobile ecosystem within an organization, MDM provides a broader set of
management and control functions, and MTD focuses specifically on security and protecting
devices against specific security threats. In many cases, to provide a comprehensive mobile
device security solution, organizations use both EMM/ MDM and MTD solutions.
There are several types of Enterprise Mobility Management (EMM), Mobile Device
Management (MDM), and Mobile Threat Defense (MTD) solutions available on the market:
EMM:
1. Full-fledged EMM: Provides a comprehensive solution for managing and securing
mobile devices, applications, and data across an organization.
2. Standalone EMM: Focuses on a specific aspect of EMM, such as mobile application
management (MAM) or security.
MDM:
1. On-premises MDM: Software installed on an organization's internal servers to manage
and secure mobile devices.
2. Cloud-based MDM: Manages and secures mobile devices through a cloud-based
solution.
MTD:
All EMM, MDM, MTD technology owners ask for advance payments, almost always 100% in
advance. So, unless clients pay similarly, the service providers come under heavy cash-flow
situations. Therefore, agreeing on 100% advance payments or back-to-back (client pays
services/ system integrator and system integrator pays EMM, MDM, MTD technology owners
It is important to work closely with the technology owner and client to ensure that the EMM,
MDM, or MTD solution is appropriately sized for organization's specific requirements. The
technology owner and client should be able to provide guidance and recommendations based
on organization's specific needs and requirements.
4.3.2 To what will EMM, MDM, MTD solution connect to?
Enterprise Mobility Management (EMM), Mobile Device Management (MDM), and Mobile
Threat Defense (MTD) solutions can integrate with a variety of other systems to enhance their
functionality and capabilities. Some common systems that may connect to an EMM, MDM, or
MTD solution include:
1. Active Directory (AD): Integration with AD allows for seamless user authentication and
authorization within the EMM, MDM, or MTD solution.
2. Identity and Access Management (IAM) systems: Integration with IAM systems can
enhance the security of the EMM, MDM, or MTD solution by providing additional
layers of authentication and authorization.
3. Mobile Application Management (MAM) solutions: Integration with MAM solutions
can enhance the application management capabilities of the EMM, MDM, or MTD
solution.
4. Mobile content management systems: Integration with mobile content management
systems can enhance the data protection and privacy capabilities of the EMM, MDM,
or MTD solution.
5. Email systems: Integration with email systems can enhance the email management
capabilities of the EMM, MDM, or MTD solution.
6. Network security solutions: Integration with network security solutions (e.g., firewalls,
intrusion detection systems) can enhance the security of the EMM, MDM, or MTD
solution by providing additional layers of protection.
It is important to carefully evaluate the integration requirements of organization's systems
and to work with the System Integrator to ensure that the EMM, MDM, or MTD solution
integrates with the necessary systems. The System Integrator should be able to provide
guidance and recommendations on the most appropriate integration approach.
There are several things that can go wrong when implementing an Enterprise Mobility
Management (EMM), Mobile Device Management (MDM), or Mobile Threat Defense (MTD)
solution, including:
Service Level Agreements (SLAs) in EMM MDM MTD services can vary depending on the
specific needs of an organization and the level of service offered by the provider. However,
some common SLAs that can be committed in EMM MDM MTD solution include:
1. Availability: The percentage of time that the EMM, MDM, or MTD solution is available
and accessible to users.
2. Response time: The amount of time it takes for the vendor to respond to support
requests or incidents.
3. Resolution time: The amount of time it takes for the technology owner to resolve
support requests or incidents.
4. Upgrades: The frequency and timing of software upgrades and patches provided by
the vendor.
5. Data protection: The level of protection provided for sensitive data stored or
processed by the EMM, MDM, or MTD solution.
6. Compliance: The level of compliance with various regulations and standards required
by the organization.
7. Training: The level of training provided to users and administrators on the use of the
EMM, MDM, or MTD solution.
These are just a few examples of the types of SLAs that can be committed in EMM, MDM, or
MTD services. The specific SLAs that are included in a contract will depend on the needs and
requirements of the organization. But, please keep in mind, it is not always possible to
Daily EMM MDM MTD operation activities typically include the following tasks:
1. Monitoring: Regularly monitoring the EMM, MDM, or MTD solution to ensure that it
is functioning properly and to identify any issues or potential threats.
2. Device management: Managing and updating the configurations of mobile devices,
including enrolling new devices, managing device profiles, and securing devices.
3. User management: Managing and updating user accounts, including creating new
accounts, revoking access, and managing user permissions.
4. Security management: Implementing and monitoring security policies, such as device
encryption, password policies, and access control.
5. Software updates: Installing software updates and patches to ensure that the EMM,
MDM, or MTD solution is up-to-date and secure.
Weekly EMM, MDM, or MTD operation activities typically include the following tasks:
1. Device inventory management: Updating the inventory of mobile devices, including
adding new devices, retiring old devices, and updating device information.
2. Policy management: Reviewing and updating security policies to ensure that they
remain effective and relevant.
3. Incident management: Reviewing and responding to security incidents, such as
malware infections, lost or stolen devices, or unauthorized access attempts.
4. Compliance reporting: Generating and reviewing reports to ensure that the EMM,
MDM, or MTD solution follows various regulations and standards required by the
organization.
5. User training: Providing training and support to users and administrators on the use of
the EMM, MDM, or MTD solution.
6. System updates: Installing software updates and patches to ensure that the EMM,
MDM, or MTD solution is up-to-date and secure.
7. Performance monitoring: Monitoring the performance of the EMM, MDM, or MTD
solution and identifying any potential issues.
It is important to establish a routine and regularly perform these activities to ensure that the
EMM, MDM, or MTD solution is functioning properly and providing the necessary protection
and support for mobile devices. Additionally, these weekly activities can help identify areas
for improvement and ensure that the EMM, MDM, or MTD solution continues to meet the
evolving needs of the organization.
Monthly EMM, MDM, or MTD operation activities typically include the following tasks:
An L1 EMM, MDM, or MTD Engineer is responsible for providing first-level technical support
and resolving simple issues. This may include tasks such as password resets, device enrolment,
and basic troubleshooting. L1 (Level 1) EMM (Enterprise Mobility Management), MDM
(Mobile Device Management), or MTD (Mobile Threat Defense) Engineer activities typically
involve the following:
1. Providing first-level technical support: The L1 engineer is responsible for handling the
initial support requests and troubleshooting issues related to EMM, MDM, or MTD
systems. They should have a good understanding of the system and be able to resolve
basic issues or escalate them to the appropriate level.
2. Monitoring system alerts: The L1 engineer is responsible for monitoring system alerts
and notifications and taking appropriate action when necessary. This can include
investigating system failures or errors, resolving issues related to user access, or
escalating issues to higher levels when necessary.
3. Performing system maintenance: The L1 engineer is responsible for performing
regular maintenance tasks, such as system updates and patches, to ensure that the
EMM, MDM, or MTD system is functioning properly.
4.4.7 Reports
Governance refers to the processes and policies that ensure the effective and efficient
management of an Enterprise Mobility Management (EMM), Mobile Device Management
(MDM), or Mobile Threat Defense (MTD) solution. Effective governance of these solutions is
crucial to ensure that they provide the necessary protection and support for mobile devices,
while also balancing the needs of the organization and its employees. The following are some
key elements of governance for an EMM, MDM, or MTD solution:
1. Policies and procedures: Policies and procedures are the foundation of effective
governance for an EMM, MDM, or MTD solution. They provide guidelines and
standards for how the solution should be used and maintained and help ensure that it
is used in a consistent and effective manner.
2. Security controls: Effective governance of an EMM, MDM, or MTD solution requires
the implementation of robust security controls to protect against threats and prevent
data breaches. These controls can include encryption, access control, and security
monitoring and reporting.
3. Compliance management: Compliance with regulations and standards is an important
aspect of governance for an EMM, MDM, or MTD solution. Organizations must ensure
that their solution is compliant with relevant regulations and standards, such as HIPAA,
PCI DSS, and ISO 27001.
4. User management: Effective governance of an EMM, MDM, or MTD solution requires
the proper management of users and their access to the solution. This includes the
management of user roles, permissions, and authentication.
5. Risk management: Risk management is a crucial component of governance for an
EMM, MDM, or MTD solution. Organizations must assess the risks associated with
their solution and implement controls to mitigate these risks.
================== END==================
As a CISO and Head, Cybersecurity, Sudhansu M Nayak specialises and spearheads enterprise
cybersecurity (IT/ OT), cloud, and data transformation solutions. He advises CxOs and Executive Boards
on cyber risks and techno-operational mitigation, data privacy and protection, and compliance and
governance.
As an avid consultant to multiple think-tanks, he contributes to building of various components of
national cybersecurity policies. His research and views have been cited in Centre for Land Warfare
Studies (CLAWS), The Cyber Defense Review, (Army Cyber Institute, Australia), DQChannels,
TechPanda, and others.
To bridge the cybersecurity skill-gaps, he mentors, corporates, students, and startups. A passionate
speaker, he talks on Cybersecurity and its engagement in international policies and digital
transformation. His current research is focussed on the interplay of cybersecurity with global peace,
state espionage, climate change, international trade, and strategic diplomacy.
In his free time, Sudhansu writes on Indian temples, experiments on indo-continental dishes, and
dabbles in photography.
Twitter: @smnayak
LinkedIn: https://www.linkedin.com/in/sudhansunayak/