explore.tanium.com
Open in
urlscan Pro
52.72.247.46
Public Scan
Submitted URL: https://go2.tanium.com/dc/8P0__QGRLJ1eCmlftrgo3ObMwUsmzj-9lh6LwKiqXT_rSqSo4wcW7llEYMMZXHfUh90O7bTnMzBzMolPHMYcd7jStmEgS...
Effective URL: https://explore.tanium.com/c/eb-it-analytics-cyber-hygiene?x=FswsQu&mkt_tok=NzkwLVFGSi05MjUAAAGKo7f1rT6sbM20OT6JV6NeFsH2-QM...
Submission: On March 21 via manual from US — Scanned from DE
Effective URL: https://explore.tanium.com/c/eb-it-analytics-cyber-hygiene?x=FswsQu&mkt_tok=NzkwLVFGSi05MjUAAAGKo7f1rT6sbM20OT6JV6NeFsH2-QM...
Submission: On March 21 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Thumbnails Document Outline Attachments Layers Current Outline Item Previous Next Highlight All Match Case Match Diacritics Whole Words Color Size Color Thickness Opacity Presentation Mode Open Print Download Current View Go to First Page Go to Last Page Rotate Clockwise Rotate Counterclockwise Text Selection Tool Hand Tool Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling No Spreads Odd Spreads Even Spreads Document Properties… Toggle Sidebar Find Previous Next of 9 Presentation Mode Open Print Download Current View FreeText Annotation Ink Annotation Tools Zoom Out Zoom In Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300% 400% IT Analytics: The Foundation for Cyber Hygiene Tools and best practices for a healthier, more secure distributed enterprise. ©2021 Tanium. All rights reserved.2 Cyber hygiene describes a set of practices, behaviors and tools designed to keep the entire IT environment healthy and running at peak performance. Robust security depends on cyber hygiene. This eBook describes the foundations of cyber hygiene in the context of data and analytics. What data do you need, and how can you use it to make the most informed, effective IT decisions for your organization? Chapter 1: The disconnect between tools and policy Analytics and fresh data can highlight the disconnect between tools and policy. People become attached to and comfortable with certain tools, so it’s very common that they create policies around what their tools can do instead of what the situation requires. Entire careers and partner ecosystems are built on the ability to use and maintain certain tools for certain purposes. Here’s a common scenario. Before deploying Tanium, some of our customers had 12-hour maintenance windows in which to patch their devices and get them up and running. The maintenance window was 12 hours because they couldn’t do it any faster with the tools they used. When we demonstrate this can be done faster and more efficiently with less downtime, management sees the business value of that. Engineers usually want to stick with the tools they’ve been using. It often takes a business driver — backed by data — to force a change. Chapter 2: Operations and security. Collaborators or competitors? In a perfect world, the work of IT operations and security would coalesce into one seamless, joint effort. But in most organizations, there’s a fairly sharp dividing line between the two. At Tanium, you’ll often hear the operations team say to security, “Our job is hygiene and if we do it right, it makes your life easier.” And it’s true. Because then the forensic analysts, the threat hunters, can focus on bigger threats — like nation-state hackers — instead of the commodity malware that gets caught by antivirus (AV) or the alerts based on a known patch. The tension between operations and security comes from different worldviews. Security wants to lock everything down. Operations wants the environment to be secure but open enough to allow the organization to maximize performance at every opportunity. Patching and vulnerabilities are usually where conflicts arise because these things live in the “netherworld” between operations and security. On the operations side, tools exist to deal with those things before security ever sees them. If you’re doing your job on the operations side, when security says, “Here are the vulnerabilities we found,” it should be a very small number because you’re not waiting for them to tell you what to patch. Then, of course, is the user experience. Have you consumed so many system resources with security tooling that users can’t do anything? Is memory blown out? Are applications crashing? You need to have a way to measure user experience. There are no industry standards for user experience, so you have to set your own. Analytics should be the common language of operations and security IT analytics is an extremely broad topic since IT is spread across several areas, including computing, user experience, infrastructure, storage, and networking. Analytics has different meanings depending on what it’s applied to and for whom the results are intended. For example, if we think about the end-user experience, IT analytics can provide the boot time of a device, the application launch or response time, as well as application crashes over a period of time, a set of devices or a department. With a remote workforce potentially using virtual desktops, you might look at the trend of storage use over time and how WFH has or could influence infrastructure spending for the next 6, 12 or 18 months. ©2021 Tanium. All rights reserved.3 Analytics is about maintaining your ability to discover relevant data, making sure endpoints are delivering the right kind of reporting when queried and accurately describing the capability of the network. Analytics provides the hard data you need to measure network performance. Operations uses that data to maximize business productivity. Security uses it to better protect the organization from threats. Analytics is equally critical for operations and security. A platform approach to tooling, rather than a point solution, can build a bridge between operations and security. Chapter 3: What is good cyber hygiene? Good cyber hygiene is knowing what you have and controlling it. Do you have the software licenses you need? Are you out of compliance and at risk for penalties? Are you paying for licenses you’re not using? Are your endpoints configured properly? Think of endpoints in three categories: managed, unmanaged and unmanageable. Not all endpoints are computers or servers. That’s why good cyber hygiene requires tools that identify and manage things like cell phones, printers and machines on a factory floor. There’s no single tool that can identify and manage every type of endpoint. But the more visibility you have, the better your cyber hygiene and your risk posture. Work from home (WFH) made visibility much harder. If endpoints aren’t always on the network, how do you measure them? Many tools weren’t built to manage that. But once you know what devices you have, where they are and what’s on them, you can enforce policies that ensure devices behave as they should. To assess your cyber hygiene, ask the following questions: • What endpoint devices do you have? • Are those endpoint devices being managed? • Do managed endpoints meet the criteria set for a healthy endpoint? More Information Less Information Close Enter the password to open this PDF file. Cancel OK File name: - File size: - Title: - Author: - Subject: - Keywords: - Creation Date: - Modification Date: - Creator: - PDF Producer: - PDF Version: - Page Count: - Page Size: - Fast Web View: - Close Preparing document for printing… 0% Cancel This site uses cookies to provide a personalized content experience and track visitor engagement. Learn More AcceptDecline NEXT NEXT Forrester Study: The Total Economic Impact of Tanium Forrester Consulting’s independent study examines the return on investment organizations may realize by deploying the Tanium platform. See Tanium Live Try Tanium Today What Is Converged Endpoint Management?webpage Converged Endpoint Management (XEM) Overviewpdf What you don’t know can hurt you: Expert risk advicepdf Tanium Risk Assessmentwebpage Client Management: 10 Ways Tanium Makes it Faster, Simpler, Easierwebpage IT Analytics: The Foundation for Cyber Hygienepdf Forrester Study: The Total Economic Impact of Taniumpdf How Tanium Could Generate ROI of 277% Over Three Yearswebpage How vulnerable is your IT estate?pdf VITAS Healthcare case study: Remote patchingpdf