explore.tanium.com Open in urlscan Pro
52.72.247.46  Public Scan

Submitted URL: https://go2.tanium.com/dc/8P0__QGRLJ1eCmlftrgo3ObMwUsmzj-9lh6LwKiqXT_rSqSo4wcW7llEYMMZXHfUh90O7bTnMzBzMolPHMYcd7jStmEgS...
Effective URL: https://explore.tanium.com/c/eb-it-analytics-cyber-hygiene?x=FswsQu&mkt_tok=NzkwLVFGSi05MjUAAAGKo7f1rT6sbM20OT6JV6NeFsH2-QM...
Submission: On March 21 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Thumbnails Document Outline Attachments Layers

Current Outline Item


Previous

Next
Highlight All Match Case
Match Diacritics Whole Words

Color
Size
Color
Thickness
Opacity
Presentation Mode Open Print Download Current View

Go to First Page Go to Last Page

Rotate Clockwise Rotate Counterclockwise

Text Selection Tool Hand Tool

Page Scrolling Vertical Scrolling Horizontal Scrolling Wrapped Scrolling

No Spreads Odd Spreads Even Spreads

Document Properties…
Toggle Sidebar

Find
Previous

Next
of 9
Presentation Mode Open Print Download Current View

FreeText Annotation Ink Annotation

Tools
Zoom Out

Zoom In
Automatic Zoom Actual Size Page Fit Page Width 50% 75% 100% 125% 150% 200% 300%
400%

IT Analytics: The Foundation
for Cyber Hygiene
Tools and best practices for a healthier, more secure
distributed enterprise.

©2021 Tanium. All rights reserved.2
Cyber hygiene describes a set of practices, behaviors and tools designed to
keep the entire IT environment healthy and running at peak performance.
Robust security depends on cyber hygiene.
This eBook describes the foundations of cyber hygiene in the context of data
and analytics. What data do you need, and how can you use it to make the
most informed, effective IT decisions for your organization?
Chapter 1: The disconnect between tools and policy
Analytics and fresh data can highlight the disconnect between tools and
policy. People become attached to and comfortable with certain tools,
so it’s very common that they create policies around what their tools
can do instead of what the situation requires. Entire careers and partner
ecosystems are built on the ability to use and maintain certain tools for
certain purposes.
Here’s a common scenario. Before deploying Tanium, some of our
customers had 12-hour maintenance windows in which to patch their
devices and get them up and running. The maintenance window was 12
hours because they couldn’t do it any faster with the tools they used.
When we demonstrate this can be done faster and more efficiently with
less downtime, management sees the business value of that. Engineers
usually want to stick with the tools they’ve been using. It often takes a
business driver — backed by data — to force a change.
Chapter 2: Operations and security. Collaborators
or competitors?
In a perfect world, the work of IT operations and security would coalesce
into one seamless, joint effort. But in most organizations, there’s a fairly
sharp dividing line between the two.
At Tanium, you’ll often hear the operations team say to security, “Our job is
hygiene and if we do it right, it makes your life easier.” And it’s true.
Because
then the forensic analysts, the threat hunters, can focus on bigger threats
— like nation-state hackers — instead of the commodity malware that gets
caught by antivirus (AV) or the alerts based on a known patch.
The tension between operations and security comes from different
worldviews. Security wants to lock everything down. Operations wants the
environment to be secure but open enough to allow the organization to
maximize performance at every opportunity. Patching and vulnerabilities
are usually where conflicts arise because these things live in the
“netherworld” between operations and security.
On the operations side, tools exist to deal with those things before security
ever sees them. If you’re doing your job on the operations side, when
security says, “Here are the vulnerabilities we found,” it should be a very
small number because you’re not waiting for them to tell you what to patch.
Then, of course, is the user experience. Have you consumed so many system
resources with security tooling that users can’t do anything? Is memory
blown out? Are applications crashing? You need to have a way to measure
user experience. There are no industry standards for user experience, so you
have to set your own.
Analytics should be the common language of operations
and security
IT analytics is an extremely broad topic since IT is spread across several
areas, including computing, user experience, infrastructure, storage, and
networking. Analytics has different meanings depending on what it’s
applied to and for whom the results are intended.
For example, if we think about the end-user experience, IT analytics can
provide the boot time of a device, the application launch or response time,
as well as application crashes over a period of time, a set of devices or
a department.
With a remote workforce potentially using virtual desktops, you might look
at the trend of storage use over time and how WFH has or could influence
infrastructure spending for the next 6, 12 or 18 months.

©2021 Tanium. All rights reserved.3
Analytics is about maintaining your ability to discover relevant data, making
sure
endpoints are delivering the right kind of reporting when queried and accurately
describing the capability of the network.
Analytics provides the hard data you need to measure network performance.
Operations uses that data to maximize business productivity. Security uses it
to better protect the organization from threats. Analytics is equally critical
for
operations and security. A platform approach to tooling, rather than a point
solution, can build a bridge between operations and security.
Chapter 3: What is good cyber hygiene?
Good cyber hygiene is knowing what you have and controlling it. Do you have
the software licenses you need? Are you out of compliance and at risk for
penalties? Are you paying for licenses you’re not using? Are your endpoints
configured properly?
Think of endpoints in three categories: managed, unmanaged and unmanageable.
Not all endpoints are computers or servers. That’s why good cyber hygiene
requires
tools that identify and manage things like cell phones, printers and machines on
a factory floor. There’s no single tool that can identify and manage every type
of
endpoint. But the more visibility you have, the better your cyber hygiene and
your
risk posture.
Work from home (WFH) made visibility much harder. If endpoints aren’t always on
the network, how do you measure them? Many tools weren’t built to manage that.
But once you know what devices you have, where they are and what’s on them, you
can enforce policies that ensure devices behave as they should.
To assess your cyber hygiene, ask the following questions:
• What endpoint devices do you have?
• Are those endpoint devices being managed?
• Do managed endpoints meet the criteria set for a healthy endpoint?







More Information Less Information
Close

Enter the password to open this PDF file.

Cancel OK
File name:

-

File size:

-


Title:

-

Author:

-

Subject:

-

Keywords:

-

Creation Date:

-

Modification Date:

-

Creator:

-


PDF Producer:

-

PDF Version:

-

Page Count:

-

Page Size:

-


Fast Web View:

-

Close
Preparing document for printing…
0%
Cancel


This site uses cookies to provide a personalized content experience and track
visitor engagement.

Learn More
AcceptDecline
NEXT 
NEXT 

Forrester Study: The Total Economic Impact of Tanium
Forrester Consulting’s independent study examines the return on investment
organizations may realize by deploying the Tanium platform.
See Tanium Live
Try Tanium Today
What Is Converged Endpoint Management?webpage
Converged Endpoint Management (XEM) Overviewpdf
What you don’t know can hurt you: Expert risk advicepdf
Tanium Risk Assessmentwebpage
Client Management: 10 Ways Tanium Makes it Faster, Simpler, Easierwebpage
IT Analytics: The Foundation for Cyber Hygienepdf
Forrester Study: The Total Economic Impact of Taniumpdf
How Tanium Could Generate ROI of 277% Over Three Yearswebpage
How vulnerable is your IT estate?pdf
VITAS Healthcare case study: Remote patchingpdf