ao link
Affino
Search Teiss
My Account
Remember Login
My Account
Remember Login

Tackling the cyber-threat

Sponsored by ManageEngine

An all-in-one endpoint platform enables organisations to consolidate devices, apps and data in one place, reducing the risk from cyber-criminals while enhancing IT and employee productivity

Linked InTwitterFacebook

Recent ransomware attacks which have impacted major grocery stores and retailers, including Starbucks and Sainsbury’s, demonstrate the risks organisations face from cyber-criminals.

 

“Businesses face a triple threat from these attacks,” says Achuthan Ramesh, Lead, Product Marketing, Endpoint Security solutions at ManageEngine. “There is a loss of productivity, there’s a loss of revenue because they need to pay ransoms, and data also often gets leaked.”

 

Often the biggest risk for organisations is unpatched vulnerabilities in IT systems. “That is the baseline upon which you can build your security,” says Ramesh. “Unpatched vulnerabilities are the primary reason through which organisations can avoid around 90 per cent of cyber-attacks.”

 

Another major threat organisations face is data leakage, often caused by lack of security measures, or unclear policies around mobile phones, USB sticks or employees’ personal devices. Businesses need to strike a balance here, however. “Completely blocking all USB sticks is not going to work because it will affect your productivity,” says Ramesh. “The answer is to allow employees to use USB drives but to include a back-end mechanism with an added layer of security.”

 

Having effective security measures in place, however, requires careful monitoring by IT teams. But this can often be hampered by multiple solutions, each aimed at specific threats, explains Ramesh. “The average business uses five or six solutions, and often the output of one happens to be the input of another,” he says. “It means companies need to depend on one more solution, and that’s where the problem of integration comes in.” This can also mean different vendors, he adds, which can lead to additional complexity.

 

The answer to this is to have a single solution that can not only secure a company’s IT systems and data but also provide a framework for the effective management of assets, which can lead to productivity benefits for employees as well as IT teams. “It’s not just beneficial from the data security or enterprise data perspective but also for the system administrators,” says Ramesh. “It means you don’t have to run multiple servers, have multiple agents or contact multiple support teams.”

 

ManageEngine’s Endpoint Central provides a comprehensive solution, offering organisations a single place to manage devices, through one unified dashboard. This can simplify the management of IT, including the licensing of any software and compliance with reporting and auditing requirements.

Devices can be managed from employee onboarding, with all applications set up ready for use, to the point when a device is decommissioned. “It’s possible to deploy an application on an employee machine without any user intervention,” says Ramesh. “That ensures that the employee’s time is spent doing more productive work.” IT teams can lock the device in case it is lost or stolen, helping to protect data.

 

Having a single interface can also help improve the productivity of IT teams. “Server patching is vital, but a server is essential to an organisation, so you cannot update it as you would other workstations,” he says. “Our system doesn’t require a system administrator to manually do the patching process, so it can happen during non-working hours.” Applications can also be updated based on policies designed to minimise disruption for employees. 

 

From a security perspective, the solution provides a simple way to safeguard devices, browsers and systems through intelligent monitoring and pre-emptive security mechanisms. Central to this is application control and privilege management, and the system capabilities have all been based on customer feedback, says Ramesh. “Companies can choose to allow certain interface applications only to run on workstations or mobile devices,” he says.

 

“They can also handle privileges for these applications, using just-in-time access, where people are granted only temporary access.” Controls can also be put in place around data, restricting which cloud services this can be uploaded to, and monitoring how information is sent outside of the organisation.

 

Alongside this, Endpoint’s next-gen antivirus (NGAV) capabilities provide ongoing protection against malware, including viruses, worms, trojan horses and spyware. This is complemented by the anti-ransomware solution, which uses artificial intelligence (AI) and machine learning (ML) to help counter ransomware attacks.

 

“There are millions of cyber-attacks happening on a daily basis and these encrypt all the interface data that is present,” explains Ramesh. “The solution for business continuity is to take backups, which we do with Microsoft’s Volume Shadow Copy Service (VSS). But cyber-attackers know this, so they try to target the copies present in VSS. We use patented algorithms which prevent this from happening, so those VSS backups are tamper-proof.”

 

The ML element then learns from malware that is released every day, and updates the AI algorithms in response to this. “The moment it identifies behaviour that mimics the effect of a ransomware attack, it will notify the system administrator,” says Ramesh. 

“The system gets quarantined and the data gets recovered so that subsequent attacks will not happen. AI is used to secure backups and prevent attacks on those, and ML to try to understand the behaviour of ransomware attacks.” Having one system to monitor all threats also helps to overcome “alert fatigue”, he says, where IT teams receive so many alerts they may risk missing an important one. 

 

Both the antivirus and anti-ransomware elements operate using offline protection, adds Ramesh. “We do not depend on a server or network,” he says. “All of the behaviour detection happens at the agent level. The agent knows how the system and employee behave, and once it detects an anomaly, the device automatically gets quarantined from the network, which means they cannot access any more enterprise resources. This combination can protect your organisation from such ransomware attacks.”


To find out more about how ManageEngine’s Endpoint Central system could help your business stay on top of cyber-threats, visit manageengine.com/products/desktop-central/features.html

Sponsored by ManageEngine
Linked InTwitterFacebook
Affino

Winston House, 3rd Floor, Units 306-309, 2-4 Dollis Park, London, N3 1HF

23-29 Hendon Lane, London, N3 1RT

020 8349 4363

© 2025, Lyonsdown Limited. teiss® is a registered trademark of Lyonsdown Ltd. VAT registration number: 830519543