TWiET 539: .001% Trust - Properly terminating employee accounts, implementing zero-trust with Ericom
This Week in Enterprise Tech (Audio)
00:00
How MDM Is Different From Other Solutions That Do a Device Health Check
The difference really is the way that we're running the cloud infrastructure to keep a, I guess you could call it a moat between the actual apparatus and the potential attacker side of it. It's better to have a container in the cloud get blown up because something got infected on it than it is to have your machine or an application inside of a network. We don't see the traffic, but we're able to see what's going malicious. And then worst case scenario, we blow up a digital machine and it comes back online in 13 seconds and you never know that you really had a problem. Right. Very cool. Now, I'm going to leave the security questions to Kirk's
Play episode from 45:00
Transcript


