Thought Leadership
Zero Trust

Cybersecurity Mythbusters: Is MDM Enough?

Written By
Published On

Transcription

Patrick

Hello and welcome to "Cybersecurity Mythbusters." I'm Patrick McBride, the CMO at Beyond Identity. And I'm joined by our resident cybersecurity expert and our Beyond Identity CTO, Dr. Jasson Casey.

Jasson

So we're really excited for today's myth. Let's just go do it. We got an email from Jordan and it reads, "Dear 'Cybersecurity Mythbusters', I keep hearing more and more about device trust. My boss keeps saying we need better device trust, but I assure him we're okay with the current device management. We already have device trust, right?"

Patrick

Ooh, I've been really waiting for this one. Device trust and the concepts around it have really been gaining some steam with our prospects and customers, and we're seeing it more and more.

Jasson

I understand the confusion. It's a complex issue. And because, of course, the popularity of BYOD, or bring your own device, things have only gotten worse.

Patrick

I know. Let me bring some of the big guns in. I know exactly who we can use to discuss it. We got Dr. Chase Cunningham, otherwise known as Dr. Zero Trust. I think he's the perfect person for this one.

Jasson

While we're waiting on him, this issue is a bit nuanced. It's not just about whether a device is managed. Because a managed device can be misconfigured. It's not just about MDM. These systems get quite complex. Basic device information such as geolocation, serial numbers, device types, IP information. This is all insufficient, as they only provide little vignettes of what's actually going on.

In addition, these are static points in time. And as a device changes, as its state changes, as a user interacts with that device in various ways, the control surface could change. And you really want to understand that in a continuous way.

Patrick

Well, let's bring in Dr. Zero Trust. Welcome, Chase.

Chase

Hey guys, thank you so much for having me. It's great to be here.

Jasson

Chase, what can you tell us about device trust and the best practices for a modern enterprise?

Chase

Yeah, well, I think device trust, in the context of zero trust is really critical. I mean, if you look at the DOD's rollout and maturity models and all those other things, it is specifically noted in there, and if you really wrap your head around where business is today, I've gotta be able to take care of the device, as well as the user, and I have to live in a world where it's BYOD and remote and all those other things.

I have to accept that that's how this functions. I mean, I'm at home right now, remoting in, doing things on the browser. I should have some controls applied to me. If you're not doing those things and you're not living in a world where that is the reality of the way you operate, the only one that benefits is the adversary. By ignoring the value proposition and the value that a device has in the context of compromise and hacks and those other things, you're basically turning a blind eye to a very valid avenue that the bad guys are gonna use for exploits. So you need to know these things. This is not meant to be explicitly difficult and the technology and the space has evolved where you can employ controls via policy at scale and not make people miserable with their cybersecurity.

Patrick

So Chase, what steps can an enterprise take?

Chase

Cybersecurity, zero trust requires, it's not a nice to have, it requires that you do this stuff continually and you can't do a one and done. In other words, you shouldn't have a methodology or practice or policy in place that says, "This came in, I checked it, they're good. And now I'm just gonna let things ride until whenever that system or access goes away." Really, the way that this works best, and I mean, this is why we have visibility and analytics and these things within the framework because you need to know what's going on all the time and you should at any time be able to interdict and respond to a problem when it shows up.

On top of that, this is how you get good understanding of what normal looks like. And if things change or weird stuff occurs, that's something that you want to be able to respond to. You won't see weird things occurring if you're not continually looking at what's going on with these transactions. So you must, and this is again, not a nice to have, to do ZT, you must be able to do this stuff continuously. It's a marathon. This is not a sprint.

Jasson

So Chase, it sounds like Jordan has taken some good first steps. But there's still a few more things for them to do to achieve optimal device trust.

Chase

Yeah, I think that's a fair assessment. I mean, really the goal here is to get towards an optimal state. Even mega, giant government organizations with billions of dollars aligned to this overall strategy. Their goal is to get to optimality. Perfection does not exist. Really what you're trying to get to is where you have an optimal experience, you have controls applied where they need to be applied. You're not making people miserable, and you can actually enable the business to operate securely. So I think he's on his way there. As in the Navy, we would say, "He is on the glide slope." But there's always work to be done.

Patrick

Excellent. Hey, thanks, Chase. I knew we could count on you for this one.

Chase

I really appreciate you guys letting me be involved and keep up with what you're doing. Good stuff.

Jasson

Well, there you have it, Jordan. And thank you to everyone for tuning in.

Patrick

If you have any rumors, questions or myths you want us to test, be sure to let us know. We'll see you next...

Get started with Device360 today
Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.

Cybersecurity Mythbusters: Is MDM Enough?

Download

Transcription

Patrick

Hello and welcome to "Cybersecurity Mythbusters." I'm Patrick McBride, the CMO at Beyond Identity. And I'm joined by our resident cybersecurity expert and our Beyond Identity CTO, Dr. Jasson Casey.

Jasson

So we're really excited for today's myth. Let's just go do it. We got an email from Jordan and it reads, "Dear 'Cybersecurity Mythbusters', I keep hearing more and more about device trust. My boss keeps saying we need better device trust, but I assure him we're okay with the current device management. We already have device trust, right?"

Patrick

Ooh, I've been really waiting for this one. Device trust and the concepts around it have really been gaining some steam with our prospects and customers, and we're seeing it more and more.

Jasson

I understand the confusion. It's a complex issue. And because, of course, the popularity of BYOD, or bring your own device, things have only gotten worse.

Patrick

I know. Let me bring some of the big guns in. I know exactly who we can use to discuss it. We got Dr. Chase Cunningham, otherwise known as Dr. Zero Trust. I think he's the perfect person for this one.

Jasson

While we're waiting on him, this issue is a bit nuanced. It's not just about whether a device is managed. Because a managed device can be misconfigured. It's not just about MDM. These systems get quite complex. Basic device information such as geolocation, serial numbers, device types, IP information. This is all insufficient, as they only provide little vignettes of what's actually going on.

In addition, these are static points in time. And as a device changes, as its state changes, as a user interacts with that device in various ways, the control surface could change. And you really want to understand that in a continuous way.

Patrick

Well, let's bring in Dr. Zero Trust. Welcome, Chase.

Chase

Hey guys, thank you so much for having me. It's great to be here.

Jasson

Chase, what can you tell us about device trust and the best practices for a modern enterprise?

Chase

Yeah, well, I think device trust, in the context of zero trust is really critical. I mean, if you look at the DOD's rollout and maturity models and all those other things, it is specifically noted in there, and if you really wrap your head around where business is today, I've gotta be able to take care of the device, as well as the user, and I have to live in a world where it's BYOD and remote and all those other things.

I have to accept that that's how this functions. I mean, I'm at home right now, remoting in, doing things on the browser. I should have some controls applied to me. If you're not doing those things and you're not living in a world where that is the reality of the way you operate, the only one that benefits is the adversary. By ignoring the value proposition and the value that a device has in the context of compromise and hacks and those other things, you're basically turning a blind eye to a very valid avenue that the bad guys are gonna use for exploits. So you need to know these things. This is not meant to be explicitly difficult and the technology and the space has evolved where you can employ controls via policy at scale and not make people miserable with their cybersecurity.

Patrick

So Chase, what steps can an enterprise take?

Chase

Cybersecurity, zero trust requires, it's not a nice to have, it requires that you do this stuff continually and you can't do a one and done. In other words, you shouldn't have a methodology or practice or policy in place that says, "This came in, I checked it, they're good. And now I'm just gonna let things ride until whenever that system or access goes away." Really, the way that this works best, and I mean, this is why we have visibility and analytics and these things within the framework because you need to know what's going on all the time and you should at any time be able to interdict and respond to a problem when it shows up.

On top of that, this is how you get good understanding of what normal looks like. And if things change or weird stuff occurs, that's something that you want to be able to respond to. You won't see weird things occurring if you're not continually looking at what's going on with these transactions. So you must, and this is again, not a nice to have, to do ZT, you must be able to do this stuff continuously. It's a marathon. This is not a sprint.

Jasson

So Chase, it sounds like Jordan has taken some good first steps. But there's still a few more things for them to do to achieve optimal device trust.

Chase

Yeah, I think that's a fair assessment. I mean, really the goal here is to get towards an optimal state. Even mega, giant government organizations with billions of dollars aligned to this overall strategy. Their goal is to get to optimality. Perfection does not exist. Really what you're trying to get to is where you have an optimal experience, you have controls applied where they need to be applied. You're not making people miserable, and you can actually enable the business to operate securely. So I think he's on his way there. As in the Navy, we would say, "He is on the glide slope." But there's always work to be done.

Patrick

Excellent. Hey, thanks, Chase. I knew we could count on you for this one.

Chase

I really appreciate you guys letting me be involved and keep up with what you're doing. Good stuff.

Jasson

Well, there you have it, Jordan. And thank you to everyone for tuning in.

Patrick

If you have any rumors, questions or myths you want us to test, be sure to let us know. We'll see you next...

Cybersecurity Mythbusters: Is MDM Enough?

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Transcription

Patrick

Hello and welcome to "Cybersecurity Mythbusters." I'm Patrick McBride, the CMO at Beyond Identity. And I'm joined by our resident cybersecurity expert and our Beyond Identity CTO, Dr. Jasson Casey.

Jasson

So we're really excited for today's myth. Let's just go do it. We got an email from Jordan and it reads, "Dear 'Cybersecurity Mythbusters', I keep hearing more and more about device trust. My boss keeps saying we need better device trust, but I assure him we're okay with the current device management. We already have device trust, right?"

Patrick

Ooh, I've been really waiting for this one. Device trust and the concepts around it have really been gaining some steam with our prospects and customers, and we're seeing it more and more.

Jasson

I understand the confusion. It's a complex issue. And because, of course, the popularity of BYOD, or bring your own device, things have only gotten worse.

Patrick

I know. Let me bring some of the big guns in. I know exactly who we can use to discuss it. We got Dr. Chase Cunningham, otherwise known as Dr. Zero Trust. I think he's the perfect person for this one.

Jasson

While we're waiting on him, this issue is a bit nuanced. It's not just about whether a device is managed. Because a managed device can be misconfigured. It's not just about MDM. These systems get quite complex. Basic device information such as geolocation, serial numbers, device types, IP information. This is all insufficient, as they only provide little vignettes of what's actually going on.

In addition, these are static points in time. And as a device changes, as its state changes, as a user interacts with that device in various ways, the control surface could change. And you really want to understand that in a continuous way.

Patrick

Well, let's bring in Dr. Zero Trust. Welcome, Chase.

Chase

Hey guys, thank you so much for having me. It's great to be here.

Jasson

Chase, what can you tell us about device trust and the best practices for a modern enterprise?

Chase

Yeah, well, I think device trust, in the context of zero trust is really critical. I mean, if you look at the DOD's rollout and maturity models and all those other things, it is specifically noted in there, and if you really wrap your head around where business is today, I've gotta be able to take care of the device, as well as the user, and I have to live in a world where it's BYOD and remote and all those other things.

I have to accept that that's how this functions. I mean, I'm at home right now, remoting in, doing things on the browser. I should have some controls applied to me. If you're not doing those things and you're not living in a world where that is the reality of the way you operate, the only one that benefits is the adversary. By ignoring the value proposition and the value that a device has in the context of compromise and hacks and those other things, you're basically turning a blind eye to a very valid avenue that the bad guys are gonna use for exploits. So you need to know these things. This is not meant to be explicitly difficult and the technology and the space has evolved where you can employ controls via policy at scale and not make people miserable with their cybersecurity.

Patrick

So Chase, what steps can an enterprise take?

Chase

Cybersecurity, zero trust requires, it's not a nice to have, it requires that you do this stuff continually and you can't do a one and done. In other words, you shouldn't have a methodology or practice or policy in place that says, "This came in, I checked it, they're good. And now I'm just gonna let things ride until whenever that system or access goes away." Really, the way that this works best, and I mean, this is why we have visibility and analytics and these things within the framework because you need to know what's going on all the time and you should at any time be able to interdict and respond to a problem when it shows up.

On top of that, this is how you get good understanding of what normal looks like. And if things change or weird stuff occurs, that's something that you want to be able to respond to. You won't see weird things occurring if you're not continually looking at what's going on with these transactions. So you must, and this is again, not a nice to have, to do ZT, you must be able to do this stuff continuously. It's a marathon. This is not a sprint.

Jasson

So Chase, it sounds like Jordan has taken some good first steps. But there's still a few more things for them to do to achieve optimal device trust.

Chase

Yeah, I think that's a fair assessment. I mean, really the goal here is to get towards an optimal state. Even mega, giant government organizations with billions of dollars aligned to this overall strategy. Their goal is to get to optimality. Perfection does not exist. Really what you're trying to get to is where you have an optimal experience, you have controls applied where they need to be applied. You're not making people miserable, and you can actually enable the business to operate securely. So I think he's on his way there. As in the Navy, we would say, "He is on the glide slope." But there's always work to be done.

Patrick

Excellent. Hey, thanks, Chase. I knew we could count on you for this one.

Chase

I really appreciate you guys letting me be involved and keep up with what you're doing. Good stuff.

Jasson

Well, there you have it, Jordan. And thank you to everyone for tuning in.

Patrick

If you have any rumors, questions or myths you want us to test, be sure to let us know. We'll see you next...

Cybersecurity Mythbusters: Is MDM Enough?

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Transcription

Patrick

Hello and welcome to "Cybersecurity Mythbusters." I'm Patrick McBride, the CMO at Beyond Identity. And I'm joined by our resident cybersecurity expert and our Beyond Identity CTO, Dr. Jasson Casey.

Jasson

So we're really excited for today's myth. Let's just go do it. We got an email from Jordan and it reads, "Dear 'Cybersecurity Mythbusters', I keep hearing more and more about device trust. My boss keeps saying we need better device trust, but I assure him we're okay with the current device management. We already have device trust, right?"

Patrick

Ooh, I've been really waiting for this one. Device trust and the concepts around it have really been gaining some steam with our prospects and customers, and we're seeing it more and more.

Jasson

I understand the confusion. It's a complex issue. And because, of course, the popularity of BYOD, or bring your own device, things have only gotten worse.

Patrick

I know. Let me bring some of the big guns in. I know exactly who we can use to discuss it. We got Dr. Chase Cunningham, otherwise known as Dr. Zero Trust. I think he's the perfect person for this one.

Jasson

While we're waiting on him, this issue is a bit nuanced. It's not just about whether a device is managed. Because a managed device can be misconfigured. It's not just about MDM. These systems get quite complex. Basic device information such as geolocation, serial numbers, device types, IP information. This is all insufficient, as they only provide little vignettes of what's actually going on.

In addition, these are static points in time. And as a device changes, as its state changes, as a user interacts with that device in various ways, the control surface could change. And you really want to understand that in a continuous way.

Patrick

Well, let's bring in Dr. Zero Trust. Welcome, Chase.

Chase

Hey guys, thank you so much for having me. It's great to be here.

Jasson

Chase, what can you tell us about device trust and the best practices for a modern enterprise?

Chase

Yeah, well, I think device trust, in the context of zero trust is really critical. I mean, if you look at the DOD's rollout and maturity models and all those other things, it is specifically noted in there, and if you really wrap your head around where business is today, I've gotta be able to take care of the device, as well as the user, and I have to live in a world where it's BYOD and remote and all those other things.

I have to accept that that's how this functions. I mean, I'm at home right now, remoting in, doing things on the browser. I should have some controls applied to me. If you're not doing those things and you're not living in a world where that is the reality of the way you operate, the only one that benefits is the adversary. By ignoring the value proposition and the value that a device has in the context of compromise and hacks and those other things, you're basically turning a blind eye to a very valid avenue that the bad guys are gonna use for exploits. So you need to know these things. This is not meant to be explicitly difficult and the technology and the space has evolved where you can employ controls via policy at scale and not make people miserable with their cybersecurity.

Patrick

So Chase, what steps can an enterprise take?

Chase

Cybersecurity, zero trust requires, it's not a nice to have, it requires that you do this stuff continually and you can't do a one and done. In other words, you shouldn't have a methodology or practice or policy in place that says, "This came in, I checked it, they're good. And now I'm just gonna let things ride until whenever that system or access goes away." Really, the way that this works best, and I mean, this is why we have visibility and analytics and these things within the framework because you need to know what's going on all the time and you should at any time be able to interdict and respond to a problem when it shows up.

On top of that, this is how you get good understanding of what normal looks like. And if things change or weird stuff occurs, that's something that you want to be able to respond to. You won't see weird things occurring if you're not continually looking at what's going on with these transactions. So you must, and this is again, not a nice to have, to do ZT, you must be able to do this stuff continuously. It's a marathon. This is not a sprint.

Jasson

So Chase, it sounds like Jordan has taken some good first steps. But there's still a few more things for them to do to achieve optimal device trust.

Chase

Yeah, I think that's a fair assessment. I mean, really the goal here is to get towards an optimal state. Even mega, giant government organizations with billions of dollars aligned to this overall strategy. Their goal is to get to optimality. Perfection does not exist. Really what you're trying to get to is where you have an optimal experience, you have controls applied where they need to be applied. You're not making people miserable, and you can actually enable the business to operate securely. So I think he's on his way there. As in the Navy, we would say, "He is on the glide slope." But there's always work to be done.

Patrick

Excellent. Hey, thanks, Chase. I knew we could count on you for this one.

Chase

I really appreciate you guys letting me be involved and keep up with what you're doing. Good stuff.

Jasson

Well, there you have it, Jordan. And thank you to everyone for tuning in.

Patrick

If you have any rumors, questions or myths you want us to test, be sure to let us know. We'll see you next...

Book

Cybersecurity Mythbusters: Is MDM Enough?

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Download the book

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.