How does it work?
Intentionally or not, users can bypass the protections or recommended uses of workstations. Internet access increases the risk of intrusions on the Information System, data theft, …. Consulting sites with a questionable reputation, or using “free” services to meet needs not covered by the company’s repository (such as online file sharing, careless use of social networks, etc.) are all potential breaches over which vigilance must be constant. And even if the workstation is protected by an anti-virus, a firewall, etc., it is much more exposed if these protections are deactivated or if the updates fail.
The EUEM solution Interact collects all the configuration and usage information of the applications on the workstation. Algorithms and dashboards or analysis highlight deviations from company benchmarks. All this information can also feed into a lake of data and SIEM, SOC tools to increase your analytical capacity and strengthen IS security systems.