• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
The Oakmont Group

The Oakmont Group

Helpful Advice about Podcast Promotion

  • Federal Tech Podcast
  • Podcasting Success Blog
  • About

Ep. 19 More Devices than People: Managing the Madness

July 26, 2022

apple podcasts logo
spotify logp
bill harrod
Bill Harrod, Ivanti
ivanti logo
A simple Google search will tell you that we now have seven billion people and over twelve million active endpoints. These are devices that are moving on the ground and even in outer space.

It is unfortunate that the basis for managing endpoints on a network began as controlling individual desktop computers in a single building. Oh, for the simplicity of those days.

Today’s federal network has hundreds of endpoints to manage. Employees, contractors, phones, remote workers, identity management challenges – they all add to the complexity of understanding who is on your network. Many federal systems rely on “inherited” credentials for a person using the system, a sure recipe for failure in security.

“Non-Person Entities” sure sounds like it comes out of a science fiction movie. Managing devices on a system will have to incorporate understanding robotic process automation and its implications.

"It really is about how do we provide the automation, what Avanti calls hyper automation, to be able to provide for, for self service, for self securing and for self healing"

Bill Harrod, Ivanti Tweet

Malicious actors will treat each point as an opportunity to evaluate and attack. One of the most popular ways to attack today is with ransomware. Ivanti regularly releases its Ransomware Index. The report from 2022 indicated a rise I of 7.6% in ransomware. The war in Ukraine has increased wariness for all federal systems.

During the interview, Bill Harrod from Ivanti suggests that mobile end points could have high potential for allowing malicious code into a system. Systems called Unified Endpoint Management are becoming increasingly relevant for federal protection.

Bill Harrod explains that there is no perfect tool, best practices for containing this threat is to microsegment a system to control the “blast radius” of an attack. This resiliency should be based on a deep knowledge of what is on your network.

If you enjoyed this podcast, you may want to listen to episode #16 Artificial Intelligence & Cloud Maintenance for Federal Applications

john gilroy
Transcript for podcast
Transcript for Ep. 19
Federal Tech Podast
John Gilroy

John Gilroy

Has been in front of a microphone since 1991.  He can help you structure, launch, and promote your company podcast.  johngilroy@theoakmontgroupllc.com  

Federal Tech Podcast Bill Harrod,  Ep. 19,  Ivanti

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

federal tech podcast logo

The purpose of the Federal Tech Podcast to discuss innovation to reduce cost for federal technology. Contact us if you think you are a good fit.

Recent Posts

  • Ep. 75 Digital Transformation Culture at the DLA
  • Ep. 74 Digital Transformation of an Enterprise Financial System
  • Ep. 73 How to Build Federal Systems for Scale and Resilience
  • Ep. 72 How Federal Leaders can get Value From Data Management
  • Ep. 71 Equity and Federal Identity with Socure
constellations podcast from Kratos

Fascinated by going to Mars?

Right now in Los Angeles a company is 3D printing rockets;  30,000 satellites will be launched in the next five years; satellite communications have advanced so far that companies are using normal cell phones to connect to satellites.  How to keep up with all this excitement?  The Constellations Podcast from Kratos.

Let’s work together

Get in touch with us and send some basic info about your podcast.

Appear on Federal Tech Podcast

Footer

Social

Follow along on social media.

email

johngilroy@theoakmontgroupllc.com

Policy

Policy for The Oakmont Group

Copyright © 2023 · Business Pro Theme on Genesis Framework · WordPress · Log in