Starting at The Endpoint

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

Starting

at the
Endpoint
A new approach to
modernising devices, systems
and teamwork
April / 2022 Table of contents 2

Introduction Chapter / 03 Chapter / 06

04 The endpoint is the 12 Protect people, data 20 Increase IT


new workplace and services productivity

Chapter / 01 Chapter / 04 Conclusion

06 Increase flexibility 15 Mitigate risks and 22 Evaluate and develop


by modernising vulnerabilities your organisation’s
endpoints endpoint strategy
Chapter / 05
Chapter / 02
18 Enable unified
09 Deliver amazing management
employee
experiences
3
April / 2022 Introduction 4

The endpoint is the


new workplace
Definition/modernising endpoints:

This eBook is not going to tell you that


the world has changed, that workers want
But widespread remote work has inspired
(or necessitated, depending on your point The practice of improving the
more flexibility, that customers want more
convenience, that cybercriminals want your
of view) a new approach in which all of
these capabilities are incorporated into the ease-of-use, hardware and
data or that you can use technology to meet
these challenges – IT and business leaders
operating system itself. The potential benefits
and ROI are significant. Employees enjoy software performance, cross-
already know all that. smoother, more secure experiences with less
downtime – even when working on personal functionality and security of
What may be less familiar is the concept of
focusing on endpoints, like PCs and mobile
devices – and IT departments can better
govern devices, infrastructure and security workers’ desktop, tablet and
devices, as a starting point to drive large-
scale modernisation projects. Traditionally, to
from a single management tool.
mobile devices. This includes
enable remote work, implement new security
measures or simplify IT management, an
Modernising endpoints is a practical way
to realise these benefits. It’s a foundational personal devices that run work
organisation needed to deploy and manage
a separate solution for each objective. Plus,
investment that simplifies operations,
safeguards data and sets your organisation applications.
redeploy some solutions multiple times to run up for resiliency and growth.
on multiple devices.
5

/ 01
Chapter
Percentage of 6

business leaders
Increase flexibility adjusting their
workplace
by modernising flexibility policies
endpoints
Working whenever, wherever, on any device, a presentation on their laptop, edit it on their
used to be a perk. Today, it’s fundamental phone and present it with their tablet, all
for most people and enterprises.1 In fact, in without having to troubleshoot their devices.
a Forrester study commissioned by Microsoft, The whole experience should be intuitive
employers expressed that allowing people to and seamless so people can stay in the flow

81%
use their personal devices for work – and to of work. To meet these requirements, IT
work with more flexibility between home and departments are increasingly focusing on the
the office – improves employee satisfaction operating system on employees’ endpoints as
and reduces turnover.2 a key modernisation strategy.

Switching between devices shouldn’t just be


possible, it should be easy, with a consistent
look and feel. People should be able to create

1
‘The winner by a long stretch’, The WorkLab Year in Review, Microsoft, 2021.
2
The Total Economic Impact™ Of Modernising Endpoints, Forrester Consulting study commissioned by Microsoft, September 2021.
Passwordless authentication April / 2022 Increase flexibility by modernising endpoints 7

is more secure and more


convenient than other options

High security

Flexibility starts in IT multifactor authentication – a key part of


passwordless authentication – can thwart
Giving employees flexibility starts in the IT 99.9% of cyberattacks.3
department by equipping IT and security
Passwordless
authentication workers with the tools they need to save Modernising operating systems is key
budget and support endpoints remotely.
Password + Giving employees more flexibility isn’t
standard two-factor To make that possible without requiring a necessarily about providing the latest phone
authentication
heavy time commitment, IT leaders should or laptop. It’s about adopting an IT strategy
consider deploying solutions like endpoint that allows people to use any device they
management apps that support both cloud- choose, with security built in. To implement
based and on-premises device management. that strategy broadly and achieve your
flexibility goals, consider upgrading your
Inconvenient Convenient
Another way to offer flexibility is by switching operating system and, as needed, any
to passwordless authentication. Windows 11 endpoint devices that are unable to support
is specifically designed to streamline a newer OS.
this process and simplify deployment so
Passwords people can start signing in with a tap or look
sooner. It’s faster and easier for employees –
and much harder to hack. And deploying

Low security
3
Passwordless Protection: Reduce your risk exposure with passwordless authentication, Microsoft Security, 2021.
8

/ 02
Chapter
April / 2022 Deliver amazing employee experiences 9

Deliver amazing employee


experiences 3×
80%
In the 2022 Work Trend Index from Microsoft, To be successful, everyone – including
80% of employees said they were just as frontline workers, executives and information
productive – or more – in their jobs since workers – needs to seamlessly collaborate,
going hybrid. 57% of remote employees are access information quickly and carve out time
of employees say they’re as productive – as many applicants for remote
considering a shift to hybrid, while 51% of for focused work and their own well-being. or more – working hybrid than on-site jobs
hybrid employees are considering a shift to And employees who can easily complete
remote. Plus, remote jobs on LinkedIn attract their tasks, no matter where they are, are
2.6 times more views and nearly three times happier and more productive.5 A modernised
more applicants compared to on-site roles.4 endpoint environment helps them stay
Enterprises that deliver this flexibility with a in control of their day, and it shapes their
modernised endpoint environment will stand perceptions of your organisation.
out in a competitive talent market.
57% 51%

of remote employees are of hybrid employees are


considering a shift to hybrid work considering a shift to remote work

4
2022 Work Trend Index: Annual Report: Great Expectations: Making Hybrid Work Work, Microsoft, March 16, 2022.
5
The Total Economic Impact™ Of Modernising Endpoints, Forrester Consulting study commissioned by Microsoft, September 2021.
April / 2022 Deliver amazing employee experiences 10

Build a thriving workplace Create an inclusive culture

Improving employees’ experiences with their IT departments can help foster a positive,
devices isn’t just about helping them work thriving culture across hybrid teams by
faster – it’s also about empowering them implementing technology that supports
to contribute more meaningfully to the participation from people with different
enterprise. According to a report by Forbes communication styles and backgrounds.
Insights, “Employees benefit from a simple A unified endpoint environment fosters
and consistent experience that improves their collaboration across devices, locations and
efficiency, collaboration and communication documents. Adopting tools that use intuitive
with customers and each other.”6 design principles makes it effortless to start
and participate in meetings and chats with
Key to this is eliminating the friction of people inside the office and across the world.
toggling between endpoints so that
employees don’t have to divert focus away An inclusive workplace that empowers
from their work in order to start using employees to be themselves and get
another device. For example, an operating things done is a powerful differentiator for
system that delivers curated content can help enterprise organisations. Modernising your
them plan their day and easily access people endpoints will help you deliver a digital
and files, regardless of which device they’re experience that makes your workplace
using. Passwordless methods like fingerprint more productive and fun.
scans, PINs and facial recognition streamline
app sign-up and sign-in. And voice typing
and support for gestures and styluses make
it simple to work on any device.

6
‘Section IV: Endpoint Modernisation’, Reimagining Endpoints: Productive and Secure Computing in Today’s Hybrid, Front-Line and Edge
Environments, Forbes Insights in association with Microsoft, 2021.
11

/ 03
Chapter
12

Protect people, data and Zero Trust across the


digital estate
services Identities

As employees expand the number and Endpoint security starts with a holistic
variety of devices that they use to do their Zero-Trust approach
Data Endpoints
work – including their personal devices –
IT departments are scrambling to keep The principles of Zero Trust are:
endpoints compliant and up to date. A study
of enterprise IT leaders revealed some 1. Verify explicitly. Always authenticate and
common challenges:7 authorise based on all available data points.

• Stitched-together security solutions that 2. Use the least privileged access. Limit user
are disparate and outdated. access with just-in-time and just-enough
access, risk-based adaptive policies and
• Overdependence on VPNs, outdated data protection.
identity management and inadequate
Zero Trust Security
device management controls. 3. Assume breach. Minimise blast radius
and segment access. Verify end-to-end
• Increased risks of data breaches, restrictive encryption and use analytics to improve
authentication policies that degrade visibility, threat detection and defences.
the employee experience and obstacles Infrastructure Applications
to onboarding new technology and Microsoft encourages the use of Zero-Trust
employees. controls to provide visibility, automation and
orchestration across identities, endpoints,
To address these challenges, organisations are applications, network, infrastructure and data.
increasingly adopting Zero-Trust architecture Network
as a holistic approach to securing bring-
your-own-device environments, cloud-based 7
The Total Economic Impact™ of Zero Trust Solutions from Microsoft: Cost Savings and Business Benefits Enabled by Microsoft’s Zero Trust Solutions.
assets and remote users.8 A commissioned study conducted by Forrester Consulting on behalf of Microsoft. December 2021.
8
McKendrick, Joe. Reimagining Endpoints: Productive and Secure Computing in Today’s Hybrid, Frontline, and Edge Environments.
©Forbes Insights 2021.
The six layers of Zero-Trust security April / 2022 Protect people, data and services 13

Zero Trust extends from the chip to Organisations should implement security
the cloud features for hardware and operating
systems that:
Cloud Cloud services
Robust end-to-end security strategies should:
• Protect and maintain system integrity
• Separate hardware from software to as the firmware loads, preventing
protect against threats – the endpoint unauthorised firmware or software from
device is protected before it’s even starting before the operating system
Identity and booted up. launches.
Secured identity Privacy controls
privacy
• Protect the operating system against • Use a trusted platform module (TPM)
unauthorised access to critical data. 2.0 for features like Windows Hello and
BitLocker.
• Prioritise application security and prevent
access to unverified code. • Create virtualisation-based security using
Application Application security Privacy controls CPU hardware virtualisation to secure
• Protect user identities with passwordless a region of memory isolated from the host
security. operating system to protect information
and code integrity.
Encryption and data Virus and threat • Extend security to the cloud to help
Network security
protection protection protect devices, data, apps and identities An exciting development in hardware root-
Operating remotely. of-trust technology is Pluton, a security
system
processor designed by Microsoft to foil
System security
Zero-Trust endpoint security begins with sophisticated attacks. The chip can be
hardware-based isolation at the chip configured as the device TPM or as a security
level. Sensitive data is stored behind processor in non-TMP scenarios, such as
security barriers and kept separate from platform resilience.
Hardware / the operating system, so encryption keys
Hardware root of trust Silicon-assisted security
chip
and user credentials are protected from
unauthorised access.

Security Certification Secure supply chain


Security assurance
foundation
14

/ 04
Chapter
15

Mitigate risks and The cybersecurity bell


curve: Basic hygiene
vulnerabilities still protects against
98% of attacks

Common perception is that cyberattacks sophisticated attacks. They were simple,


are complex, difficult-to-stop operations. brute-force login attempts and stolen
But the reality is that most attacks stem passwords.
from employee resistance to following
basic security best practices for creating Why, then, do so many IT departments
passwords and identifying phishing attempts. struggle to prevent these breaches?
In fact, stolen passwords are by far the most The explanation is simple: It’s more of
common way enterprise accounts and data a people problem than a technology
get compromised. Even attacks by nation- problem. So, while IT departments need
state actors typically rely on simple tactics
like password sprays, which capitalise on
to continue to educate employees on
basic security practices, there are two
98%
employees using weak passwords.9 endpoint modernisation solutions that help
protection

1% outlier attacks

1% outlier attacks
mitigate the ‘people’ part of the problem
In 2021 alone, Microsoft detected and and therefore the vast majority of attacks:
blocked more than 25 billion attempts to multifactor authentication and patching.
hijack enterprise accounts.10 These weren’t

Use Apply least- Enable Keep versions Protect data


antimalware privileged multifactor up to date
services access authentication

9
‘Identity is the New Battleground’, Cyber Signals, December – January 2021.
10
Ibid.
April / 2022 Mitigate risks and vulnerabilities 16

Basic security hygiene essentials Advanced threat protection

• A Zero-Trust approach to authentication. Next to basic security hygiene, implementing


Zero Trust assumes your operating system advanced threat protection that detects and

Fewer than 20% of


security has already been breached and responds to attacks before they can cause
requires that employees consistently harm is critical. Organisations should use:
verify their identities using multifactor

Microsoft customers
authentication. • A host firewall, such as Windows Defender
Firewall, to limit which devices can enter
• Multifactor authentication. Employees the network and the data that can be sent
provide multiple forms of identification, from within and to require authentication

employ multifactor
such as a hardware token and biometric, from any device that attempts to
to access their accounts and data. communicate with devices on the network.

authentication.
• Passwordless authentication eliminates • Multifaceted antivirus software which
11
the need for employee-generated unifies machine learning, big-data analysis
passwords, which are usually the weakest and in-depth resilience research to provide
link of an organisation’s security. comprehensive protection for endpoint
devices – Microsoft Defender Antivirus is
• Updating and patching software is a well-known example.
a simple, but effective way of preventing
attacks. IT departments should implement
automatic updates to harden security
across the organisation.

11
Microsoft Digital Defence Report, October 2021.
17

/ 05
Chapter
18

Enable unified management Advanced security


management
A key advantage of modernising endpoints • More easily implement security updates, Here’s a closer look at two unified security Modern BitLocker administration
is the opportunity to simultaneously unify patches and policies throughout your management features that organisations management
your IT management tools, save your IT team organisation. running Windows should make full use
time and minimise administration costs. of: advanced group policy management Using modern BitLocker administration
Besides boosting efficiency, using a single • Quickly assess the compliance of individual and modern BitLocker administration management streamlines your deployment
control centre to manage your organisation’s PCs and devices, or of your entire management. and monitoring of BitLocker-protected
endpoints increases the speed, scale and enterprise. devices and allows you to safeguard network
consistency of your network security efforts. Advanced group policy management endpoints more efficiently against data loss
• More effectively protect against data and theft.
Having a unified administrative control pane breaches by encrypting all data in Using advanced group policy management
that’s built into your operating system, such the system. to keep your user and desktop configurations This enables your IT team to automate
as in Windows 11, allows you to: up to date enables your network volume encryption on client computers
administrators to work faster and on a larger across your entire organisation, centralise
• Manage endpoint devices, security and scale. In addition, it helps to reduce machine compliance monitoring and reporting
cloud resources from a single place. downtime for employees throughout your and simplify key recovery. It also allows
organisation. your employees to take advantage of self-
• Secure, deploy and manage corporate and service tools to recover encrypted devices
personal devices without disrupting work. Rather than having to configure each themselves – without having to contact
computer in a Windows Server Active the help desk. All of this helps to scale
• Simplify IT with tools that allow different Directory environment one by one, you can device deployment and reduce the cost
vendors and solutions to work together. use one central console to configure all sites, of provisioning and supporting encrypted
domains and organisational units. Besides drives.
reducing your total cost of ownership, this
gives your IT team more granular control
over key endpoint updates.
19

/ 06
Chapter
Most enterprise IT 20

departments provision,
Increase IT productivity update and secure
endpoints on site

54%
IT teams see two types of business benefits endpoint users are empowered to resolve
from endpoint modernisation: rote task more technology challenges on their own.
simplification or automation and redundant When employees own taking care of tasks 31%
solution consolidation or elimination. like updating apps or login credentials,
help desks get time back to apply to other
Rote task simplification or automation projects.
15%

We know modernised operating systems • Solution and update deployments


provide endpoint users with smoother at scale. Most IT teams still provision
experiences, increased security and flexibility and update endpoint devices on site.12
and built-in risk mitigation. But for the IT Modernised endpoints enable easy
teams that manage endpoint technology, deployments with remote and automated
these benefits also translate to increased roll-out capabilities.
productivity. Time previously taken by
repeatable, day-to-day tasks is freed up for • Global policy management. Modernised
higher-value work. This is especially beneficial endpoint management systems allow
for lean IT departments with limited IT teams to manage most tasks – like
headcount and resources. compliance and security – from a single
control centre. Centrally managed policies
Potential efficiency gains include: make it easier to keep enterprise-wide
desktop configurations up to date and
• Reduced help desk calls. By using tools reduce downtime for employees.
like BitLocker PIN or a self-service portal,

Done Done Done Base: 301 global IT decision-makers


Source: A commissioned study
on-site remotely remotely by conducted by Forrester Consulting
12
The Total Economic Impact™ Of Modernising Endpoints, Forrester Consulting study commissioned by Microsoft, September 2021. by IT by IT end users on behalf of Microsoft, March 2021.13
13
Ibid.
April / 2022 Increase IT productivity 21

Redundant solution consolidation Modernised endpoints don’t just have


or elimination the latest software, but also a wealth of
integrated solutions built into the operating
Modernised endpoints also afford IT teams system. With a suite of solutions designed

I only want to buy


the opportunity to consolidate – or even to work together from the start, IT teams
eliminate – disparate or redundant services can shed redundant services and free up
and solutions. This frees up budget, time and time and resources that were previously

one licence for things.


resources for other projects. devoted to solution maintenance. From
a cost optimisation standpoint, opportunities
Disparate software solutions incur both abound. The Forrester Consulting Total
quantified and unquantified expenses. Economic Impact™ Of Modernising Endpoints

I don't want to buy two


Quantified expenses are costs measured study commissioned by Microsoft estimates
with a monetary figure, like licensing fee that eliminating redundant software solutions
agreements and vendor support costs. results in more than USD 607,000 in reduced

licences for the same


Unquantified expenses include harder-to- costs over three years for a composite
measure investments, like the time and effort organisation of 4,000 people.15
of an employee to learn how to operate
a new software solution and implement

capability.
it within an existing software ecosystem.
14

– Director of user services and security operations 14


Ibid.
at a pharmaceutical organisation 15
Ibid.
April / 2022 Conclusion 22

Evaluate and develop your It may surprise you that an eBook that
recommends modernising endpoints
and security as if they’re interoperable by
default – because for most employees and

organisation’s endpoint
would also recommend that some IT departments, they now are. And while
enterprises maintain their current endpoint Windows 10 will continue to be a platform of
strategies. The fact is, many organisations innovation for many successful organisations,

strategy have successfully enabled remote work,


improved their workplace collaboration
tools, implemented advanced security
Windows 11 – which can be deployed in
the same environment as Windows 10 – is
specifically designed to meet those needs
measures and unified their IT management more holistically.
by deploying separate, complementary
solutions. After all, Microsoft has been Wherever you are in your endpoint
helping organisations to do this for a modernisation plans, we hope the guidance
long time. in this eBook provides you with a useful
framework for evaluating and developing
But the reality is that it now makes more your organisation’s endpoint strategy.
sense for Windows to treat work and personal
devices, workplace tools, cloud resources

Learn more about Windows 11


© 2022 Microsoft Corporation. All rights reserved. This document is provided ’as is’. Information and views expressed in this document,
including URLs and other internet website references, may change without notice. You bear the risk of using it. This document does not Or explore the deployment documentation
provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal,
reference purposes.

You might also like