Skip to content

Endpoint Security

This is intro text about EndPoint Security ...etc

Below is a case Study of how Bunker have implemented Endpoint Security for a client.

OVERVIEW

Motor Fuel Group (MFG) have over 250 corporate users, many of these work remotely and very rarely come into the office. MFG needed a solution to manage these endpoint devices, ensure operating systems and software are properly patched and audit devices for key information such as software installed or anti-virus status.y

 

PROCESS

Bunker sent communications out to MFG users explaining what the RMM tool did and what they would see on their machines. We also configured privacy policies to prevent unwanted intrusion by Bunker engineers. Next we installed a node device in MFG’s head office which was used to push agents out to machines in the building. Remote users were contacted and agents installed on machines not in the office. Throughout this process Bunker cross checked machines on Datto RMM against existing asset lists to ensure all devices were discovered and were even able to identify some devices not previously recorded or incorrectly recorded on asset registers.

 

SOLUTION

Datto Remote Monitoring and Management (Datto RMM) was deployed across MFG’s entire corporate estate. Machines are now audited daily for key information such as, current user, software installed, patch status, anti-virus status, encryption status as well as ransomware detections. A patching policy was then defined to ensure machines receive all critical OS updates; a software management policy to ensure key apps are always up to date, and routine reports/checks carried out for compliance. Datto RMM can also be used for remote support, such as software installations, configuration changes and one-to-one screen sharing.

 

IMPACT

  • LIVE VISIBILITY OF ESTATE
  • KEY STATISTICS AND AUDIT INFORMATION CAN NOW BE RETRIVED IN REAL TIME
  • CONFIDENCE IN PATCHING AND SECURITY CONTROLS
  • COMPLIANCE WITH CYBER ESSENTIALS PLUS