September 12, 2016 By Mitch Mayne < 1 min read

“BigFix makes … work very simple.”

We love endorsements like that, especially when they come from respected professionals like Jason Cordell of CBI. Cordell has 20 years of experience in the industry and now works at a firm that specializes in helping clients make sure their data is secure, compliant and available.

Enforcing Compliance With BigFix

Cordell writes an ongoing blog series about IBM BigFix. His latest post focuses on compliance enforcement and remediation — two areas that are often fraught with complexity for most customers.

He discussed ways to:

  • Stay in compliance with a complicated, ever-changing web of federal regulatory guidelines when configuring and managing a server-workstation setup.
  • Identify compliance status and see configuration drift within minutes.
  • Automatically remediate noncompliance and enforce continuous compliance across all endpoints.

Further Reading

Check out Cordell’s full blog for all the details. It’s a short and worthwhile read for any security professional interested in learning how technology can help keep client data safe, secure and out of the hands of the wrong people.

Already read it? Then learn more about IBM BigFix and watch the demo for yourself.

More from

Router reality check: 86% of default passwords have never been changed

4 min read - Misconfigurations remain a popular compromise point — and routers are leading the way.According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the perfect position to compromise enterprise networks. Why put the time and effort into creating phishing emails and stealing staff data when supposedly secure devices can be accessed using "admin" and "password" as credentials?It's time for a router reality check.Rising router risksRouters…

Preparing for the future of data privacy

4 min read - The focus on data privacy started to quickly shift beyond compliance in recent years and is expected to move even faster in the near future. Not surprisingly, the Thomson Reuters Risk & Compliance Survey Report found that 82% of respondents cited data and cybersecurity concerns as their organization’s greatest risk. However, the majority of organizations noticed a recent shift: that their organization has been moving from compliance as a “check the box” task to a strategic function.With this evolution in…

The 5 most impactful cybersecurity guidelines (and 3 that fell flat)

4 min read - The best cybersecurity guidelines have made a huge difference in protecting data from theft and compromise, both in the United States and around the world.These guidelines are comprehensive sets of recommended practices, procedures and principles designed to help organizations and individual people safeguard their digital assets, systems and data from malicious attacks. They can cover a wide range of practices and exist in part to collect and share best practices and strategies based on industry standards and expert knowledge. Crucially,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today