Creativity was hardly in short supply at February’s IBM InterConnect. From Stanford University’s Monopoly-themed presentation to the University of California, Berkeley’s use of Taylor Swift memes to make its points, attendees got a good dose of humor along with some serious education about protecting their corporate data.

Ben Gross and Clifton Hom of UC Berkeley’s IT department pulled together a compelling mix of fun and facts to describe how IBM helps them manage their security life cycle for more than 10,000 machines across campus.

“All most users really want is a computer that works reliably when they sit down and has the software available that they need, and a station where their data and the university’s data is kept secure,” Gross said. To accomplish this, he said, the university uses IBM BigFix.

Image Source: @SwiftOnSecurity

“If you don’t follow InfoSec Taylor Swift, you’re making poor life choices,” Gross continued, half joking. “But in all seriousness, while the account is largely tongue-in-cheek, a lot of the content they put out is very real, accurate and helpful.”

Of course, the quotes may not have come from Taylor Swift herself — a quick Web search reveals the original Twitter account using the pop star as its handle now has several cohorts across the Web, including a Tumblr account. Several articles online debate the authenticity of the tweets, but independent of source, the Twitter account has more than 60,000 followers, with the Tumblr account following at a close second.

Image Source: @SwiftOnSecurity

Regardless of whether the quotes actually belong to Swift, the suggestions are often correct.

“We use BigFix to keep over 10,000 machines up-to-date with patches and antivirus software,” Hom said. “For us, it dramatically lowers the total cost of ownership of devices on campus, because now we can patch an entire fleet of machines in a few hours using only one staff member. In the past, that same process took weeks and several people to implement.”

“We’re also able to better manage software licensing across campus,” Gross added. “A few years ago, if a user wanted to install Microsoft Office, for example, it was a pretty drawn-out process. They’d have to contact their local tech, who would have to contact another tech who could grant access. Then, that original tech would have to schedule a physical appointment with the user and come to install the software manually on the machine. The whole process could take a full week.”

According to Gross, that process is now automatic. Users click a button on their screen, grab a cup of coffee, come back to their machine, and the software is correctly installed and ready to use.

“The cost savings for the university for that type of automation, both in terms of head count and accuracy, is huge,” Gross said.

Gross and Hom both reiterated the reduction in administrative IT support costs and increasing security benefits they’ve enjoyed by using IEM.

“In the past, we’ve had multiple solutions to perform different tasks on different devices — like patching, asset discovery and inventory, OS and software deployment,” they said. “Now, we can find, track and address challenges with all our endpoints in a matter of minutes in most cases and get up-to-the-minute visibility into their status.”

So, how does all of this make them feel?

“The peace of mind we get from BigFix is definitely something worth celebrating,” Gross said.

Image Source: Flickr

More from Endpoint

Combining EPP and EDR tools can boost your endpoint security

6 min read - Endpoint protection platform (EPP) and endpoint detection and response (EDR) tools are two security products commonly used to protect endpoint systems from threats. EPP is a comprehensive security solution that provides a range of features to detect and prevent threats to endpoint devices. At the same time, EDR is specifically designed to monitor, detect and respond to endpoint threats in real-time. EPP and EDR have some similarities, as they both aim to protect endpoints from threats, but they also have…

The needs of a modernized SOC for hybrid cloud

5 min read - Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire classes of threats. Now we are seeing the emergence of technologies such as attack surface management (ASM), which are starting to help organisations get more proactive and focus their efforts for maximum…

X-Force identifies vulnerability in IoT platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

X-Force prevents zero day from going anywhere

8 min read - This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…