Cybersecurity Services Firm Chooses Automox as a Low-Touch Patching Solution to Quickly, Easily Update Remote Customer Endpoints
Customer Company Size
SME
Region
- America
Country
- United States
Product
- Automox
Tech Stack
- Cloud Native
Implementation Scale
- Enterprise-wide Deployment
Impact Metrics
- Productivity Improvements
- Customer Satisfaction
- Digital Expertise
Technology Category
- Cybersecurity & Privacy - Endpoint Security
- Functional Applications - Remote Monitoring & Control Systems
Applicable Industries
- Professional Service
- Software
Applicable Functions
- Business Operation
- Maintenance
Use Cases
- Remote Asset Management
- Cybersecurity
- Remote Control
Services
- Cybersecurity Services
- System Integration
- Training
About The Customer
Ihloom is a cybersecurity firm providing risk assessment, defense development, monitoring, training, and security coaching services to small and midsize businesses across the United States. Its client base is diverse, with a focus on real estate attorneys, marketing companies, biotech firms, and U.S. Department of Defense contractors. Ihloom is a full-service firm that provides primarily managed EDR, patch management, SIEM, and backup services, as well as assisting in security architecture development and compliance management. Its clients are often smaller companies whose dedicated IT staff do not have the time, knowledge, or expertise to develop or manage the details of an effective security program.
The Challenge
Patching and endpoint hardening has become more urgent as new vulnerabilities in commonly used software are announced almost daily. With the shift to a more distributed workforce in the past year, the urgency to keep these remote systems protected is more apparent. Attackers are quick to take advantage of remote devices that now sit outside of the protected corporate perimeter. According to leading industry data, adversaries are weaponizing new critical vulnerabilities in seven days on average. And zero-day vulnerabilities are already weaponized at the moment of disclosure. The easiest way to remediate these vulnerabilities is through patching, so having a solution that can easily identify which machines need the latest patches and then be able to quickly remediate them is essential to protect Ihloom clients. Ihloom customers typically struggle with the ability to keep up with cybersecurity alongside the day-to-day challenges of keeping their systems running. Most customers are overwhelmed and don’t have sufficient information or the skilled staff to process security alerts as needed. These customers are also struggling with misconceptions about the security of their corporate endpoints, where many of their employees may think, “My computer updates (patches) automatically,” or, “Macs don’t have security issues.”
The Solution
Ihloom chose to offer Automox as its patching and endpoint hardening solution because of its small footprint, its ability to easily patch remote workers, and its skill in providing the visibility and swift remediation capabilities that most organizations need to effectively respond to newly reported vulnerabilities. Because Automox is cloud native, Ihloom feels confident that it can effectively patch and update client systems no matter where they are located. Additionally, being a cloud-native solution gives Ihloom customers the agility they need to stand up an endpoint hardening solution without the considerable investment in time or cost of implementing an on-premises solution.
Operational Impact
Quantitative Benefit
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
Factor-y S.r.l. – Establishes a cost-effective, security-rich development environment with SoftLayer technology
Factor-y S.r.l., a web portal developer, was faced with the challenge of migrating its development infrastructure to a reliable cloud services provider with highly responsive technical support. The company needed a solution that would not only provide a secure and reliable environment but also support its expansion by providing resources to create and deliver innovative offerings.
Case Study
UBM plc: Taking the pulse of the business and engaging employees with a far-reaching strategic transformation
UBM, a leading global events business, was undergoing a significant strategic transformation named 'Events First'. As part of this transformation, the company was preparing to complete the largest acquisition in its history - Advanstar, a US-based events and marketing services business valued at more than USD970m. The company faced the risk of human capital flight if it was unable to effectively engage top talent with the new strategic direction. UBM needed to make significant structural, process and systems changes, uniting its previously autonomous regional businesses. The challenge was to ensure all of its employees were engaged and aligned with the new future vision.
Case Study
Darwin Ecosystem: Accelerating discovery and insight through cutting-edge big data and cognitive technologies
Darwin Ecosystem was founded with a unique vision of harnessing chaos theory mathematics to uncover previously hidden connections in unstructured data. The company’s algorithms can look at all the data generated by any source (such as news, RSS feeds and Twitter), and analyze how a specific set of concepts within that data are evolving over time. This is particularly valuable in situations such as business and competitive intelligence, social research, brand monitoring, legal discovery, risk mitigation and even law enforcement. A common problem in these areas is that a regular web search will only turn up the all-time most popular answers to a given question – but what the expert researcher is actually interested in is the moment-tomoment evolution of the data available on that topic. Darwin’s algorithm is computationally intensive, and the sources of data it correlates can be vast. To bring its benefits to a larger commercial audience, Darwin needed to find a way to make it scale.
Case Study
Wittmann EDV-Systeme launches IT monitoring services
Small and medium-sized businesses often lack the know-how and resources required for thorough IT system monitoring. Wittmann EDV-Systeme wanted to launch a solution to plug the gap – enabling it to improve its own competitiveness and that of its customers. IT landscapes are becoming ever more complex and outsourcing is gaining popularity, IT systems must nonetheless remain easy-to-use and extremely reliable at all times. Automated, round-the-clock system monitoring therefore represents an immensely valuable proposition for companies: downtime for business-critical applications can be avoided, and IT systems remain available at all times.
Case Study
Zend accelerates, simplifies PHP development
Zend Technologies, a major contributor to the PHP open source community, needed to keep pace with emerging trends such as mobility, agile development, application lifecycle management and continuous delivery. The company needed to provide the right tools to the worldwide community of PHP developers. The challenge was to support enterprise-class capabilities from end to end, including mobile, compliance and security. The pace of business required developers to show results fast across a variety of devices without compromising quality or security.
Case Study
Delivering modern data protection with cloud scale backup from Cobalt Iron and IBM
Organizations are struggling to modernize their legacy data protection environments in the face of growing demands around new infrastructure, new applications, and budget consolidation. Virtualization and modern application development processes have significantly outgrown legacy backup architectures. In response, infrastructure teams have created multiple backup solution types to handle the varying SLAs (performance, scale, cost) required by their business sponsors. However, the sheer number and variety of solutions in this uncontrolled expansion creates huge amounts of work, threatening to overwhelm the IT team in many organizations. Today, developers may add new applications and virtual server instances by the hundreds per day without accounting for the restrictions of the existing backup infrastructure. They leverage the cloud for immediate compute and storage resources, yet rarely communicate succinctly with corporate IT to ensure that the appropriate data protection services are in place.