Nine41 Consulting | Why You Should be Using WinMagic’s SecureDoc Encryption for a Successful Patch Strategy
apple, device management, dep, vpp, systems management, landesk, ivanti, lanrev, absolute, heat, mdm,
16859
post-template-default,single,single-post,postid-16859,single-format-standard,qode-quick-links-1.0,ajax_fade,page_not_loaded,,columns-3,qode-child-theme-ver-1.0.0,qode-theme-ver-11.0,qode-theme-bridge,wpb-js-composer js-comp-ver-5.1.1,vc_responsive
 

Why You Should be Using WinMagic’s SecureDoc Encryption for a Successful Patch Strategy

Why You Should be Using WinMagic’s SecureDoc Encryption for a Successful Patch Strategy

You know you need to encrypt, at the minimum, every laptop you own. WinMagic has reported that since 2013, more than 660 million records have been compromised in data breaches. There is just no reason your company should be similarly compromised if one of your laptops is lost or stolen.

Furthermore, if the two global ransomware attacks (Petya and WannaCry) in the last two months with have taught us anything, it’s that we know we need to patch all of our devices – including our Macs (learn how in our upcoming training class).

Unfortunately, patching encrypted machines can have a negative impact on user productivity. And the last battle you need to fight is with your executive team about how patching is affecting the bottom line.

So what’s the hangup with patching encrypted devices? Well, it has everything to do with the reboot process.

If you’re applying a patch that doesn’t require a reboot, there is no need to worry about end user productivity being affected. However, if it does require a reboot, you’re going to run into issues. The reason being is that an encrypted device cannot reboot back into the OS and finish applying the new configurations. When a device is encrypted and rebooted, it will sit at the pre-boot login screen waiting for an authenticated user to unlock the disk.

If you’re patching frequently (as you should be) this means that your users may often arrive to their desk in the morning only to find they have to login to the pre-boot screen and wait for the device to finish applying its patches. This waiting will irritate your users and will eventually bubble up to management and then to the executive team – if it doesn’t start directly with the executive team to begin with.

This reboot, post-patch configuration process is what you need to avoid to be successful with your patch process and is exactly why I recommend WinMagic’s Secure Doc product to handle encryption. Not only does it provide a key management solution for all of your managed platforms (Ivanti only handles macOS), it is the only tool on the market that allows a machine on the network to bypass the pre-boot login screen.

WinMagic’s PBConnex technology allows for pre-boot network authentication to take place without a user. This way, you can continue to patch as desired, reboot as needed, and when the users return in the morning, their machine will be waiting at the Windows or Mac login screen – not the pre-boot login screen. Your users won’t need to sit and wait, and wait, and wait even more for the patch process to finish wrapping up.

Problem solved! WinMagic is worth the investment. If you’d like more information about WinMagic, please reach out to us and we’d be happy to help answer your questions.

And, if you already have WinMagic, make sure you’re deploying it as part of your Mac onboarding process. Just build a Mac package from the script below; changing out the variables as needed, and add the appropriate action to your Mac provisioning template.

 

 

No Comments

Post A Comment

ARE YOU READY TO GET STARTED?
Please fill out your information, and a specialist will reach out to discuss our services in more details.
Your Information will never be shared with any third party.
        
Free Training Videos
Register to gain access to all of our free content.
YOUR PHONE
YOUR NAME
YOUR EMAIL
        
Get Started
Provide us your contact information and we will reach out as quickly as possible.
YOUR PHONE
YOUR NAME
YOUR EMAIL
        
Additional Questions?
Provide us your contact information and we will reach out as quickly as possible.
YOUR PHONE
YOUR NAME
YOUR EMAIL
        
Pay by PO?
Provide us your contact information and we will reach out to help you sign up by PO.
YOUR PHONE
YOUR NAME
YOUR EMAIL
Subscribe Now
Subscribing to our site gives you access to our Apple Admin 101 training videos as well as allowing us to notify you of each new blog post we release.
YOUR PHONE
YOUR NAME
YOUR EMAIL
Pay by PO
Send us your contact information and we will reach out to help you sign up by PO.
YOUR PHONE
YOUR NAME
YOUR EMAIL
Additional Questions?
Send us your contact information and your questions and we will reach out as quickly as possible.
YOUR PHONE
YOUR NAME
YOUR EMAIL
YOUR QUESTIONS
Get Started
Provide us your contact information and we will reach out as quickly as possible.
YOUR PHONE
YOUR NAME
YOUR EMAIL
Free Training Videos
Subscribing to our site gives you access to our Apple Admin 101 training videos as well as allowing us to notify you of each new blog post we release.
FIRST NAME
LAST NAME
PHONE
EMAIL
Subscribe Now
Subscribing to our site gives you access to our Apple Admin 101 training videos as well as allowing us to notify you of each new blog post we release.
FIRST NAME
LAST NAME
PHONE
EMAIL