Since the beginning of the Covid-19 pandemic, cyber threats have increased by 81%, putting pressure on IT security teams in organizations of all sizes to ramp up their cybersecurity efforts. The reasons for the sharp increase in cyber threats are numerous. For starters, the vast majority of people transitioned to remote working, and many of them continue to work remotely today. In fact, Gartner predicts that 48% of employees will work at least some of the time remotely in the post-pandemic world.
Employees connect their corporate laptops to their personal — and unprotected — WiFi networks at home to log in and access corporate resources. This practice opens the door for malware, ransomware, and viruses. Because their work and personal lives are now intertwined, employees may use their corporate devices for personal activities such as web surfing, shopping, banking, gaming, and other online activities, giving hackers even more opportunities to infiltrate the corporate network.
To make matters worse, many homes have other unprotected devices such as laptops and cell phones, as well as IoT devices such as personal assistants, smart appliances, and streaming boxes — all of which also connect to the network. IT departments have little insight into all of an employee’s home devices, which may be running outdated software or have vulnerabilities that cybercriminals could exploit. Malware can lay hidden and incubate for days or weeks on these devices, then leverage the devices’ processing power to launch large-scale attacks.
As such, in today’s hybrid workplace, it’s essential for organizations to have complete visibility into all devices connected to the network at all times. That’s precisely why our customer, a leading provider of cybersecurity solutions to small businesses, governments, and corporate enterprises worldwide, partnered with Lansweeper Embedded Technologies.
The customer delivers solutions that protect more than 100,000 organizations of all sizes from fifth-generation cyber-attacks. However, its proprietary solutions for IT asset discovery provided limited information about network-connected devices.
According to the customer, small and medium-sized businesses (SMBs), a significant portion of their customer base, are easy targets for cybercriminals. “SMBs are hyper-focused on business operations and typically don’t devote substantial resources to cybersecurity,” claims the customer. “Plus, smaller businesses or branches of larger enterprises have IP cameras, printers, and other networked office equipment that are often vulnerable and unprotected.” Those devices are sitting ducks for cybercriminals. Last year small businesses were the target of 43% of cyber-attacks. Worse yet, 60% of small businesses go out of business within six months after a cyberattack.
Customer end-users can leverage our device recognition, powered by Fing, to gain instant and complete visibility across their IT estate. The customer states that the solution has proven extremely helpful in preventing cyber-attacks on its SMB clients. “Before we partnered with Lansweeper, we had minimal understanding of what devices were connected to our client’s networks, which made it difficult to spot and correct vulnerabilities,” they said.
Lansweeper uses AI-powered Credential-free Device Recognition (CDR) technology powered by Fing to automatically identify every device connected to a network —IT, OT, or IoT. It then provides very granular information about those devices, including the type and model of the device, what software is installed, and much more.
Integrating Lansweeper’s technology into its products sets the customer apart from competitors, who may not have access to such in-depth device information unless they’re implementing costly, complex security solutions that require extensive expertise. Lansweeper is fast and straightforward to integrate via cloud API, multi-platform SDK, or an offline DB.
With this integration, the customer provides a differentiated service — the ability to discover and identify every single device connected to a network, regardless of location and without the need for credentials — for complete visibility across the IT estate. Their clients benefit from rapid access to up-to-date, in-depth IT asset data that can be used to ensure the security and health of the IT infrastructure and ward off malicious cyber-attacks and other cybersecurity threats.