Home page » Your needs » Securing workstations

Securing workstations

Workplace safety is a major issue for CIOs. Indeed, workstations are regularly the gateway to cyber attacks and are often infected by unintentional malware installations. The violation of a part of the company’s data can be highly prejudicial and have significant repercussions on its sustainability. Let’s see in detail how to better manage workstation security with Wisper 360.

capture d’écran 2022 03 23 à 18.21.42

The problems of securing workstations

Wisper 360 is an important ally in optimizing the safety of workstations. First, Wisper 360 allows the organization’s entire IT fleet to be homogenized thanks to the centralized management of OS and applications. Then, the solution quickly deploys updates, security patches and new tools, allowing the CIO to be security-responsive. In the event of a cyber attack, the DSI may decide to restart the entire fleet to get rid of the malware and stop its spread.

Dans le cadre de la reprise d’activité suite à une cyberattaque, la solution Wisper 360 permet de redéployer en quelques minutes l’ensemble des postes de travail sain, et ce même à distance grâce à la console de gestion centralisée.

As part of a business continuity plan, the solution guarantees production continuity, even in the event of a virus attack, with a simple reboot of the user machine.

In the event of a cyber attack, the CIO can decide to reboot the entire fleet to get rid of the malware and stop its propagation . In the event of an internet outage, workstations continue to function.

1. Stop the spread of the threat

The workstation administrator can stop the entire fleet of workstations from its centralized administration console. This step is crucial, because it allows on the one hand to stop the spread of the malware/ virus and on the other hand to ensure that at the next start, the stations will not be infected. Indeed, since the Wisper 360 solution operates in «Read-Only» mode, any installation made after the start of the workstation is not kept. Station clears “temporary” cache at each stop.

2. Installation of the security patch

The IT team must now edit the master image(s), which are images prepared by the CIO containing an OS and applications. An organisation may have several of these. Depending on the type of threat, the workstation administrator installs the security patch provided by the publisher, updates the OS, the software or the antivirus. The next time the system is started, all workstations will start up on a secure image.

3. Deploying the secure image

The desktop administrator can finalize the deployment of secure images across their sites and workstations. This action is very fast thanks to the versioning system. Indeed with Wisper 360 the whole image does not come down on each site. Only the differential is downloaded: once per site and then on each station in the LAN. The workstations then start on a secure image, free of any malicious installation.

That's it!

With Wisper 360, IT can quickly implement security decisions. A Wannacry-like cyber attack can be identified and addressed in just 1-2 hours with the Wisper 360 solution across hundreds of stations and sites.

Switch to Wisper 360 now.

Convinced ? It's time to satisfy your customers, your employees, your CFO and your CEO!

Discover the others (excellent) reasons to move to Wisper 360.

Every day our customers find new good reasons
to use Wisper 360, what about you?