# Cloudilax

Case Study

Client Background

The client is a finance and accounting firm that provides start-ups and other businesses with outsourced accounting services and finance solutions, meaning they deal with many confidential employee and candidate information daily. With around 100 employees and four sites across the country, this client utilizes a mix of onsite, office, and home-based work. We will keep the client’s identity confidential because this topic relates to cyber security issues.

At Cloudilax Solutions, we know that digital theft and sophisticated attacks constantly threaten the financial sector. That’s why we offer proactive and adaptive approaches to cybersecurity. We customize solutions to meet our clients’ unique needs.

The Situation

Every employee at this firm uses between two and three company-issued and personal mobile devices (BYOD). Due to the nature of their work, employees must work from the office, at home, on the road, and at client sites. This Finance and accounting firm notified Cloudilax Solutions about some key issues surrounding the security of these devices and wanting control over company data being held on said devices — more specifically, emails, documents, and applications.

The Business Challenge

Employees use various company-issued and personally owned devices to work across several locations in America. This means that it's impossible to physically pick up and manually configure every device to conform to cyber security policies. The firm needed to ensure that it complied with the recently enacted Notifiable Data Breach scheme. Cloudilax Solutions was required to devise a solution that satisfied client data security issues and legislative requirements and could be implemented remotely to all devices.

hack 8

The Solution

Microsoft Intune / Microsoft Endpoint Manager Mobile Device Management tool was used by Cloudilax Solutions to meet the brief. Cloudilax Solutions presented this solution, and the company was happy to proceed with the plan. We rolled out Microsoft Intune / Microsoft Endpoint Manager MDM within the company and implemented the following:

Central Control of Data and Devices

Intune's centralized configuration manager and console allows the firm to control access and data permissions for all users and devices enrolled with the MDM.

Integrated with Existing System

Since the firm uses Microsoft Office 365 and Azure Active Directory, integrating Microsoft Intune with its current setup was seamless.

All Devices Locked Down

Both BYOD and company-issued devices are now locked down to protect company data with comprehensive security policies created by the user.

Restricted Access to Unauthorized Devices

The data is protected from cyber-attacks and infections by restricting access to devices that do not comply with cyber security policies.

Ability to Remotely Wipe Devices

If a device is lost or stolen, admins can protect and remotely wipe data off devices as needed.

Strong Password Enforcement

This significantly reduces the risk of guessing or hacking passwords. Admins also can reset passwords remotely if required.

Enforce Endpoint Protection

Administrators may apply security policies to all computers and devices to increase endpoint protection.

Updated Operating Systems

The feature helps ensure that the devices are always running the latest versions of all operating systems and essential software, reducing system vulnerabilities

Application Management

Mobile application management (MAM) in Intune is designed to protect organisation data at the application level, as opposed to the device level.