The terms are defined as follows:
- Endpoint: An endpoint refers to a computing device that communicates with a network and is often used in the context of endpoint security. This can include devices such as computers, laptops, smartphones, tablets, servers, and other devices that connect to a network.
- End-user: An end-user is an individual who uses a computer or software application. In the context of cybersecurity, an end-user would be the person utilizing a company device, such as an employee using a work computer or server.
So, in the context of ArmourZero:
- Endpoint: Refers to any device (e.g., computers, servers) that is part of the network and is protected by ArmourZero.
- End-user: Refers to the individuals who are using these devices within the company.
In this section, we will be discussing how to use the end-user features and explore use cases so you can get the most out of them.
How to use this feature?
Regularly checking the end-user directory is important for several reasons:
User Account Management
It ensures that only authorized users have access to the organization's resources and services.
In ArmourZero, managing these aspects involves the following steps:
Use Cases - Device Tracking
Helps track and manage devices connected to the network for proper security.
In ArmourZero, managing these aspects involves the following steps:
Security Compliance
Maintaining an up-to-date directory ensures only active and authorized users access sensitive data and resources.
In ArmourZero, managing these aspects involves the following steps:
- Identified unknown devices
- Duplicate device installation
- Locating specific devices or end-users
- Assign particular devices to end users
License Management
Crucial for enrolling users in subscription services and avoiding enrollment issues.
In ArmourZero, managing these aspects involves the following steps:
User Turnover
Allows prompt revoking of access for departing employees and granting access to new employees, maintaining network security.