INDUSTRY COMMENTARY

Secure Automation: Balancing Efficiency and Security
Industries are racing to leverage the competitive advantages of automation, such as higher efficiency and output, reduced human error, prediction, and scalability. However, achieving cohesion between automation’s competitive advantages and associated security risks is a growing concern and challenge.

Is your Computing Function Mature Enough for DEX?
DEX is growing in popularity and you might be feeling inspired to set up your own DEX function. But are you sure that your EUC is strong enough to support it?

How Zero-Day Chaining Challenges Traditional Security Tools
Gone are the days when cybercriminals relied on exploiting single-sided vulnerabilities easily detectable and mitigated by traditional perimeter controls, vendor patches, and a robust patching cadence. In today’s threat landscape, malicious cyber actors are focused on fostering persistent chaos and slowing down detection, analysis, and mitigation effects by increasing the probability and likelihood of cyber incidents by chaining multiple zero-day exploits.

Can Digital Employee Experience Address Employee Burnout?

Is Now the Right Time to Invest in Digital Employee Experience?
Today's business landscape is roiling with changes and challenges that leave even the most seasoned leaders feeling uncertain.
In amongst the turmoil, there’s one question that stands out to me:
Is now the right time to invest in digital employee experience?

Microsoft Intune Advanced Endpoint Analytics - Notepad++ Use Case
As a follow-up to our Microsoft Intune Advanced Endpoint Analytics article, please see our sample Use Case on what is possible without 3rd party applications in your environment!

Microsoft Intune Advanced Endpoint Analytics - In Depth Review w/ServiceNow Integration
Update your quadrants…there is a new DEX player in town and it is clientless….

Firmware Updates: A Key Component of Your Cybersecurity Strategy
So few customers we talk to even attempt to address firmware patching, and there are a lot of great excuses as to why….

When “Enabling MFA” Isn’t Enough
Multi-factor authentication (MFA) has become a popular security measure for protecting sensitive enterprise information. And while any implementation of MFA is better than none, many customers we talk to realize that MFA is not always enabled as it should be, but not all MFA methods are created equal.

The DEX Show | Podcast #51
A great conversation with Tom McGrath, covering how DEX tools can be transformational for not only automation but also compliance, experience, and support.
ABOUT STEVE
Steve Walsh is a Senior Consultant for Ayla Consulting with nearly 20 years of enterprise IT experience spanning support, end user computing, DEX / XLA concepts, endpoint security and automation. While most of his consulting calls are around moving customers to modern endpoint management solutions, his current passion is around Digital Employee Experience (DEX) implementations and customers using End User Experience Management (EUEM) tools to drive employee satisfaction.
“The number one benefit of information technology is that it empowers people to do what they want to do. It lets people be creative. It lets people be productive. It lets people learn things they didn’t think they could learn before, and so in a sense it is all about potential.”