Following an initial assessment and armed with an accurate and detailed picture of Boden’s endpoint estate, the BlueFort team set about validating those devices, identifying if they had up-to-date security settings, understanding how, where, and what parts of Boden’s IT infrastructure they were accessing, looking at the permissions of those devices, and determining if the endpoints were even necessary or could be disregarded.
Having worked through the discovery and validation pillars of its methodology, BlueFort’s team turned to the control element. What Boden needed was a way to retain this new-found cyber visibility and make life easier for its relatively small IT and security team. The solution was to deploy a BlueFort continuous validation platform that continuously identifies, protects, and ensures the compliance of all managed and unmanaged endpoints—crucially without business disruption. BlueFort helped Boden quickly identify how and where to implement the solution in its network. Deployment took just three days in both the UK and US locations.