End users deserve to know what their employer can see on their laptops and the systems they manage for Application and OS Updates, and Cyber Security.
Here is how PVYdevice can see and manage your devices:
PVYdevices can enforce settings like password length on your device. This is useful for IT teams to keep your Mac or Windows up to date so you don’t have to.
PVYdevices take action on your device remotely like trigger a restart, lock, or wipe your device. This is useful for IT teams to help you troubleshoot remotely if you run into any issues with your device or it got stolen.
PVYdevices can run any shell script on your device remotely. This is useful for IT teams to help you troubleshoot remotely if you run into any issues with your device. A policy can be defined to check if your system got unencrypted SSH keys.
PVYdevices can see details about the user accounts associated with your device, including which accounts have logged in recently. This is useful for IT and security teams to identify logins from suspicious accounts.
PVYdevices can see details about your device’s hardware. E.g., what processor is used, how much memory is installed, storage capacity, battery health, etc. This allows IT teams to preemptively address device health problems, which can mitigate data loss and reduce disruption to your workflow caused by IT related issues.
PVYdevices can access a detailed list of the software installed on your device. With this information, IT teams can better manage software update schedules, and reduce disruption to your workflow. Security teams can also use this data to determine if any of your software has been compromised, by referencing your software’s version number against known vulnerable software databases, such as NIST or Alienvault. It further can be connected to a Policy, to prevent installing risky Software, as Microsoft Teams.
PVYdevices can access a list of processes running on your device. These are processes you interact with graphically i.e., opened software; and processes that are running tasks in the background, such as sending data over network connections, running backups, or scheduled auto-updates. IT and security teams can use osquery to view this list in order to detect suspicious activity that may be a threat to your system. However, without the connection to the MDM, it can not kill such processes.
PVYdevices can see information about the status of firewalls and other security software installed on your device.
PVYdevices can see information about connected hardware devices. This is typically limited to only the type of hardware connected, and not specific details about the device. E.g., connected smartphones, USB devices, network devices, audio/visual hardware.
PVYdevices uses IP geolocation to provide an approximate location of your device. Accuracy of IP geolocation services vary depending on where you are, but can typically be pinpointed within the nearest state or city. Organizations typically use this feature to track stolen or misplaced devices, and in some cases to ensure the safety of employees.
In the case of a cyber attack, it is possible with Fleet to gain read access to files on your system. This is not a feature designed for privacy invasion, but rather a means for security teams to locate files on your device that may have been created or affected by a malicious virus. Additionally, Fleet can be configured to store disk encryption keys that can be used to recover encrypted data from a macOS or Linux device.
If you are unsure, or still have concerns about your privacy, it’s a good idea to talk to your employer about your organization’s privacy policy, and how your personal information is handled and follow our internal Guides how personal Information and files shall be stored and handled.
We at PVYswiss takes Data Protection seriously and don’t spy on users activities, content they create. To ensure a minimum security, especially for those who choose Windows as Operating System, we use PVYdevices for it. We also wrote a guide who gives for both, B.Y.O.D and Corprorate owneed Devices some advices to its users how to deal with personal data on a work computer.