Connect - 4.6.0
New Features
Timus Telemetry Agent
The Timus Telemetry Agent integrates with Timus Connect to provide enhanced visibility and security management for Windows and macOS devices. This feature allows for real-time data collection and monitoring, enabling administrators to enforce security policies and ensure compliance effectively.
Benefits:
Real-Time Data Collection: Continuously collect and monitor detailed information from connected devices.
Enhanced Security: Utilize collected data to enforce security policies and ensure compliance with organizational standards.
Improved User Experience: Provide administrators with comprehensive device insights, facilitating more informed decision-making and streamlined management.
Example Use Case:
Scenario: An administrator wants to monitor running processes on all devices to detect unauthorized software.
Process Monitoring: The administrator configures a device posture check using the Timus Connect data source to monitor running processes.
Real-Time Alerts: If an unauthorized process is detected, the system can trigger alerts or enforce security actions, such as isolating the device from the network.
Single Sign-On with SAML Integration
We have implemented SAML integration for Single Sign-On (SSO), enabling Timus to connect with any SAML-based authentication application using the SAML 2.0 protocol. This integration enhances authentication security and streamlines the user login process.
Benefits:
Enhanced Security: Utilize SAML 2.0 SSO to securely authenticate users, mitigating the risk of unauthorized access.
Seamless User Experience: Simplify the authentication process by allowing users to log in with their existing corporate credentials, providing a smoother and more intuitive user experience.
Centralized Identity Management: Centralize user identity and authentication management through a single identity provider (IdP), increasing administrative efficiency and reducing complexity.
Compliance and Control: Enforce SSO to ensure compliance with corporate security policies and regulatory requirements, providing greater control over user access and data protection.
Last updated