Clevr360 2.0 is here: what’s new, and how it strengthens IT security

Clevr360 is our platform that provides a unified way for our customers to manage their IT real estate – and it’s already helping them drive down licensing costs, secure their IT systems and maximise their IT investments 

We’re pleased to announce that version 2.0 is being released, with a particular focus on improved security and assurance insights to help IT teams take a proactive approach in countering security threats to their organisation. 

Here we take a look at some of what’s offered in the latest version. 

More ways to identify cyber threats 

Users are facing increasingly sophisticated attacks, with a particular focus on social engineering cyberattacks. Social engineering is involved with 90% of targeted individuals, according to a Cybersecurity report by Positive Technologies  

An MFA fatigue attack (also known as MFA bombing or MFA spamming) for example is a strategy where attackers repeatedly push second-factor authentication requests to a target victim’s email or registered device. The goal is to coerce the victim into confirming their identity. 

Meanwhile IT teams deal with their own form of overwhelm from legitimate systems and notifications. To help counter this, Clevr360 continues to bring information together in one place and to prioritise what’s important for IT teams. 

In v2.0 IT teams will benefit from new ways to counter threats.  

  • See suspicious account activity at a glance. Track incidents such as logins from suspicious IP addresses, attacks against accounts and MFA fatigue attacks or even failed attempts to detect potential threats at early stages to take action. Insights can be broken down by the login type, user or country of origin to quickly identify and track patterns in suspicious behaviours.  
  • Identify suspicious auto-forwarding rules. A bad actor may setup auto-forwarding rules quietly in the background of a compromised account, leading to information security breaches and further attacks. Here you can see where forwarding rules have been created and identify any potential security issues. It also allows easy visibility of legitimate users breaking IS policies – such as forwarding email to a personal address.  

More ways to proactively manage your security posture 

Any way for IT teams to more easily see vulnerabilities and proactively manage business risk will allow for issues to be tackled before they become a bigger problem. Clevr360 continues to bring this information to the forefront for faster resolution.   

  • See what apps have access to Microsoft data. Identify on a user or tenant level what external applications have access to your data and the types of permissions granted. Quickly see those with unnecessarily intrusive levels of access and take action to restrict their reach. 
  • See outdated browser usage. With outdated browsers a potential vector for malware infection, ensuring users are using an up to date and secure browser is essential. The IT team will now get a clear view of outdated browser usage.  
  • Tackle operating systems lacking updates. Sometimes devices can slip through the net and not have the appropriate OS updates. Here IT teams can quickly identify systems at risk across the organisation and take action. 

The result: better cyber health 

While employee education is important – and the improved reporting of Clevr360 will help with this – it’s not enough.  

A proactive approach with the ability to monitor issues, look out for suspicious behaviours and identify patterns that may not be apparent from a single source is vital. That’s why Clevr360 is designed to provide a simplified view of security health across your organisation and make it easier to mitigate common attacks. 

Request a demo to find out more about Clevr360 and how it can help you bolster your proactive approach to improving your organisation’s security posture.  

get Clevr360

Speak to our team

Fill out the form below and we will be in touch with the next steps.