Kolide – Endpoint security for people, not paper clips

Kolide - Endpoint security for people, not paper clips

Many thanks to the great folks at Kolide, who have sponsored my writing for the past week.

You know the old thought experiment about the AI designed to make paper clips, that quickly decides that in order to maximize paper clips, it will have to get rid of all the humans?

A lot of security teams have a similar idea when it comes to meeting compliance goals: it would be so much simpler if it weren’t for all the pesky users.

That way of thinking has brought us to the current state of endpoint security, which is dominated by MDMs that hamper device performance and turn every laptop into Big Brother. This approach to security is bad for culture and morale, and moreover, it doesn’t actually work. If it did, then no company with an MDM and an annual security training would have a data breach.

Kolide is an endpoint security and fleet management solution that takes a different approach. We help our customers meet their compliance goals–whether that’s for auditors, customers, or leadership–by enlisting the support of end users.

Kolide works by notifying your employees of security issues, educating them on why compliance matters, and giving them step-by-step instructions to resolve issues themselves.

By reaching out directly to employees and educating them about company policies, Kolide can help you build a culture in which everyone contributes to security, because everyone understands how and why to do it.

For IT admins, Kolide helps you prove compliance via a single dashboard. From there, you can monitor the security of your entire fleet, whether they’re running on Mac, Windows, or Linux. (You read that right; Kolide can finally provide visibility into your Linux users.)

At a glance, you can see which employees have their disks encrypted, OS up to date, and password manager installed, among a host of other issues. And this data collection isn’t happening in the shadows; end users can see exactly what data is being collected and why in the User Privacy Center.

If you’ve read this far, it’s because you’re intrigued by an approach to endpoint security that gets end users involved. Click here to learn more about how it works. If you like what you see, you can sign up for a free trial, no credit card required.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about cybersecurity, you can find more information here.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about cybersecurity, you can find more information here.