Skip to main content

Granular Control Meets Endpoint Security in Automox's Custom Roles Debut

Automox announced the launch of Custom Roles, a powerful enhancement to its Role-Based Access Control (RBAC) capabilities.

Security breaches and insider threats grow more sophisticated by the day. The principle of least privilege has emerged as a critical strategy to reduce cyber risk by limiting access to the minimum needed to get the job done. Custom Roles leverage the principle of least privilege to provide limitless customization and control over user permissions, equipping IT admins to manage risk with ease.

"Custom Roles introduces tremendous flexibility to least-privilege administration, reinforcing a stronger security posture for organizations large and small," said Jason Kikta, CISO/SVP of Product at Automox. "By tightly scoping access and permissions, IT teams can better mitigate risks while maximizing visibility via an endpoint management solution designed with usability and security at its core."

Customizable Permissions for Every Feature

Custom Roles allow administrators to define permissions with granular precision. IT leaders can configure read, write, edit, and delete access for every feature within Automox, ensuring all permissions match organizational policies.

Dynamic Role Assignment

Global Administrators can assign multiple roles to a single user so access can be tailored not only to the individual but also to the specific organizational groups or contexts where they operate.

Scalable Integration of Existing and Custom Roles

Alongside seven out-of-the-box IT roles, administrators can create as many new roles as needed to reflect an organization’s unique requirements. The flexibility to integrate pre-defined and custom roles enhances operational agility without sacrificing control or compliance.

The launch of Custom Roles represents a pivotal step towards dynamic and context-aware least-privilege administration. "As cyber threats grow in sophistication, traditional access management practices face limitations," added Kikta. "With Custom Roles, Automox is laying the foundation for automated, context-aware access control that secures and streamlines IT operations."

Custom Roles equips organizations with an enterprise-grade tool to increase security confidence while simplifying role management at scale. By enabling precise permissions for endpoint management capabilities across Windows, macOS, and Linux devices, Automox continues to set the standard for modern IT operations.

The Latest

In MEAN TIME TO INSIGHT Episode 12, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses purchasing new network observability solutions.... 

There's an image problem with mobile app security. While it's critical for highly regulated industries like financial services, it is often overlooked in others. This usually comes down to development priorities, which typically fall into three categories: user experience, app performance, and app security. When dealing with finite resources such as time, shifting priorities, and team skill sets, engineering teams often have to prioritize one over the others. Usually, security is the odd man out ...

Image
Guardsquare

IT outages, caused by poor-quality software updates, are no longer rare incidents but rather frequent occurrences, directly impacting over half of US consumers. According to the 2024 Software Failure Sentiment Report from Harness, many now equate these failures to critical public health crises ...

In just a few months, Google will again head to Washington DC and meet with the government for a two-week remedy trial to cement the fate of what happens to Chrome and its search business in the face of ongoing antitrust court case(s). Or, Google may proactively decide to make changes, putting the power in its hands to outline a suitable remedy. Regardless of the outcome, one thing is sure: there will be far more implications for AI than just a shift in Google's Search business ... 

Image
Chrome

In today's fast-paced digital world, Application Performance Monitoring (APM) is crucial for maintaining the health of an organization's digital ecosystem. However, the complexities of modern IT environments, including distributed architectures, hybrid clouds, and dynamic workloads, present significant challenges ... This blog explores the challenges of implementing application performance monitoring (APM) and offers strategies for overcoming them ...

Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 months, according to a study from PagerDuty ...

IT infrastructure (on-premises, cloud, or hybrid) is becoming larger and more complex. IT management tools need data to drive better decision making and more process automation to complement manual intervention by IT staff. That is why smart organizations invest in the systems and strategies needed to make their IT infrastructure more resilient in the event of disruption, and why many are turning to application performance monitoring (APM) in conjunction with high availability (HA) clusters ...

In today's data-driven world, the management of databases has become increasingly complex and critical. The following are findings from Redgate's 2025 The State of the Database Landscape report ...

With the 2027 deadline for SAP S/4HANA migrations fast approaching, organizations are accelerating their transition plans ... For organizations that intend to remain on SAP ECC in the near-term, the focus has shifted to improving operational efficiencies and meeting demands for faster cycle times ...

As applications expand and systems intertwine, performance bottlenecks, quality lapses, and disjointed pipelines threaten progress. To stay ahead, leading organizations are turning to three foundational strategies: developer-first observability, API platform adoption, and sustainable test growth ...

Granular Control Meets Endpoint Security in Automox's Custom Roles Debut

Automox announced the launch of Custom Roles, a powerful enhancement to its Role-Based Access Control (RBAC) capabilities.

Security breaches and insider threats grow more sophisticated by the day. The principle of least privilege has emerged as a critical strategy to reduce cyber risk by limiting access to the minimum needed to get the job done. Custom Roles leverage the principle of least privilege to provide limitless customization and control over user permissions, equipping IT admins to manage risk with ease.

"Custom Roles introduces tremendous flexibility to least-privilege administration, reinforcing a stronger security posture for organizations large and small," said Jason Kikta, CISO/SVP of Product at Automox. "By tightly scoping access and permissions, IT teams can better mitigate risks while maximizing visibility via an endpoint management solution designed with usability and security at its core."

Customizable Permissions for Every Feature

Custom Roles allow administrators to define permissions with granular precision. IT leaders can configure read, write, edit, and delete access for every feature within Automox, ensuring all permissions match organizational policies.

Dynamic Role Assignment

Global Administrators can assign multiple roles to a single user so access can be tailored not only to the individual but also to the specific organizational groups or contexts where they operate.

Scalable Integration of Existing and Custom Roles

Alongside seven out-of-the-box IT roles, administrators can create as many new roles as needed to reflect an organization’s unique requirements. The flexibility to integrate pre-defined and custom roles enhances operational agility without sacrificing control or compliance.

The launch of Custom Roles represents a pivotal step towards dynamic and context-aware least-privilege administration. "As cyber threats grow in sophistication, traditional access management practices face limitations," added Kikta. "With Custom Roles, Automox is laying the foundation for automated, context-aware access control that secures and streamlines IT operations."

Custom Roles equips organizations with an enterprise-grade tool to increase security confidence while simplifying role management at scale. By enabling precise permissions for endpoint management capabilities across Windows, macOS, and Linux devices, Automox continues to set the standard for modern IT operations.

The Latest

In MEAN TIME TO INSIGHT Episode 12, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses purchasing new network observability solutions.... 

There's an image problem with mobile app security. While it's critical for highly regulated industries like financial services, it is often overlooked in others. This usually comes down to development priorities, which typically fall into three categories: user experience, app performance, and app security. When dealing with finite resources such as time, shifting priorities, and team skill sets, engineering teams often have to prioritize one over the others. Usually, security is the odd man out ...

Image
Guardsquare

IT outages, caused by poor-quality software updates, are no longer rare incidents but rather frequent occurrences, directly impacting over half of US consumers. According to the 2024 Software Failure Sentiment Report from Harness, many now equate these failures to critical public health crises ...

In just a few months, Google will again head to Washington DC and meet with the government for a two-week remedy trial to cement the fate of what happens to Chrome and its search business in the face of ongoing antitrust court case(s). Or, Google may proactively decide to make changes, putting the power in its hands to outline a suitable remedy. Regardless of the outcome, one thing is sure: there will be far more implications for AI than just a shift in Google's Search business ... 

Image
Chrome

In today's fast-paced digital world, Application Performance Monitoring (APM) is crucial for maintaining the health of an organization's digital ecosystem. However, the complexities of modern IT environments, including distributed architectures, hybrid clouds, and dynamic workloads, present significant challenges ... This blog explores the challenges of implementing application performance monitoring (APM) and offers strategies for overcoming them ...

Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 months, according to a study from PagerDuty ...

IT infrastructure (on-premises, cloud, or hybrid) is becoming larger and more complex. IT management tools need data to drive better decision making and more process automation to complement manual intervention by IT staff. That is why smart organizations invest in the systems and strategies needed to make their IT infrastructure more resilient in the event of disruption, and why many are turning to application performance monitoring (APM) in conjunction with high availability (HA) clusters ...

In today's data-driven world, the management of databases has become increasingly complex and critical. The following are findings from Redgate's 2025 The State of the Database Landscape report ...

With the 2027 deadline for SAP S/4HANA migrations fast approaching, organizations are accelerating their transition plans ... For organizations that intend to remain on SAP ECC in the near-term, the focus has shifted to improving operational efficiencies and meeting demands for faster cycle times ...

As applications expand and systems intertwine, performance bottlenecks, quality lapses, and disjointed pipelines threaten progress. To stay ahead, leading organizations are turning to three foundational strategies: developer-first observability, API platform adoption, and sustainable test growth ...