Image credit: Pete Markham | Licensed under: CC BY 2.0
It’s tough for me to write the last blog post of the year. Maybe even tougher for you to concentrate on it, since most of us are focused on anything but work and IT right now.
But before you settle completely into holiday-think, devote a few cycles of your remaining work-think to some of the trends in endpoint management and network security that will probably be waiting for you when you get back.
6 Questions We Heard from You in 2015
In conversations with customers like you throughout the year, including at our Dell World User Forum, we’ve discussed with you the nuts and bolts of keeping hundreds of endpoints secure. After a few minutes on deploying patches, fixing vulnerabilities and enforcing security policies, you usually let us know what you would like to work on if only you could come up for air. We heard six prominent questions from you about the world of endpoint management outside your day-to-day, operational tasks:
Stocking Stuffer: “Technology Tunnel Vision” E-book
We always enjoy hearing what our customers are seeing out there. You make us smarter and keep us on our toes.
It’s not quite the same as a holiday bonus, but we have a new e-book for you, Technology Tunnel Vision, Part 1, with more of the perspectives on endpoint management and network security that you’ll need in the new year.
Thanks for following us in 2015. We look forward to hearing more from you in 2016.
<p>Sometimes I wish things were six simple steps. The minute we look at one thing and get it where it needs to go, the next new issue comes along.</p>
<p>Point 3 from above, we get this all the time, some folks refuse to understand risks they are bringing to the entire organization but we are still expected to support the latest gimmick and make sure it does NOT destroy the network in the process.</p>
<p>Six important steps...</p>
<p>Simple, I like that</p>
<p>the most important (in so many cases) is How are other organizations managing the consumerization of IT?</p>
<p>The influx of device variety has added a new layer to user education, too. Sometimes we're expected to know everything about every device in our environment and that has quickly become impossible - I find myself educating users about the capabilities of our IT team, gently coaching them back down to more reasonable expectations.</p>
<p>Number 4 is one that we are running into a lot here. People want security but still want things easy...argh!</p>
<p>Glad I'm not the only one with these thoughts rattling around in my head at night. Everyone wants everything to be as easy as pressing a button, but able to do 100 different tasks.</p>
<p>I am working very hard to balance usability and flexibility with security. This will be a major focus in 2016. </p>
<p>I enjoyed reading this article </p>
<p>Number 3. Users think that whatever they want to do is acceptable without any thought to proper planning or implementation.</p>
<p>On point number 3, How are we able to support and maintain every new device that comes out? There is a time when all support engineers go into technology overload trying to figure out all of the vulnerabilities and potential risks when Johnny gets his brand new device and demands that it be connected to the network... smh</p>