Managing Endpoint Device Confetti

Where are we headed with endpoint management now that telecommuting and mobile devices are status quo — and ever increasing in number — in the workplace? Device and data management has become more challenging than we could have ever dreamed, even just 10 years ago.

Bring your own device (BYOD) programs have allowed people to use their personal smartphones, tablets and laptops to access work resources from anywhere at any time. This flexibility, while helping increase productivity across the board, has also greatly increased what IT admins now have to secure and manage. The risks of a data breach or malware infiltration are huge.

Many organizations are now providing company-owned, personally enabled (COPE) devices, which allows business IT departments to do the provisioning of the devices and to provide a better level of control over compliance and security.

Another wrinkle that further complicates securing and managing devices and data is the cloud. Not only are companies providing both BYOD and COPE programs to help people get more done, but a lot of the information and data employees are accessing lives on the cloud.

Timothy Warner, cloud and datacenter management expert at Pluralsight, calls this mushrooming device complexity “endpoint device confetti.” Warner got together with Nick Morea of Quest Software to discuss the future of endpoint management in a mobile world. Check out their on-demand webcast to learn strategies for implementing unified endpoint management (UEM) to deal with your own troublesome confetti.

Read the Digital Dialogue from Redmond Magazine for an overview of Warner and Morea’s conversation.

Get the Digital Dialogue

Anonymous