PRO+ Premium Content/E-Books

Thank you for joining!
Access your Pro+ Content below.
January 2015

Mobility management evolves into BYOD and beyond

Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to apps, data and the cloud. Once desktop admins get past the ever-bubbling alphabet soup of BYOD, MAM, MDM and EMM, they need to decide which tools are best for their -- and their users' -- jobs. Take a look at how desktop management has evolved to endpoint management and how IT must view devices as just one ingredient in the stew. IT is evolving past the need for bring your own device policies, as organizations shift their focus to securing data in the cloud, controlling network access to corporate apps and a more holistic approach to device management.

CHAPTERS AVAILABLE FOR FREE ACCESS

  • BYOD has its day

    Once desktop admins get past the ever-bubbling alphabet soup of BYOD, MAM, MDM and EMM, they need to decide on what tools are best for their—and their users’—jobs. Take a look at how desktop management has evolved to endpoint management and how IT must view devices as just one ingredient in the stew. IT is evolving past the need for bring your own device policies, as organizations shift their focus to securing data in the cloud, controlling network access to corporate apps and a more holistic approach to device management.

    Download
  • Desktop management tools still an IT staple

    Despite predictions of impending doom, the decline in hardware sales for desktops and laptops just means that the many people who still use them need good software and high reliability more than ever. This chapter of the Endpoint Management e-book explains the most common features available in desktop management tools, their benefits and limitations, and best practices for ensuring IT derives as much value as possible. Readers will also learn about the five areas where desktop management tools can provide the most benefits -- inventory, monitoring, software deployment, patching and security -- and get overviews of some of the different types of products available. Certain tools only manage specific processes, while others offer enterprise-scale support. Some run on-premises, while others are in the cloud.

    Download
  • How to choose the right endpoint management tool

    With new and improved features in Windows 10, plus ever-changing third-party utilities, IT administrators have plenty of desktop management tools at their disposal. That might seem like a good thing, but it's a double-edged sword. Lots of options on the table makes for a tough decision, and the tools often differ in such a way that they can't be compared easily. The best course of action is to figure out which features you need -- such as malware protection, threat intelligence and mobile device management -- then shortlist and test some tools from there.

    Vendor-neutral rankings also help with the decision-making process. And if you need cutting-edge or newer kinds of endpoint support, you can base your search for the right tool on those features as well. Consider whether you need endpoint detection and response capabilities, for example, and go from there.

    Download
  • Device diversity complicates endpoint management

    The proliferation of mobile devices in the enterprise presents a number of challenges for desktop administrators. Legacy, PC-oriented approaches to device management are no longer adequate because they treat all devices the same.

    There was a time when all the devices on a corporate network actually were the same -- the pre-smartphone days. Back then IT only needed the one method of managing and securing the corporate-owned devices. Today employees use smartphones, tablets, hybrid laptops and other devices for work; IT must now manage and secure multiple device types and operating systems, and they have to deploy applications too. But because devices are usually employee-owned these days, admins have to find ways to hook into endpoints without disrupting users' personal applications and data. How can they do it? With security and acceptable use policies, as well as mobile device management.

    Download

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close