Essential Guide

Enterprise endpoint and mobile security management wait for no one

As endpoints evolve, stay on top of endpoint security management.

Introduction

endpoint security management

Admins can no longer worry just about keeping desktops up to date; laptops, smartphones and tablets bring a host of new security concerns into the enterprise. This guide compiles tips on how to address endpoint management and mobile security with available tools and policies.

1Planning for endpoint security-

Getting started with an endpoint and mobile security strategy

Many of the best practices for managing desktops still apply to mobile device management and endpoint security. IT admins should still determine what devices and systems are in use in their organizations, and they should be aware that the technologies for mobile security management are themselves evolving. As the role of the desktop admin evolves into that of endpoint manager, before you try to manage a particular tablet, operating system or type of data, develop a plan that builds on what you know and takes endpoint security into account.

Opinion

Enterprises need a mobile security strategy, not a tactical response

As tempting as it might be to respond to mobile devices on a tactical level, dealing with each type as it enters the enterprise, IT is far better off if it can assess what's in use, what systems are at risk and what controls might be needed. Continue Reading

Tip

What IT admins need to know about endpoint management

Confused about where to start as an admin with new client management responsibilities? Check out the answers to these common questions and be ready for enterprise mobility management (EMM), which itself is changing. Continue Reading

Tip

A good mobile security strategy starts with the enterprise desktop

Enterprise desktops and laptops aren't going away, despite dropping hardware sales and increasing reliance on tablets and smartphones. Good corporate policies should take all endpoints into account, and it may help to start with what you know. Continue Reading

Opinion

Desktop admins who jump on mobile security bandwagon protect their careers

Not only does your ability to stay current affect your IT environment, it's also relevant to your long-term career prospects. Desktop administrators have a role to play as mobile security management joins existing tasks and concerns. Continue Reading

News

Citrix VP discusses goals for enterprise mobility management

In this interview, Bernardo de Albergaria, Citrix's vice president of SaaS products and markets, explains how the vendor has reacted to the challenge of providing management software for a world in which apps, enterprise data and infrastructures are joined by mobile devices and cloud computing. Continue Reading

Tip

Controlling data is key to endpoint management

IT can't treat users' personal devices like they're corporate-owned, so for endpoint management to be successful, admins must control how employees can access data. Continue Reading

2Tools for endpoint management-

Tools for mobile devices proliferate as vendor shakeups continue

Enterprise mobility management must not only include end-user devices and apps, but also the software used to provision, monitor and secure various endpoints. Fortunately, there is a host of offerings to choose from, but be aware that tools for endpoint management are changing as vendors gobble up one another and strive to keep up with changing corporate needs. Both admins and users will recognize incarnations of Windows and Office for mobile devices, where Microsoft is competing with other OSes and suites. Virtualization and cloud computing also add options to the mix.

Opinion

Unified device management arrives with new endpoint tools

Until recently, organizations would need different tools to manage devices running different operating systems ranging from Windows to iOS. The Workplace Join capability in Windows 8.1 marks a turning point toward easier client management, writes columnist Brian Madden. Continue Reading

Tip

Desktop cloud backup opens another door for IT to watch

It's easier than ever for users to back up their workstations and other devices to the cloud, but does IT know what services they're using and how securely or how often backups are being done? Continue Reading

News

Mobile users get flexibility with Microsoft Office alternatives

Office has been the workhorse of enterprise productivity suites, but rivals such as Box, Apple and IBM have begun to offer on-premises and cloud-based options for employees on the go. Can Office 365 and Office Web Apps help Microsoft stay on top? Continue Reading

News

Dell KACE delivers endpoint management tools for iOS, Android

Acquisitions have helped Dell add products such as the KACE K1000 mobile app to its roster, as an example of the tools admins can use to monitor inventory and provision software on mobile endpoints. Continue Reading

Opinion

Windows 8 has limitations but is still worth consideration for mobile use

Business users and management will get whatever devices they want, and Windows 8 on tablets does have its limitations and attendant security concerns. However, Windows 8 on mobile devices is worth considering for standardization or at least support, writes columnist Kevin Beaver. Continue Reading

News

Microsoft hopes familiarity will lead to EMM platform success

The vendor hopes that its EMM platform will be successful partly on the basis of familiarity. Microsoft EMM includes Windows Server 2012 R2, System Center Configuration Manager 2012 R2 and the cloud-based Windows Intune. Continue Reading

News

Market, technology shifts to affect enterprise mobility management

Just as IT admins get a handle on the consumerization and bring your own device trends, market consolidation and new approaches to endpoint control will keep them on their toes. Continue Reading

3Ways to secure endpoints-

Don't get left behind as mobile security management evolves past the desktop

Once IT professionals evaluate their organizations' mobile usage patterns, they can begin work to protect important assets. Most enterprise mobility management products include some form of endpoint security, but one should never rely on a single approach. Built-in security settings in Group Policy, third-party products and hardware controls are available. To centralize administration and cut costs, some companies may opt to outsource mobile security management to a Security as a Service provider. See the potential downside of Security as a Service, as well as why you should remember data and people when planning for mobile security management.

Tip

Enterprise desktop management must respond to mobile device security

The time has long passed since desktop admins could ignore new devices entering the enterprise. They need to know who is using which devices, operating systems and apps to access what data before they can think about any endpoint security controls. Continue Reading

Feature

Service providers require security scrutiny with Desktop as a Service

Desktop as a Service and Security as a Service seem like easy ways to relieve in-house IT of the burden of managing endpoint security, but organizations should still do their due diligence on potential service providers. Continue Reading

News

Some Windows devices get protection from trusted platform module chip

The trusted platform module chip, which enterprises already use for data security on servers and networks, is now available on mobile processors. But which devices have the chip? Continue Reading

Tip

Lock down endpoints with these Group Policy tricks

There are numerous Group Policy settings for network security, but here are some that can be useful for locking down endpoints, including Windows mobile devices. Continue Reading

Tip

Your endpoint security tools might not be sufficient

For all of the discussions about the importance of endpoint security management, it's worth remembering that security tools are only as good as the policies directing them and the people using them. Is it better to detect malware and remove it or prevent infection altogether? Continue Reading

Tip

Control consumerization, not at the endpoint, but by securing data

Mobile security management often focuses on OSes, applications, and device ownership and controls, but why try to keep track of every device and app combination when what matters most is sensitive or valuable data? Securing data at rest and in use should be a key part of any endpoint security plan. Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

SearchExchange

Close