Admins can no longer worry just about keeping desktops up to date; laptops, smartphones and tablets bring a host of new security concerns into the enterprise. This guide compiles tips on how to address endpoint management and mobile security with available tools and policies.
1Planning for endpoint security-
Getting started with an endpoint and mobile security strategy
Many of the best practices for managing desktops still apply to mobile device management and endpoint security. IT admins should still determine what devices and systems are in use in their organizations, and they should be aware that the technologies for mobile security management are themselves evolving. As the role of the desktop admin evolves into that of endpoint manager, before you try to manage a particular tablet, operating system or type of data, develop a plan that builds on what you know and takes endpoint security into account.
As tempting as it might be to respond to mobile devices on a tactical level, dealing with each type as it enters the enterprise, IT is far better off if it can assess what's in use, what systems are at risk and what controls might be needed. Continue Reading
Confused about where to start as an admin with new client management responsibilities? Check out the answers to these common questions and be ready for enterprise mobility management (EMM), which itself is changing. Continue Reading
Enterprise desktops and laptops aren't going away, despite dropping hardware sales and increasing reliance on tablets and smartphones. Good corporate policies should take all endpoints into account, and it may help to start with what you know. Continue Reading
Not only does your ability to stay current affect your IT environment, it's also relevant to your long-term career prospects. Desktop administrators have a role to play as mobile security management joins existing tasks and concerns. Continue Reading
In this interview, Bernardo de Albergaria, Citrix's vice president of SaaS products and markets, explains how the vendor has reacted to the challenge of providing management software for a world in which apps, enterprise data and infrastructures are joined by mobile devices and cloud computing. Continue Reading
2Tools for endpoint management-
Tools for mobile devices proliferate as vendor shakeups continue
Enterprise mobility management must not only include end-user devices and apps, but also the software used to provision, monitor and secure various endpoints. Fortunately, there is a host of offerings to choose from, but be aware that tools for endpoint management are changing as vendors gobble up one another and strive to keep up with changing corporate needs. Both admins and users will recognize incarnations of Windows and Office for mobile devices, where Microsoft is competing with other OSes and suites. Virtualization and cloud computing also add options to the mix.
Until recently, organizations would need different tools to manage devices running different operating systems ranging from Windows to iOS. The Workplace Join capability in Windows 8.1 marks a turning point toward easier client management, writes columnist Brian Madden. Continue Reading
It's easier than ever for users to back up their workstations and other devices to the cloud, but does IT know what services they're using and how securely or how often backups are being done? Continue Reading
Office has been the workhorse of enterprise productivity suites, but rivals such as Box, Apple and IBM have begun to offer on-premises and cloud-based options for employees on the go. Can Office 365 and Office Web Apps help Microsoft stay on top? Continue Reading
Acquisitions have helped Dell add products such as the KACE K1000 mobile app to its roster, as an example of the tools admins can use to monitor inventory and provision software on mobile endpoints. Continue Reading
Business users and management will get whatever devices they want, and Windows 8 on tablets does have its limitations and attendant security concerns. However, Windows 8 on mobile devices is worth considering for standardization or at least support, writes columnist Kevin Beaver. Continue Reading
The vendor hopes that its EMM platform will be successful partly on the basis of familiarity. Microsoft EMM includes Windows Server 2012 R2, System Center Configuration Manager 2012 R2 and the cloud-based Windows Intune. Continue Reading
Just as IT admins get a handle on the consumerization and bring your own device trends, market consolidation and new approaches to endpoint control will keep them on their toes. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
3Ways to secure endpoints-
Don't get left behind as mobile security management evolves past the desktop
Once IT professionals evaluate their organizations' mobile usage patterns, they can begin work to protect important assets. Most enterprise mobility management products include some form of endpoint security, but one should never rely on a single approach. Built-in security settings in Group Policy, third-party products and hardware controls are available. To centralize administration and cut costs, some companies may opt to outsource mobile security management to a Security as a Service provider. See the potential downside of Security as a Service, as well as why you should remember data and people when planning for mobile security management.
The time has long passed since desktop admins could ignore new devices entering the enterprise. They need to know who is using which devices, operating systems and apps to access what data before they can think about any endpoint security controls. Continue Reading
Desktop as a Service and Security as a Service seem like easy ways to relieve in-house IT of the burden of managing endpoint security, but organizations should still do their due diligence on potential service providers. Continue Reading
The trusted platform module chip, which enterprises already use for data security on servers and networks, is now available on mobile processors. But which devices have the chip? Continue Reading
There are numerous Group Policy settings for network security, but here are some that can be useful for locking down endpoints, including Windows mobile devices. Continue Reading
For all of the discussions about the importance of endpoint security management, it's worth remembering that security tools are only as good as the policies directing them and the people using them. Is it better to detect malware and remove it or prevent infection altogether? Continue Reading
Mobile security management often focuses on OSes, applications, and device ownership and controls, but why try to keep track of every device and app combination when what matters most is sensitive or valuable data? Securing data at rest and in use should be a key part of any endpoint security plan. Continue Reading