During a recent trip, I had the opportunity to speak with the IT director of a large, multinational enterprise. We breached the topic of using personal devices at work, and the numerous challenges that his company is now facing in trying to secure them.
This IT director is in full panic mode right now, as he is well aware that there are thousands of insecure devices accessing his network on a daily basis — a problem that will undoubtedly get much worse in the coming months following the recent KRACK WiFi vulnerability announcement.
As the IT director explained, he is actively looking for a unified endpoint management (UEM) solution to protect his enterprise. But he is fearful about buying and implementing the wrong product.
He is certainly not wrong in thinking this way. As we explained in a recent video, not all UEM solutions on the market today offer the same level of visibility, control or ease of use. Many are far more trouble than they are worth.
With this in mind, here are three important things to consider when buying a UEM platform:
- UEM can’t restrict end users: Most end users won’t really care all that much about the UEM product that you give them — until it hinders productivity. UEM needs to operate in the background, and allow them to do go about their work. Any products that restrict productivity will either be disabled, or ignored by end users.
- Ask about mobile management and reporting: Don’t assume that all UEM products come with mobile management and reporting features. Many don’t, and so it’s important to take a hard look at the features that a UEM vendor is offering. Otherwise, you could wind up with a product that secures laptops and desktops but not smartphones or tablets.
- Integration is essential: Many UEM solutions today are incapable of identifying supported containerized apps and hardware — making it difficult to perform important updates.
To learn more information about UEM, check out our new video!
Thanks for reading!
Get free email alerts on the topics of this article: