Hosted Device Management

Hosted Device Management

Device management is an important part of an IT admin’s work. Ensuring that employees can do their jobs and have the tools to do them is critical. Windows, Mac, and Linux devices are the core of what most professionals use in their daily lives, and a hosted device management solution is simplifying mixed-platform management.

But offices weren’t always heterogeneous environments, so let’s take a look at how device management has developed over time.

It was Really Windows Device Management

Where Hosted Device Management Started

Traditionally, device management was really about Windows device management. That meant that Linux or Macs were mostly left out of the loop. Beyond that, device management was focused on ensuring the operating system was patched, people could access their network file shares and drives, and the machines were virus free and weren’t too slow. Security tasks like ensuring that passwords were strong and that nobody had ransomware on their machine was also part of the job function.

Of course, in an all Windows world, this was usually handled by on-prem Microsoft software like Active Directory®, SMS (System Management Server), or SCCM (System Center Configuration Manager). All of these tools helped IT admins manage their Windows machines and network.

It’s No Longer an All Windows World

cross-platform Hosted Device Management

The challenge today is that the IT network has dramatically changed. It is no longer

Windows-based. Now it is multi-platform, from the cloud, and all over the world. Users are more sophisticated, and using more types of technology in different ways.

This new normal for IT networks is difficult for sysadmins. System and device management tools that are primarily focused on Windows don’t work with new, modern resources. IT admins need tools that are OS independent and that can work from the cloud and with cloud or on-prem resources. Without proper device management, peace of mind will continue to elude IT. Admins will never know for certain if each user is following best practices for device security.

The Solution – Hosted Device Management

Hosted Device Management with JumpCloud's IAM solution

A new generation of cloud identity management with hosted device management built-in has been transforming the way that IT organizations maintain device (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Natalie Bluhm. Read the original post at:

Natalie Bluhm

Natalie is a writer for JumpCloud, an Identity and Access Management solution designed for the cloud era. Natalie graduated with a degree in professional and technical writing, and she loves learning about cloud infrastructure, identity security, and IT protocols.

natalie-bluhm has 172 posts and counting.See all posts by natalie-bluhm