The gig economy is changing how IT works. In fact, many significant innovations such as WiFi, mobile devices, and cloud infrastructure are changing how IT admins need to manage their networks. Even the concept of the network itself has completely changed. Long gone are the days of a wired network with everything located on-prem. The users of the network aren’t even on-prem anymore! So, the question becomes – how do you solve remote user and device management in this new environment?
Networks in the Past
Historically, networks were largely on-prem and Microsoft Windows-based. A few resources were located off-prem – perhaps servers at the data center, but these were often connected to the headquarter location via a VPN. Remote users were generally remote sales people who would be working from home offices. These users, too, were connected back to the headquarter location via VPN. Applications would be hosted on-prem as well. The world looked very different in the late 1990s and early 2000s.
IT management tools were built around the on-prem Microsoft Windows model. Microsoft, in fact, dominated the management tool space with solutions such as Active Directory® and SCCM. Active Directory was the monopoly in the identity management space. IT admins would control access to IT resources via AD and ultimately would create a domain where the user could login and have access to their system, applications, and network file shares. On the device management side, Active Directory’s GPO feature could be used to manage Windows machines If a more robust solution was needed, IT admins turned to SCCM.
New Devices, Remote Users
Of course, the IT world exploded with change over the subsequent decades. Microsoft Windows devices gave way to Mac and Linux systems and mobile devices from Apple and Google. In fact, only one in five devices is now Windows-based (Forbes). Applications shifted to the cloud in the form of SaaS applications, and the data center shifted to the cloud with AWS dominating the Infrastructure-as-a-Service space. Wired networks converted to being WiFi. Perhaps one of the most important changes of all was that users became (Read more...)
*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at: https://jumpcloud.com/blog/remote-user-device-management/