Managing Macs

managing macs

In the past enterprise environment, 9 out of 10 machines on a network were Microsoft® Windows® based. Today, that number is much different. Now, only 1 in 5 machines are Windows, which begs the question – what are the other 4 out of 5 machines? Well, a good chunk of them are actually Mac® machines. Mac usage has dramatically risen in the enterprise, and it comes at no surprise. When given the choice, 3 in 4 employees will choose Mac over their Windows counterpart. It’s clear that Mac is the preferred system for end users, but this raises a challenge for IT. What is the best way to go about managing Macs?

That question will be answered in this post, but first we should look at why this question even needs to be asked today.

Windows Systems in IT

As mentioned, Windows systems used to be dominant in the enterprise. These machines became the standard in the enterprise because of their openness and their ability to leverage millions of applications at a time where Mac was closed off. Microsoft decided to open up their platform and encourage everyone to develop software for it, while Apple did the opposite. As a result, more organizations went with Microsoft solutions because it offered them more flexibility.

But, the reason that Windows machines stayed around for as long as they did wasn’t just because of the application coverage. Over time, Apple achieved reasonable coverage as well. For IT organizations, the key reason to stick with Windows was the ability to manage them. Microsoft created some of the best IT management solutions, with Active Directory® and SMS (now called SCCM) leading the way. These tools allowed IT admins to have control over everything in their environment, provided that they were Microsoft based and located on-prem. With better security and control, IT organizations began to insist on using Microsoft based products, and the Microsoft lock-in took hold.

Unfortunately, Mac and Linux® devices never had this type of management in the past. If you had one of these systems in your (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 84 posts and counting.See all posts by jon-griffin