Hosted Endpoint Management

Hosted Endpoint ManagementIs a hosted endpoint management solution a viable option for modern IT organizations? IT admins would certainly like to know, especially those that are struggling to manage cross-platform system environments. Well, the answer is yes––there is a hosted endpoint management solution available for modern IT organizations. However, before we introduce this solution, we should define endpoint management since the term can be confusing.

What is Endpoint Management?

Endpoint managementVendors have used the term to describe everything from anti-virus technology to configuration management solutions to remote desktop management. We are taking a more traditional view of endpoint management in this article by referring to the ability to manage Windows®, Mac®, and Linux® machines through changing configurations, setting security policies, and enabling functions such as drive mapping and connecting to printers.

This view may sound familiar as it is the one that was taken by Microsoft® early on when they were thinking about their solution — Active Directory® (AD) — and their GPO (Group Policy Object) functions. Of course, IT admins know that AD GPOs only work for Windows systems. Further, AD’s approach to identity and system management assumed that there was a direct connection to the system, which made it difficult to manage remote users and systems. Nevertheless, AD helped to establish what many consider to be the modern concept of endpoint management.

Modern Endpoint Management Challenges

cross-platform device managementOver the last decade, the IT environment has shifted from a predominantly Windows-based network to something more heterogeneous––including Mac and Linux desktops, laptops, and servers. Also, the data center has shifted to cloud infrastructure such as AWS® and GCP (Google Cloud Platform). All of these various systems and locations have challenged traditional endpoint management solutions such as Active Directory and SCCM® (also from Microsoft).  

To be fair, there are third-party add-on solutions such as identity bridges, web application single sign-on (SSO), privileged identity management, and more, which can extend AD identities to the IT resources that cannot be managed with AD alone. However, this approach adds significant cost and complexity to the (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Vince Lujan. Read the original post at:

Vince Lujan

Vince is a documentation and blog writer at JumpCloud, the world’s first cloud-based directory service. Vince recently graduated with a degree in professional and technical writing from the University of New Mexico, and enjoys researching new innovations in cloud architecture and infrastructure.

vince-lujan has 169 posts and counting.See all posts by vince-lujan