Remote Windows Management - Security Boulevard

SBN Remote Windows Management

Remote Windows ManagementAs IT organizations shift to the cloud, many are wondering what the next generation incarnation of IT management solutions like Active Directory®(MAD or AD) and SCCM will end up being. Will they be on-prem solutions like we’re accustomed to with AD, or will they come from the cloud? For those who think that a cloud solution truly signifies the next generation of management tools, they wonder if they can use Azure® Active Directory® and Intune® for cloud-based, remote Windows® management.

Remote Windows Management with Microsoft

Remotely managing Windows with Azure Active DirectoryThe short answer to the aforementioned question is yes, you can use Azure Active Directory and Intune for remote Windows management. But, that can equate to a costly solution. And, we aren’t even talking about the money spent, which can add up quickly with all the different tools required. Rather than dwell on monetary costs, let’s discuss a different cost. When you utilize Microsoft tools, you can easily become locked into Windows products. We think a significant cost associated with this scenario is getting tied to one single platform. Innovation is exploding all over the IT sector, and not having the ability to adapt and adopt innovative technology is a cost in and of itself.

DevOps Experience

New Resources

Cloud based resources for Windows managementSolutions such as Amazon Web Services® (AWS®), G Suite™, Slack, Kubernetes, macOS, Linux. and thousands of others are changing the game for engineering and IT organizations around the globe. But, if you’re locked into the Window’s ecosystem, you may not be able to utilize these tools with any sort of efficiency.  So, while remote Windows management is possible with Microsoft-based solutions, we encourage IT organizations to think broader and put into context all of the IT resources that they need to manage.

In today’s IT landscape, IT organizations need to tightly secure and control access to systems (Windows, Mac®, Linux®), cloud and on-prem server infrastructure (Google Compute Engine™, AWS®), web and on-prem applications that authenticate via LDAP and SAML, physical and virtual file servers (Samba / NAS appliances, G Drive™, (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Katelyn McWilliams. Read the original post at: