With the changing IT landscape, many in the IT industry are trying to get a grasp on endpoint management. Much of this is to do with the fact that the endpoint management industry has gone through a number of transformations over the years. With that being the case, it is worthwhile to do a modern interpretation of what endpoint management is. In all, this article will discuss a modern approach and introduction to endpoint management.
A Microsoft®-Dominated Past
Traditionally, endpoints were largely Microsoft® Windows®-based laptops and desktops. Each endpoint needed to be managed by an IT staff. Activities such as installing software, setting configurations, adjusting performance, and tightening security were all components of the daily workload that IT admins and MSPs needed accomplished. For the vast majority of organizations there was only one platform, Windows, and Microsoft provided excellent solutions to help manage these endpoints including SMS (now called SCCM or ConfigMgr).
New(ish) Endpoint Management Tools
As time passed and security issues increased, a whole generation of endpoint security tools emerged. These tools included anti-virus/anti-malware solutions as well as host-based intrusion detection solutions. Over time, these categories would start to overlap with traditional system management solutions like Group Policy Objects (GPOs) to create a broader endpoint management category. But, changes on the horizon began to cloud what used to be a very clear endpoint management strategy.
Shifting Sands of the IT Landscape
Recently, two major changes in the IT landscape are causing yet another disruption in the endpoint management space. This first is that the IT network is no longer Windows-based. macOS® and Linux´ systems are more popular than ever and on more desks than in years past. The second is that identity security is now the most important layer of security for an organization. And, this is translating into user management issues on endpoints. As a result, a new generation of endpoint management is now emerging to address heterogeneous environments and integrate both user and system management requirements.
*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Ryan Squires. Read the original post at: https://jumpcloud.com/blog/endpoint-management-intro/