Many IT managers will tell you that device management — for PC, laptop and tablet fleets — is already dead. In fact, Info-Tech analyst Mike Battista recently suggested that “organizations should treat IT as utility: any endpoint should be able to access the applications and services needed by its user. And like the power company doesn’t need to manage light bulbs receiving electricity, IT doesn’t need to manage endpoints receiving IT services.” But, to the contrary, device management is becoming more important now than ever before.
Today’s employees who view IT as non-responsive continue to actively purchase hardware and software behind the department’s back and end users continue bypassing rather than engaging IT. In a 2014 survey of 300 employees in organizations across the United States, United Kingdom, Australia and New Zealand, Stratecast/Frost & Sullivan found that 80 percent of respondents admitted to using non-approved SaaS applications in their jobs.
This trend, also known as shadow IT, creates a hidden, growing pool of assets that companies own, but are largely unaware of — creating legal, security and compliance risks. Imagine a scenario where a CIO or CEO signs off its Sarbanes Oxley report to say devices and networks are secure, but in reality their marketing manager has downloaded software to a company PC that leaks sensitive data to the internet.
The main concern around shadow IT is that it’s just the beginning, as more individuals trust cloud-based software and services, it is likely that growing numbers will bypass IT and download applications without guidance or permission. With this dangerous trend, the risk of data leakage grows significantly.
While Battista may argue that, “like the power company doesn’t need to manage light bulbs receiving electricity, IT doesn’t need to manage endpoints receiving IT services;” the humble light bulb doesn’t present a major risk to the building in which it’s fitted, but user-owned devices do.
Any organization with a bring your own device (BYOD) policy in place will still want to know that each device is operating securely when connected to the corporate network, and that it does not present a security or compliance loophole… Continue Reading: http://insights.wired.com/profiles/blogs/is-endpoint-management-dead#ixzz38zGtLD7d