The Road to Unified Endpoint Management (UEM)

Contributed by James McKinney
It can be argued that today’s society not only thieves but is also more efficient due in part to mobile technology. As with all technology, mobile technology came with vulnerabilities that malfeasant individuals were keen to exploit. The use of personal mobile devices flourished in the mid-2000s with the release of the Apple iPhone and subsequent Android devices. Businesses soon learned the benefits of a Bring Your Own Device (BYOD) program. It soon became an almost overwhelming task to manage personal devices that were not controlled by the Information Technology (IT) department, yet allowed access to organizational resources. As technology advanced, the only constant seemed to be that of managing and securing the new technology which became more and more complex. As IT management grew in efficiency, the scope of control was expanded to not only mobile technology but all technology under a single umbrella. This paper will discuss how Unified Endpoint Management (UEM) was the culmination of, and a natural progression from other management systems. As advancements in technology thrived, so did business in the incorporation and implementation of technology transitioning from one management system to another. BYOD programs highlighted the need to develop what became Mobile Device Management (MDM). MDM then progressed to Enterprise Mobility Management (EMM) which then expanded to UEM. Like the Darwin theory, this paper will show how management systems have evolved to keep pace with the evolution of technology and security requirements. Along with the evolution of technology is the ever-increasing manner in which technology is incorporated into everyday life. It is a fine line between usability and security. Management leans towards security where the user demands usability. UEM provides a balance of what is required along with what is desired.
This document is in PDF format. To view it click here.

Rate this article: 
No votes yet