Home

Device Management

Device Management
Outsourcing Trends Post-PandemicOutsourcing Trends Post-Pandemic

At a time when IT staff must do more with less, 100 leaders share whether outsourcing IT management is becoming a higher priority this year.

If you had a magic wand - what's the #1 daily business challenge you'd eliminate?

Top Answer: Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.

If you are a current SAP customer, when do you plan to migrate to SAP S/4HANA?

Top Answer: No plan to migrate soon.

6012 views
20 comments
100 upvotes
Related Tags
People & Leadership
Strategy & Architecture
Cloud
End-User Services & Collaboration
Applications & Platforms
Engineering
Governance, Risk & Compliance
Data & Analytics
Business Intelligence
Disruptive & Emerging Technologies
Team & Organizational Design
Security Strategy & Roadmap
IT Strategy & Roadmap
Outsourcing & Managed Services
Network
Compute
Storage
Backup & Disaster Recovery
Public Cloud
Hybrid Cloud
Contact Center & Telecom
Data Center
Device Management
End-User Devices
Mobile
Productivity Tools
Collaboration Solutions
Document Management
Finance
Business Applications
Legal
Human Resources (HRIS)
Technical Product Management
Software Development
DevOps
Quality Assurance
Continuous Integration/Continuous Deployment (CI/CD)
Enterprise & IT Service Management (ITSM)
Availability & Capacity Management
KPIs, Metrics & Reporting
Financial Management
Vendor Management
Service Desk
Management Tools
Risk Management
Data Privacy
Artificial Intelligence & Machine Learning (AI/ML)
Data Warehouse
Integrations
Security & GRC
Identity & Access Management (IAM)
Blockchain
IoT
Innovation
5G
Peer Insights
Feedback
Vendor/Product Recommendation
Business Continuity & Disaster Recovery
Crisis Management
Customer Engagement
Customer Relationship Management (CRM)
Enterprise Resource Planning (ERP)
Business Relationships
Talent Management & Performance
Portfolio, Program & Project Management
Data Management
Big Data
Vendor/Product Assessment
Process Management
Asset & Configuration Management
Infrastructure
Performance
Operations Management
Mobile Development
Testing
If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it.  The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world.  What do others think ?  How could this impact your organization ?   Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge

Top Answer: The message here is: one is never out of the woods ever, so pay attention! Just because today's news eclipses yesterday's doesn't mean companies get to shove the bad under the rug and stay silent. Remember, vulnerabilities discovered 10-15 years back are still at the top of the list of the most exploited.

Is endpoint security for mobile devices more difficult than it is for laptops?

Top Answer: I think mobile devices were better designed from the beginning as opposed to desktop operating systems. Mobile started way ahead of where desktops started. But the fact that the mobile device management (MDM) products existed at all shows a glaring problem with the way that SaaS companies thought about mobile applications. The way that SaaS companies should have approached mobile applications and data protection from the beginning is to let you set the policies in their app, and then the app will make sure things aren't cached and there's no copy of your data roaming around. You would do it centralized as opposed to using some janky tool that lived as you manage your fleet. Then there are laws passed on whether or not you have to reimburse somebody for their phone. No small start-up wants to reimburse people for their phones or have a clear DoD policy when they start out because there are costs involved. It's a huge pain point, but at least it's not as bad as laptops in my opinion.

Mobile MaturityMobile Maturity

This report helps IT organizations understand the rate of growth in mobile enterprise management.

What are your thoughts on SaaS management platforms (SMP)?

Top Answer:

116 views
0 comments
3 upvotes
Related Tags
People & Leadership
Strategy & Architecture
Cloud
End-User Services & Collaboration
Process Management
Governance, Risk & Compliance
Data & Analytics
Business Intelligence
Security & GRC
Disruptive & Emerging Technologies
Team & Organizational Design
Talent Management & Performance
Culture & Values
Financial Management
Security Strategy & Roadmap
IT Strategy & Roadmap
Outsourcing & Managed Services
Network
Compute
Storage
Backup & Disaster Recovery
Public Cloud
Hybrid Cloud
Contact Center & Telecom
Data Center
Device Management
End-User Devices
Mobile
Productivity Tools
Collaboration Solutions
Document Management
Finance
Business Applications
Legal
Human Resources (HRIS)
Technical Product Management
Software Development
DevOps
Quality Assurance
Continuous Integration/Continuous Deployment (CI/CD)
Enterprise & IT Service Management (ITSM)
Availability & Capacity Management
KPIs, Metrics & Reporting
Vendor Management
Service Desk
Management Tools
Risk Management
Regulatory Compliance
Data Privacy
Artificial Intelligence & Machine Learning (AI/ML)
Data Warehouse
Integrations
Data Lake
Threat & Vulnerability Management
Identity & Access Management (IAM)
Security Operations Center (SOC)
Augmented & Virtual Reality (AR/VR)
Blockchain
IoT
Innovation
Cryptocurrency & Bitcoin
Bots
5G
Peer Insights
Vendor/Product Recommendation
Business Continuity & Disaster Recovery
Crisis Management
Customer Engagement
Customer Relationship Management (CRM)
Enterprise Resource Planning (ERP)
Threat Intelligence & Incident Response
Talent Sourcing & Hiring
Employee Engagement
Mentoring & Coaching
Training & Certification
Business Relationships
Portfolio, Program & Project Management
Data Management
Big Data
Vendor/Product Assessment
Asset & Configuration Management
Infrastructure
Performance
Contact Center Solutions
Applications & Platforms
Engineering
Operations Management
Mobile Development
Testing
Data Protection & Encryption
hi, does anyone have a policy around BYOD mobile devices and blacklist apps? if so, how well do your users respond to it.? Our challenge is that we have a number of apps we'd like to blacklist, and concerned they will revolt

Top Answer: Will they really revolt? Or just complain?   If they are corporate issued devices, you own them and dictate how they can be used.   If it is their devices, they can only access data and/or apps since you allow it.   Ultimately, it comes down to educating them about the risks, and management understanding how they are going to deal with these risks.   In regulated industries (finance, banking, healthcare, government, etc.) they understand that there are limits with BYOD.

29 views
4 comments
2 upvotes
Related Tags
How has GDPR and CCPA changed your use or procurement cybersecurity tools?

Top Answer: Not much directly but in some situations avoiding an agent, a plugin, or something that requires a cookie will mitigate privacy risks.  Many security technologies in how they are architected, deployed, and how the vendor gathers and shares information actually is generating a substantial amount of privacy risk