This IDC Perspective provides key considerations in device management choices. Device management has evolved significantly since the debut of the iPhone and the Android smartphone. Some early deficits are now long solved, while new challenges have emerged. The biggest change is the slow but steady breakdown of mobile devices as a separate computing silo. This requires thinking about device management more holistically, as part of a technology fabric with multiple layers whose risks and solutions you need to evaluate together.
"If you equate 'device' to endpoint, rather than to smartphone or tablet, you'll reframe the management and security questions in a holistic way that is more likely to be effective in choosing which device management technologies to deploy and to what degree," says Galen Gruman, adjunct analyst with IDC's IT Executive Program (IEP).
App stores, Application management, Endpoint encryption, Enterprise mobility strategies, Identity and access management, Information protection and control, Intrusion detection and prevention, Network security, Omni-experience transformation, Product mobility outsourcing, Security management, Smartphone, Storage services, Technology buyer, Virtual private network products