Endpoints & The Support Model

User Devices and How to Properly Manage

A critical component of an organizations infrastructure are the devices that users perform business tasks on. As a set, these devices are often referred to as endpoints. This rapidly evolving set of platforms includes tablets, smart phones, workstations and laptops. Persistent management of the end point devices is essential for a secure and reliable network and for protecting essential business data. Sound endpoint management includes patch management, product selection, image management, application deployment, inventory management as well as appropriate end point security.

In addition to the right mix of technology, what makes an effective managed approach should be support by a help desk staff that have intimate knowledge of your desktops, devices and the portfolio of applications that run on each device. The knowledge should extend into understanding your business, the existing IT services apparatus and how users generally interact with them to better extend a full scope of support.

Our help desk strives to become an extended part of your company. We do this by gaining insight into your business and integrating the support processes that best support it. Our helpdesk engages with our customers during the engineering phases of our project in order to begin building the needed understanding. Then along the way, we work closely with our clients to improve our understanding so we can build an effective, efficient and insightful support model for your business.

Mobility Management and Extending Your Presence

As we are becoming a very mobile society, mobile device management has become a critical and often missing component of IT strategy. In many organization IT support was late to the game when it came to mobile devices. Users and managers within the organization started using mobile devices at home and then found compelling ways of using these tools in their work place. This has led many organizations to have a variety of unmanaged and sometimes unplanned devices. This creates support and security issues, as the organizations data ends up residing on multiple device types running a variety of applications. If a phone or tablet was lost or stolen, it can force a company to ask several questions around the device:

A rising security concern that is often overlooked is unmanaged end point devices that are allowed on the organizations WiFi or VPN networks. They pose a serious threat as mobile devices can be used as an unwatched bridge into the network.

We help our clients develop a well thought out mobile device strategy that considers mobile security, the process of selecting the best type of devices for each use case in the organization, if and how to allow BYOD (Bring your own device) and provide an application to manage their devices. Our mobile device management software controls all of our customer’s mobile devices from a webhosted application. Android, Windows, IOS and Chrome book devices can all be managed from the same web based application and allows for a flexible framework for implementing mobile device policy, deploying applications, tracking and when necessary, wiping devices.

  • What data was exposed?
  • Did the device have a passcode?
  • How can we remotely track and wipe the device?