Is the standardization of the terminal administration still an option?


Many companies continue to manage traditional desktops and mobile devices separately. This approach has historical reasons, beginning with the spread of Windows in the professional world. However, the evolution of uses and the multiplication of endpoints, regardless of whether they are different user terminals or connected objects, make the dissociated approach less and less practical.

The heterogeneity of the systems and the multitude of tools lead to a real administrative overload. But you can also influence the experience of the users themselves – and thus ultimately their productivity. And if they don’t harm them, they can deprive the organization of the productivity gains that come from more rationally and efficiently managing employees’ digital work environments.

Therefore, consolidating the management of the tools (UEM or Unified Terminal Management in French) made available to end users seems to be a win-win affair. In any case, it keeps many promises and even opens up new perspectives in terms of security, be it for access control or the prevention of data leaks.

Unfortunately, that doesn’t mean the jump is necessarily quick and easy. The effort of such an investment can not only pay off in the long term.

1Plan- Prepare for the big leap to EMU UEM: choose the right platform

UEM tools are essential to monitor the numerous terminals that exist in businesses today. This comprehensive overview is designed to help you learn more about the major products on the market. Continue reading

Five options for managing macOS in an enterprise

Windows workstations continue to dominate business parks. But Apple’s Macs have become increasingly popular in these environments in recent years. Hence the need to manage them grows. Continue reading

2Market- A mature offering that continues to grow 3Results- Very concrete contributions How to manage and secure the PCs of thousands of teleworkers

In an emergency, companies had to organize teleworking for thousands of their employees, sometimes buying laptops or asking employees to use their personal terminals. An emergency measure in which these unknown stations have to be supported and secured as much as possible. Continue reading

How Citrix App Protection works

This feature, designed to ensure access to virtualized applications and workstations from an uncontrolled – and potentially vulnerable – terminal is of great interest in a teleworking context. Continue reading

EMM: Evaluating Alternatives to Intune

One of the main distinguishing features of Intune from the rest of the enterprise mobility management market is its origins as a PC management platform. However, Intune still deserves a comparison with other EMM and UEM platforms. Continue reading