Feeds

Taking note of notebooks

Get a handle on remote assets

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Few organisations today have exempted themselves from the rapid increase in the use of mobile computing tools, be they laptops, netbooks or handheld devices. There is no doubt that their use can deliver tangible business benefits. Equally, they can help employees better tailor their work-life balance, which is to their benefit and the organisations they work forn

Laptops also present management and support challenges. As mentioned in an earlier article it is by no means unusual for users to regard their laptops as their own, rather than something which the company has provided to achieve business goals.

Even in the world of the desktop PC one of the greatest challenges for IT support staff is dealing with the tendency of users to reconfigure their machines, install their own software, connect up their own peripherals, etc with scant regard to factors such as software licensing and corporate standards. This propensity is exacerbated with laptops and other mobile devices, which may be used in private lives as well as business operations.

And then there is the ever-present question of ‘security’. Clearly any device that spends any time outside of the (presumably locked and secured) office environment will face an additional range of risks. Amongst these is the decidedly non-trivial factor that PCs are highly portable and thus relatively obvious targets for theft, never mind accidental loss. With such clear and present dangers, there is a need for great care to be exercised in the operational management and security of mobile devices.

Indeed, there is a strong case for the use of effective remote asset discovery and operational management tools to help ensure the security, compliance and reliability of mobile devices. As a starting point, an asset management tool can be deployed to gather a wide range of hardware and software inventory information.

Such information gives the IT manager and support staff a picture of what applications and data are being accessed by remote users, and from what devices. In addition it can provide information regarding the state of patching of operating systems and business applications, potentially highlighting devices where the user needs be ‘encouraged’ to update the software stack, a task that is considerably easier for office based systems than remote laptops.

Beyond this, such asset / inventory information can also highlight users loading software onto a corporate laptop for which the company does not hold a central license, potentially exposing both the user and the directors of the company to legal risk. Similarly, it is by no means unknown for untested software installations to adversely affect the operation of standard business applications, although this issue is no longer quite the nightmare that once it was (let us know if you disagree). With asset management tools in place, forewarned can mean forearmed.

Once IT knows what portable machines it has in its inventory, it can start to manage them in a more proactive fashion. With such knowledge it becomes possible to organise resources so that each user is supplied with the facilities and services they need to do the job in hand. Which brings us to supporting the things.

Given that devices such as laptops that are, by definition, inherently mobile it is understandable that remote management / remote control software tools have a major role to play – particularly in the deployment of software and the ongoing maintenance of the machines, not to mention responding to support calls which we shall be covering in a subsequent article.

The issues looking after laptops, especially those that really do move around, increase drastically compared to desktops (which weren't that easy to manage in the first place). Mobile user support is becoming better understood, and some of the more recent new remote control offerings work in tandem with asset management / inventory knowledge banks to help smooth out service problems.

The capability to 'see' a machine, and then reconfigure it to a known state, without being dependent on asking a user over the phone to take steps X, Y and Z can significantly reduce the frustrations experienced by both sides. Such tools can turn what might otherwise have been a 45-minute call into a 10-minute operation, increasing both productivity and satisfaction all-round.

But beware – unless users understand the boundaries of 'acceptable use' as defined by the organisation, problems will arise. The personal factors can only be adequately tackled by creating usage policies to which the business and IT agree and which, more importantly, mobile users understand and agree to follow. We'd be interested in understanding your own experiences here – is the idea of a well-managed pool of remote IT just a pipe dream, and does it ultimately depend on the right policies in general, or any good behaviours in particular? Do let us know.

The essential guide to IT transformation

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.