Feeds

Taking note of notebooks

Get a handle on remote assets

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Few organisations today have exempted themselves from the rapid increase in the use of mobile computing tools, be they laptops, netbooks or handheld devices. There is no doubt that their use can deliver tangible business benefits. Equally, they can help employees better tailor their work-life balance, which is to their benefit and the organisations they work forn

Laptops also present management and support challenges. As mentioned in an earlier article it is by no means unusual for users to regard their laptops as their own, rather than something which the company has provided to achieve business goals.

Even in the world of the desktop PC one of the greatest challenges for IT support staff is dealing with the tendency of users to reconfigure their machines, install their own software, connect up their own peripherals, etc with scant regard to factors such as software licensing and corporate standards. This propensity is exacerbated with laptops and other mobile devices, which may be used in private lives as well as business operations.

And then there is the ever-present question of ‘security’. Clearly any device that spends any time outside of the (presumably locked and secured) office environment will face an additional range of risks. Amongst these is the decidedly non-trivial factor that PCs are highly portable and thus relatively obvious targets for theft, never mind accidental loss. With such clear and present dangers, there is a need for great care to be exercised in the operational management and security of mobile devices.

Indeed, there is a strong case for the use of effective remote asset discovery and operational management tools to help ensure the security, compliance and reliability of mobile devices. As a starting point, an asset management tool can be deployed to gather a wide range of hardware and software inventory information.

Such information gives the IT manager and support staff a picture of what applications and data are being accessed by remote users, and from what devices. In addition it can provide information regarding the state of patching of operating systems and business applications, potentially highlighting devices where the user needs be ‘encouraged’ to update the software stack, a task that is considerably easier for office based systems than remote laptops.

Beyond this, such asset / inventory information can also highlight users loading software onto a corporate laptop for which the company does not hold a central license, potentially exposing both the user and the directors of the company to legal risk. Similarly, it is by no means unknown for untested software installations to adversely affect the operation of standard business applications, although this issue is no longer quite the nightmare that once it was (let us know if you disagree). With asset management tools in place, forewarned can mean forearmed.

Once IT knows what portable machines it has in its inventory, it can start to manage them in a more proactive fashion. With such knowledge it becomes possible to organise resources so that each user is supplied with the facilities and services they need to do the job in hand. Which brings us to supporting the things.

Given that devices such as laptops that are, by definition, inherently mobile it is understandable that remote management / remote control software tools have a major role to play – particularly in the deployment of software and the ongoing maintenance of the machines, not to mention responding to support calls which we shall be covering in a subsequent article.

The issues looking after laptops, especially those that really do move around, increase drastically compared to desktops (which weren't that easy to manage in the first place). Mobile user support is becoming better understood, and some of the more recent new remote control offerings work in tandem with asset management / inventory knowledge banks to help smooth out service problems.

The capability to 'see' a machine, and then reconfigure it to a known state, without being dependent on asking a user over the phone to take steps X, Y and Z can significantly reduce the frustrations experienced by both sides. Such tools can turn what might otherwise have been a 45-minute call into a 10-minute operation, increasing both productivity and satisfaction all-round.

But beware – unless users understand the boundaries of 'acceptable use' as defined by the organisation, problems will arise. The personal factors can only be adequately tackled by creating usage policies to which the business and IT agree and which, more importantly, mobile users understand and agree to follow. We'd be interested in understanding your own experiences here – is the idea of a well-managed pool of remote IT just a pipe dream, and does it ultimately depend on the right policies in general, or any good behaviours in particular? Do let us know.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.