Deskcenter News - Expert Articles

The War Room reports: IT cannot ignore Unified Endpoint Management!

The future is approaching fast – and it has a name: Unified Endpoint Management (UEM). This isn’t some secret, but simply the logical chain of technological advances impacting our everyday business. Current identifiers, like mobility and agility are gaining in importance and with that the complexities of our IT infrastructures keep growing.

Welcome the future is now

The top 7 security-critical errors when managing mobile workplaces

Mobile working has long since become the norm in today’s world of business. Flexibility, greater employee satisfaction and increased efficiency are just some of the benefits of using mobile devices for work. Unfortunately, Germany is somewhat lagging behind its European counterparts in terms of mobile workplaces and working from home.

mobile IT management

What makes a good license manager?

In many IT departments, the licensing of software and the documentation involved aren’t part of the normal order of business. Indeed, numerous companies fall at the first hurdle of nominating someone to be responsible for license management. However, a license manager is indispensable if you want to avoid the high costs associated with relicensing or overlicensing as well as the potential legal ramifications. But what exactly are the duties of a license manager and what are the personal qualities that make a great one?

IT manager checklist

ITAM & NETSEC. A marriage made in heaven?
(3 of 3)

Maybe not a marriage but rather a collaboration, two disciplines that are typically seen as siloed activities. Too often NETSEC is seen as the needed with ITAM relegated to “nice to have”. We see things differently. While ITAM tools are never going to replace security tools (nor should they), ITAM should be the enabler for [...]
IT Security at laptops

Discovery & Inventory Done – What Next?
(2 of 3)

You’ve got your discovery and inventory processes sorted, you are confident that you have complete visibility of your entire IT estate, so what next? Well, for some, this is enough and that’s OK, there is huge value to be had from having this up to date and accurate view of all your assets in a [...]
IT running

Discovery & Inventory – Where to start
(1 of 3)

It’s simple, without an accurate and up to date inventory of IT assets, everything else becomes that little bit more difficult, that little bit more incorrect and potentially that little bit more expensive. Having a clear, accurate and regularly updated register of both network connected devices and non-networked assets will give you an advantage in [...]
network management illustration

Inventory base for your IT

It is not uncommon for IT and management to be unaware of applications and devices until they are uncovered by a manufacturer’s audit or some vulnerability emerges. There are various reasons for this. For example, there are devices that are rarely logged into the network and therefore difficult to inventory, decommissioned systems that are still [...]
Inventory pencils

Managing a hybrid IT infrastructure efficiently – Comprehensive UEM relieves IT

IT security ensures licenses are cost-effective and keeps the software up to date – a Unified Endpoint Management (UEM) solution is offered to manage different devices in your IT infrastructure. One condition: It must closely link all disciplines of IT management. The number and variety of mobile devices in an IT infrastructure is higher than [...]
IT Security Laptop

IT Services for all Users and Devices

Lanline | 03 | 2019 For the end user, PC and mobile devices have been going hand in hand for years. However, IT is often still trying to manage client and mobile device management with individual solutions. UEM (Unified Endpoint Management) applications create IT services – provided that it succeeds in achieving continuous process automation. [...]
IT services for all devices

Design your IT infrastructure secure, transparent and compliant with a SAM software

When it comes to IT security, companies think first and foremost of virus scanning and firewalls. These tools already make a significant contribution to safety. However, this is not enough for sustainable prevention. Especially in order to protect against cyberattacks, it is important to know all the devices and applications on the network and to keep all software up-to-date.

IT service management optimisation