The Internet of People: The Future of IT Endpoint Management

Published Sep 18, 2018 1:33:00 PM in In the News

Learn how the Internet of People is changing the landscape of endpoint management.


There is a lot of talk about the Internet of Things (IoT), about the rapidly expanding number of smartwatches, fridges, medical devices, and more collecting and sharing data. Already, the number of connected “things” exceeds the world’s population, representing only 0.06% of all devices that could potentially leverage IoT in the future. And yet, in some ways, our definition of IoT depersonalizes the impact these devices are having, changing expectations, our ideas of privacy and security, and how we work and live.

In a recent article on Connected World, we talked about how consumer expectations have carried over into the workplace, with employees bringing new devices and “things” to connect to the network, introducing new security risks and management challenges. In the article, Securing People in the Age of the IoT, we outline the challenge to correctly provisioning this complex array of devices with the proper security settings, configurations, software, access, and content that employees need to remain productive. The reality is, today’s employees are much more self-reliant - and therein lies the problem.

We need to think more about the Internet of People - and less about the Internet of Things.

Shadow IT represents the unsanctioned download or use of devices, applications or “things” to remain productive. Employees are accustomed to flexibility and choice - to provisioning their own devices, troubleshooting their problems, and downloading their own software to remain productive. We’ve seen a rapid decentralization of IT spending, which has in turn created new security risks. When users circumvent IT, critical gaps open up in visibility and security. A “top-down lockdown” approach often focuses on restrictions, blacklisting devices and apps and creating walls that employees will continue to try to circumvent.

Arming your organization against the Internet of People - the unique threats of internet-enabled “things” with these new employee expectations and behaviors - requires a combination of security training as well as a recognition of the relationship between users and the variety of devices and applications they bring to the workplace.

By focusing on people and their relationships, IT can create a user-centric environment that focuses on automation, smart groupings of users/devices/settings/apps, and self-service to allow employees to self-provision with the proper security configurations. At the same time, it’s important to recognize that many IoT devices today were not built to be managed, underscoring the importance of process and training in reducing risk.

As mentioned in the Connected World article, organizations are being challenged is to build foundational practices in IT endpoint management that can adapt to changing technologies.

“What was new this quarter will be next year’s commonly accepted best practice for securing devices. Building processes now to adapt to the technology and employees of tomorrow is essential to ensure continued success. IoT will continue to grow and the Internet of People will always be with us.”

More From FileWave

Device Lifecycle Management: Remote Remediation

Published 08-7-2019 in Tech News

Managing device support is a critical element in lifecycle management, from patch management to automated controls and remediation capabilities. Here’s how FileWave helps you remotely remediate devices that need attention.

Chromebook Management Best Practices for K-12

Published 07-31-2019 in Tech News

The cloud-based nature of Chromebooks creates unique challenges for IT admins to manage. Here are the best practices needed to empower more effective Chromebook deployments.

Device Lifecycle Management: Asset Monitoring

Published 07-17-2019 in Tech News

Asset monitoring is a critical aspect of lifecycle management and maintaining your security. Here’s how FileWave helps you gather an accurate picture of all your devices, users, and applications.

Subscribe Here!

Upcoming Demos