The Internet of People: The Future of IT Endpoint Management

Published Sep 18, 2018 1:33:00 PM in In the News

Learn how the Internet of People is changing the landscape of endpoint management.


There is a lot of talk about the Internet of Things (IoT), about the rapidly expanding number of smartwatches, fridges, medical devices, and more collecting and sharing data. Already, the number of connected “things” exceeds the world’s population, representing only 0.06% of all devices that could potentially leverage IoT in the future. And yet, in some ways, our definition of IoT depersonalizes the impact these devices are having, changing expectations, our ideas of privacy and security, and how we work and live.

In a recent article on Connected World, we talked about how consumer expectations have carried over into the workplace, with employees bringing new devices and “things” to connect to the network, introducing new security risks and management challenges. In the article, Securing People in the Age of the IoT, we outline the challenge to correctly provisioning this complex array of devices with the proper security settings, configurations, software, access, and content that employees need to remain productive. The reality is, today’s employees are much more self-reliant - and therein lies the problem.

We need to think more about the Internet of People - and less about the Internet of Things.

Shadow IT represents the unsanctioned download or use of devices, applications or “things” to remain productive. Employees are accustomed to flexibility and choice - to provisioning their own devices, troubleshooting their problems, and downloading their own software to remain productive. We’ve seen a rapid decentralization of IT spending, which has in turn created new security risks. When users circumvent IT, critical gaps open up in visibility and security. A “top-down lockdown” approach often focuses on restrictions, blacklisting devices and apps and creating walls that employees will continue to try to circumvent.

Arming your organization against the Internet of People - the unique threats of internet-enabled “things” with these new employee expectations and behaviors - requires a combination of security training as well as a recognition of the relationship between users and the variety of devices and applications they bring to the workplace.

By focusing on people and their relationships, IT can create a user-centric environment that focuses on automation, smart groupings of users/devices/settings/apps, and self-service to allow employees to self-provision with the proper security configurations. At the same time, it’s important to recognize that many IoT devices today were not built to be managed, underscoring the importance of process and training in reducing risk.

As mentioned in the Connected World article, organizations are being challenged is to build foundational practices in IT endpoint management that can adapt to changing technologies.

“What was new this quarter will be next year’s commonly accepted best practice for securing devices. Building processes now to adapt to the technology and employees of tomorrow is essential to ensure continued success. IoT will continue to grow and the Internet of People will always be with us.”

More From FileWave

How FileWave’s Professional Services Improve Your Tech ROI

Published 01-14-2020 in Tech News

Armed with industry best practices and knowledge of your specific needs, FileWave Professional Services provides ROI for projects large and small.

Strategies for Managing a K-12 Blended Device Environment

Published 01-7-2020 in Tech News

See how IT admins can manage K-12 device environments and support learning outcomes across a mix of student, teacher, admin, and staff devices.

Endpoint Management Resolutions to Make in 2020

Published 12-31-2019 in Tech News

Want to feel more ‘on top’ of IT in 2020? Here are key endpoint management resolutions to get your management practices started off right in the New Year.

Subscribe Here!