The Internet of People: The Future of IT Endpoint Management

Published Sep 18, 2018 1:33:00 PM in In the News

Learn how the Internet of People is changing the landscape of endpoint management.

There is a lot of talk about the Internet of Things (IoT), about the rapidly expanding number of smartwatches, fridges, medical devices, and more collecting and sharing data. Already, the number of connected “things” exceeds the world’s population, representing only 0.06% of all devices that could potentially leverage IoT in the future. And yet, in some ways, our definition of IoT depersonalizes the impact these devices are having, changing expectations, our ideas of privacy and security, and how we work and live.

In a recent article on Connected World, we talked about how consumer expectations have carried over into the workplace, with employees bringing new devices and “things” to connect to the network, introducing new security risks and management challenges. In the article, Securing People in the Age of the IoT, we outline the challenge to correctly provisioning this complex array of devices with the proper security settings, configurations, software, access, and content that employees need to remain productive. The reality is, today’s employees are much more self-reliant - and therein lies the problem.

We need to think more about the Internet of People - and less about the Internet of Things.

Shadow IT represents the unsanctioned download or use of devices, applications or “things” to remain productive. Employees are accustomed to flexibility and choice - to provisioning their own devices, troubleshooting their problems, and downloading their own software to remain productive. We’ve seen a rapid decentralization of IT spending, which has in turn created new security risks. When users circumvent IT, critical gaps open up in visibility and security. A “top-down lockdown” approach often focuses on restrictions, blacklisting devices and apps and creating walls that employees will continue to try to circumvent.

Arming your organization against the Internet of People - the unique threats of internet-enabled “things” with these new employee expectations and behaviors - requires a combination of security training as well as a recognition of the relationship between users and the variety of devices and applications they bring to the workplace.

By focusing on people and their relationships, IT can create a user-centric environment that focuses on automation, smart groupings of users/devices/settings/apps, and self-service to allow employees to self-provision with the proper security configurations. At the same time, it’s important to recognize that many IoT devices today were not built to be managed, underscoring the importance of process and training in reducing risk.

As mentioned in the Connected World article, organizations are being challenged is to build foundational practices in IT endpoint management that can adapt to changing technologies.

“What was new this quarter will be next year’s commonly accepted best practice for securing devices. Building processes now to adapt to the technology and employees of tomorrow is essential to ensure continued success. IoT will continue to grow and the Internet of People will always be with us.”

More From FileWave

Apple WWDC 19 Updates

Published 06-4-2019 in What's New

This year at WWDC 2019, Apple unveiled iOS 13, bringing a whole range of new features to the iPhone. Apple also previewed macOS Catalina and launched a new iPadOS.

FileWave Launches Version 13.1

Published 05-29-2019 in In the News

The endpoint management leader’s newest update features a Google collaboration for the new Android Enterprise API and supports Apple’s spring release

FileWave 13.1 Release

Published 05-29-2019 in Product Releases

FileWave 13.1 brings support for Google’s new Android Management API, functionality support for the latest Apple OS releases, and more.

Subscribe Here!

Upcoming Demos