November 9, 2017 By Dan Cheuvront 3 min read

It seems all too common today to hear about a sensitive data breach or a rogue employee who is up to no good. There are many security solutions on the market, and containment is the most popular for the enterprise.

Since its release, Windows 10 has been integrating its own secure system, Windows Information Protection (WIP), with these solutions to ensure compatibility.

 

The Case for Containment in Windows 10

The Microsoft Windows operating system (OS) has been an industry standard for decades. Unlike iOS and Android, Microsoft’s decision to develop a relatively seamless OS across multiple device types is an ingenious way to ensure consistency and improve adoption rates. In today’s market, consumers want devices that work for them, whether for business or personal use. That means enterprises need an all-encompassing solution that is easy to use, provides a pleasant overall experience and, most importantly, delivers robust security.

The case for a containment for Windows 10 is compelling, since Microsoft has already implemented WIP. Data containment is a way to house sensitive information on a device in a secure manner. Usually, with a unified endpoint management (UEM) solution, rules are pushed down from an IT administrator to ensure that enterprise data stays safe. With a robust policy and deep integration, you might wonder whether a third-party container is even necessary.

Integrating UEM With WIP

Compared to Windows 7 and Windows 8, the management capabilities for Windows 10 far exceed those of the previous operating systems. The default policy is on par with the capabilities of other mobile device platforms in terms of security, restrictions and compliance. At the moment, there is no third-party container for Windows 10 laptops and desktops that supports email, chat and documents.

The policies that Microsoft released for UEM solutions also include complete integration with WIP through the default policy. In essence, it acts as its own container and maintains a native experience for the user.

Unless the market changes, there is no foreseeable need to develop a containment solution for Windows 10 computers. However, that doesn’t mean it is completely off the table. If there is a demand for it, software development teams will create a container for Windows 10. The idea is to trim the excess and keep it simple so there will be less to worry about.

In bring-your-own-device (BYOD) environments, it’s fair to assume that containment is the best course of action for smartphones and tablets. However, once the default Windows 10 policy is published, it leverages the need for a container. WIP integrates directly into the UEM policy so any information or settings pushed from the UEM solution can be removed from the device remotely via a selective wipe.

See a Need, Fill a Need

With WIP, it is not necessary to develop an entire suite of additional apps and features because everything is already being managed in the policy. As time goes on, software companies such as Microsoft, Apple and Google will add more features for better integration. A container app may be optional or even necessary in future iterations of Windows laptops and desktops. Until then, the possibilities depend on IT trends and demand. But on the bright side, the sky’s the limit.

To learn more, view our on-demand webcast, “The Seven Wonders of Windows 10,” which features a demo of IBM MaaS360 with Watson for Windows 10.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today