March 15, 2018 By John Harrington Jr. 2 min read

IT and security leaders have taken notice of Chrome operating system (OS) devices’ ability to provide employees quick, easy and intuitive access to work resources. They may differ from their PC ancestors’ reliance on storage and installed software, but professionals are finding some advantages. Depending solely on internet, web and cloud apps, there’s less that can go wrong and more that can go right.

As a prerequisite to Chrome OS enterprise adoption, IT professionals must first be confident in their security and manageability. For example, cloud app access must be secure. There can be no risk of data leakage, nor can those apps pose unknown risks.

Google has announced an extension of its management APIs to third-party mobile device management (MDM) and enterprise mobility management (EMM) software providers. Now, the IT professionals who rely on these tools can deploy Chrome OS among the mix of their supported operating systems.

Partners who use these APIs give their administrators Chrome OS policy management capabilities across their devices and users.

IT has traditionally relied on MDM and EMM tools to ensure devices and their contents remained visible, managed and protected. Now entering the mix among these form factors are the work computers, video conferencing machines, digital signage tools and single-use devices powered by Chrome OS.

While Google continues to bolster these APIs and management capabilities, IBM MaaS360 with Watson unified endpoint management (UEM) will work to pass the advantages of this new functionality onto customers, enabling them to manage Chrome OS alongside other endpoints in the enterprise.

More from

Exploring the 2024 Worldwide Managed Detection and Response Vendor Assessment

3 min read - Research firm IDC recently released its 2024 Worldwide Managed Detection and Response Vendor Assessment, which both highlights leaders in the market and examines the evolution of MDR as a critical component of IT security infrastructure. Here are the key takeaways. The current state of MDR According to the assessment, “the MDR market has evolved extensively over the past couple of years. This should be seen as a positive movement as MDR providers have had to evolve to meet the growing…

Regulatory harmonization in OT-critical infrastructure faces hurdles

3 min read - In an effort to enhance cyber resilience across critical infrastructure, the Office of the National Cyber Director (ONCD) has recently released a summary of feedback from its 2023 Cybersecurity Regulatory Harmonization Request for Information (RFI). The responses reveal major concerns from critical infrastructure industries related to operational technology (OT), such as energy, transport and manufacturing. Their worries include the current fragmented regulatory landscape and difficulty adapting to new cyber regulations. The frustration appears to be unanimous. Meanwhile, the magnitude of…

Generative AI security requires a solid framework

4 min read - How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny.The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM Institute for Business Value, 96% of executives say adopting generative AI makes a security breach likely in their organization within the next three years.CISA Director Jen…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today