March 28, 2018 By Dan Cheuvront 3 min read

When it comes to Windows device management, PC administrators have traditionally relied on tools that use agent-based technology to deliver security. Beyond laptops and desktops, IT teams have long had access to mobile device management (MDM), which enables simple and robust administration of smartphones and tablets. Helping IT bridge the gap across all device form factors, Microsoft built application programming interfaces (APIs) into Windows 10 that allow security teams to manage laptops and desktops the same way they’ve managed smartphones and tablets for years.

With Windows 7’s end of life (EOL) set for 2020, Windows 10 is the Microsoft operating system (OS) of the future. Organizations that haven’t completed their migration will soon have to make the move. As you transition your laptops and desktops, you also need to continue supporting legacy platforms. Fortunately for IT, it is possible to achieve this goal, and there are different ways of getting there beyond a traditional Windows MDM.

Windows Device Management Made Easy

IT’s habitual reliance on point solutions is cumbersome, costly and outdated. It’s important to invest in a solution that can manage all devices from a single console.

That’s why the traditional Windows device management solutions that IT admins have used for years are evolving to fit the needs of today’s IT landscape. What was simply MDM is becoming unified endpoint management (UEM), giving security teams an all-encompassing solution for devices, applications and content. In fact, IDC estimated that two-thirds of Windows 10 PCs and tablets will be managed via UEM by 2019.

View the infographic: Managing Microsoft Windows 10

Much like the capabilities for iOS and Android, Microsoft’s APIs make Windows 10 management comparable in its functionality and deployment. The integration between the APIs and UEM solution enables security teams to:

  • Manage devices using MDM APIs and agent-based techniques.
  • Streamline deployment by shipping hardware running Windows 10 to users without imaging.
  • Roll out over-the-air (OTA) updates to security and networking configurations.
  • Consolidate post-deployment management of Windows 10 and legacy systems.
  • Integrate with Microsoft stores for new apps and legacy software, such as Win32 apps.

Although UEM solutions make device, user and content management much easier than before, it is vital to consider how you can secure your Windows environment. The Windows 10 APIs now leverage policy-based security controls much like iOS and Android, giving you more consistency across all platforms.

Bolt Your Doors and Lock Your Windows Devices

According to Forrester, 53 percent of global enterprise infrastructure decision-makers cited security and privacy as key reasons to upgrade to Windows 10. Many Windows-based security and management functions that were only supported by group policy objects (GPOs) now have API support, bridging the management gap that once existed.

UEM solutions allow organizations to leverage Windows 10 APIs to establish the same device and app security policies across laptops and desktops as they have for smartphones and tablets. With this technology, security teams can:

  • Enforce encryption across operating systems and apps.
  • Locate, lock or wipe devices remotely.
  • Configure passcodes and other security policies.
  • Whitelist or blacklist apps.
  • Institute Windows Information Protection (WIP) for data loss prevention.

View the infographic: CMT vs. MDM/EMM — Who Will Win?

Bringing It All Together

IBM MaaS360 with Watson offers a combination of traditional client management and modern API management that can enable you to manage all Windows devices in one place. For example, you can manage a Windows 10 laptop by using the Windows MDM APIs to lock, locate and wipe the device, and a MaaS360 agent for patching and software management.

By adding the management capabilities of traditional MDM to Windows 10 APIs, your IT team can keep track of all its devices more effectively and efficiently. Gone are the days where you have to use multiple tools to achieve the same functionality as a UEM solution.

Register for a 30 day free trial of IBM MaaS360

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today