When it comes to Windows device management, PC administrators have traditionally relied on tools that use agent-based technology to deliver security. Beyond laptops and desktops, IT teams have long had access to mobile device management (MDM), which enables simple and robust administration of smartphones and tablets. Helping IT bridge the gap across all device form factors, Microsoft built application programming interfaces (APIs) into Windows 10 that allow security teams to manage laptops and desktops the same way they’ve managed smartphones and tablets for years.

With Windows 7’s end of life (EOL) set for 2020, Windows 10 is the Microsoft operating system (OS) of the future. Organizations that haven’t completed their migration will soon have to make the move. As you transition your laptops and desktops, you also need to continue supporting legacy platforms. Fortunately for IT, it is possible to achieve this goal, and there are different ways of getting there beyond a traditional Windows MDM.

Windows Device Management Made Easy

IT’s habitual reliance on point solutions is cumbersome, costly and outdated. It’s important to invest in a solution that can manage all devices from a single console.

That’s why the traditional Windows device management solutions that IT admins have used for years are evolving to fit the needs of today’s IT landscape. What was simply MDM is becoming unified endpoint management (UEM), giving security teams an all-encompassing solution for devices, applications and content. In fact, IDC estimated that two-thirds of Windows 10 PCs and tablets will be managed via UEM by 2019.

View the infographic: Managing Microsoft Windows 10

Much like the capabilities for iOS and Android, Microsoft’s APIs make Windows 10 management comparable in its functionality and deployment. The integration between the APIs and UEM solution enables security teams to:

  • Manage devices using MDM APIs and agent-based techniques.
  • Streamline deployment by shipping hardware running Windows 10 to users without imaging.
  • Roll out over-the-air (OTA) updates to security and networking configurations.
  • Consolidate post-deployment management of Windows 10 and legacy systems.
  • Integrate with Microsoft stores for new apps and legacy software, such as Win32 apps.

Although UEM solutions make device, user and content management much easier than before, it is vital to consider how you can secure your Windows environment. The Windows 10 APIs now leverage policy-based security controls much like iOS and Android, giving you more consistency across all platforms.

Bolt Your Doors and Lock Your Windows Devices

According to Forrester, 53 percent of global enterprise infrastructure decision-makers cited security and privacy as key reasons to upgrade to Windows 10. Many Windows-based security and management functions that were only supported by group policy objects (GPOs) now have API support, bridging the management gap that once existed.

UEM solutions allow organizations to leverage Windows 10 APIs to establish the same device and app security policies across laptops and desktops as they have for smartphones and tablets. With this technology, security teams can:

  • Enforce encryption across operating systems and apps.
  • Locate, lock or wipe devices remotely.
  • Configure passcodes and other security policies.
  • Whitelist or blacklist apps.
  • Institute Windows Information Protection (WIP) for data loss prevention.

View the infographic: CMT vs. MDM/EMM — Who Will Win?

Bringing It All Together

IBM MaaS360 with Watson offers a combination of traditional client management and modern API management that can enable you to manage all Windows devices in one place. For example, you can manage a Windows 10 laptop by using the Windows MDM APIs to lock, locate and wipe the device, and a MaaS360 agent for patching and software management.

By adding the management capabilities of traditional MDM to Windows 10 APIs, your IT team can keep track of all its devices more effectively and efficiently. Gone are the days where you have to use multiple tools to achieve the same functionality as a UEM solution.

Register for a 30 day free trial of IBM MaaS360

More from Endpoint

Deploying Security Automation to Your Endpoints

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more pressing issue. This enormous influx of data will invariably affect security teams. Faced with an enormous amount of data to sift through, analysts are feeling the crunch. Subsequently, alert fatigue is already a problem for analysts overwhelmed with security tasks. With the continued shortage of qualified staff, organizations are looking for automation to…

Threat Management and Unified Endpoint Management

The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years of disruption. Air travel is a mess. And all businesses have seen a spike in cyberattacks. Cyber threats increased by 81% while COVID-19 was at its peak, with 79% of all organizations experiencing a loss of business operations during that time. The risk of cyberattacks increased so much that the…

3 Ways EDR Can Stop Ransomware Attacks

Ransomware attacks are on the rise. While these activities are low-risk and high-reward for criminal groups, their consequences can devastate their target organizations. According to the 2022 Cost of a Data Breach report, the average cost of a ransomware attack is $4.54 million, without including the cost of the ransom itself. Ransomware breaches also took 49 days longer than the data breach average to identify and contain. Worse, criminals will often target the victim again, even after the ransom is…

How EDR Security Supports Defenders in a Data Breach

The cost of a data breach has reached an all-time high. It averaged $4.35 million in 2022, according to the newly published IBM Cost of a Data Breach Report. What’s more, 83% of organizations have faced more than one data breach, with just 17% saying this was their first data breach. What can organizations do about this? One solution is endpoint detection and response (EDR) software. Take a look at how an effective EDR solution can help your security teams. …