The main challenges in managing today’s desktop and mobile computing are security, cost and compliance. These challenges relate to the needs of IT to secure confidential data resident on devices such as server and cloud infrastructure. The scenario of a medium size business network in Connecticut today is characterized by three main IT trends:

1) Application and desktop transformation
2) Bring your own device (BYOD)
3) Desktops that are not part of the unified IT management
4) The desire of companies to embrace cloud solution at a faster speed.
5) Response to security threats

 

 

As technology moves to the next level, so does the complexity of a network to which the IT department has to perform the necessary adjustments. Traditional methods of managing desktops based on trial and error behavior are time consuming and not always are able to fix the problem. Furthermore, the constant changing nature of work, brings IT staff and help desk set up desktops that can remote to the office networks from home networks. The proliferation of smartphone devices and tablets causes computer technicians to search for the corresponding app that already runs on a desktop computer.

All the devices used in a corporate network raise questions about their level of security and interaction with the corporate firewalls. Once an employee makes use of an app store on her smartphone, he/she wants that same instant access to applications in her corporate work environment. For this employee, patiently waiting for IT to roll out a new application is a thing of the past.

The big challenge for the IT is not the proliferation of the devices but the response to the security challenges by seeking a new security architecture optimized for the mobile and desktop cloud. Needless to say also that security in these hybrid networks has to pass the test of a role-based policy. No matter if it is an application that resides on a server or on the Internet, all the users should never have the same role. For example, if there is a content writer on a cloud based platform, that writer should just be a single user with no admin permissions. The administrator of that application is the one who assigns roles to the different users of that application. Similarly, if the application runs on a shared folder on the network, the server administrator is the only one who decides who will use that application by excluding a group of users not authorized to see or use that product. A group policy object in Windows Server is able to accomplish this task.

Running secure applications on a business network is a fine tuning task that requires skills and experience, in that application permissions and use most of the times are highly customizable and therefore capable to maintain the security standards of a business network.