Before You Load Up the Sleigh . . .

Before You Load Up the Sleigh . . .

Before You Load Up the Sleigh . . .

Image credit: Pete Markham Licensed under: CC BY 2.0

It’s tough for me to write the last blog post of the year. Maybe even tougher for you to concentrate on it, since most of us are focused on anything but work and IT right now.

But before you settle completely into holiday-think, devote a few cycles of your remaining work-think to some of the trends in endpoint management and network security that will probably be waiting for you when you get back.

6 Questions We Heard from You in 2015

In conversations with customers like you throughout the year, including at our Dell World User Forum, we’ve discussed with you the nuts and bolts of keeping hundreds of endpoints secure. After a few minutes on deploying patches, fixing vulnerabilities and enforcing security policies, you usually let us know what you would like to work on if only you could come up for air. We heard six prominent questions from you about the world of endpoint management outside your day-to-day, operational tasks:

  1. “How can I simultaneously innovate and maintain my infrastructure?” For two decades we’ve been talking about an 80-20 split between maintenance and innovation, yet it’s still an unattainable goal for many IT managers.
  2. “What’s with all the silos?” Not looking at the bigger IT picture and how all the pieces work together results in siloed IT organizations and focus. Nobody wins that way.
  3. “Am I the only IT Manager who doesn’t get to say ‘no’ anymore?” One customer told me it was not an option in her organization to tell users “no” when it comes to adding new devices and applications. Nevertheless, she has to support them. I told her she was not alone, but it was cold comfort.
  4. “How do I reduce threats and risks, yet still provide usability and flexibility?” If that were easy, they wouldn’t need us to do it. No sooner do you get all of those poles in the same tent than the ground underneath shifts with new threats and device types.
  5. “How are other organizations managing the consumerization of IT?” This new, user-centric world requires that we implement best practices and policies for BYOD, yet many organizations still have no formal plans in place.
  6. “What does good application experience look like?” You’re spending more time controlling and managing applications, including shadow implementations of those applications and new cloud deployments.

Stocking Stuffer: “Technology Tunnel Vision” E-book

We always enjoy hearing what our customers are seeing out there. You make us smarter and keep us on our toes.

It’s not quite the same as a holiday bonus, but we have a new e-book for you, Technology Tunnel Vision, Part 1, with more of the perspectives on endpoint management and network security that you’ll need in the new year.

Thanks for following us in 2015. We look forward to hearing more from you in 2016.

David Manks

About David Manks

David Manks is a Solutions Marketing Director for Dell Software focusing on endpoint management and security products.

View all posts by David Manks  | Twitter


  • Sometimes I wish things were six simple steps.  The minute we look at one thing and get it where it needs to go, the  next new issue comes along.

  • Point 3 from above, we get this all the time, some folks refuse to understand risks they are bringing to the entire organization but we are still expected to support the latest gimmick and make sure it does NOT destroy the network in the process.

  • Six important steps...

  • Simple, I like that

  • the most important (in so many cases) is How are other organizations managing the consumerization of IT?

  • The influx of device variety has added a new layer to user education, too. Sometimes we're expected to know everything about every device in our environment and that has quickly become impossible - I find myself educating users about the capabilities of our IT team, gently coaching them back down to more reasonable expectations.

  • Number 4 is one that we are running into a lot here. People want security but still want things easy...argh!

  • Glad I'm not the only one with these thoughts rattling around in my head at night.  Everyone wants everything to be as easy as pressing a button, but able to do 100 different tasks.

  • I am working very hard to balance usability and flexibility with security.  This will be a major focus in 2016.  

  • I enjoyed reading this article

  • Number 3. Users think that whatever they want to do is acceptable without any thought to proper planning or implementation.

  • On point number 3, How are we able to support and maintain every new device that comes out? There is a time when all support engineers go into technology overload trying to figure out all of the vulnerabilities and potential risks when Johnny gets his brand new device and demands that it be connected to the network... smh