“We are seeing that customers are placing an increasing focus on security. The events of recent months in particular have led to security playing an even greater role. In the mobile sector and in the UEM environment, too, more and more companies want to take advantage of the opportunities available in this regard.
For example, context-based access security is becoming increasingly important. This can be implemented using conditional access, which ensures a level of security appropriate to the situation. More and more customers have this requirement and are using conditional access solutions. This allows them to control what is necessary to access a particular service. For example, certificates are requested, or certain applications such as the UEM client or defined network areas are required, which can only be accessed via a specific VPN gateway. This means that users only gain access to the service or content if they are registered and their devices are managed. UEM systems offer the possibility of simplifying the implementation of the necessary conditions for this.
And these offer another major advantage in terms of security: since all operating systems can now be managed equally via many UEM solutions, the simplicity of management that we are familiar with from smartphones is now also extending to desktop devices. This means that compliance and security management is also very easy, and corresponding guidelines and actions can be defined for all devices.
But security is also a focus in other respects: examples such as the log4j security vulnerability in December make it clear that we are not as secure as we often think. This involved a vulnerability found in a framework used in many systems. Although this was a system-based incident, it, along with many other indicators, intensified the general discussion around security and showed that it is particularly important to react quickly. However, this is not always possible, partly because relevant information is lacking. Even if you keep yourself regularly informed, it is difficult to obtain up-to-date information at such a moment. After all, there are many other issues to deal with at the same time. And as luck would have it, it is usually a particularly stressful day when such an incident occurs and you have to react. That is why it is important to have a well-established internal IT department or to work with an external service provider who can respond flexibly and quickly to such problems. Preventive measures also help to reduce the risk.”