IT in Manufacturing


Securing and managing devices the modern way

October 2019 IT in Manufacturing

Organisations of all types and sizes are bringing vast numbers of devices into their IT infrastructure and networks. Moreover, these devices are not only smartphones, wearables and tablets because the IIoT is seeing a slew of new devices entering the business arena.

Rezelde Botha, business unit manager for Citrix at Axiz, says the complexity is growing as each new device type that is entering the organisation needs to be managed, and traditional device management software simply is not up to the task.

She says this is becoming even more of a problem, as today’s employees are not office-bound: “Workers are on the move. Some work from remote offices, others at home or while travelling, and this is forcing the workplace to evolve. As IT moves away from desktops in offices to roaming laptops, tablets and smartphones, many businesses are finding the tools they once depended on are no longer adequate.”

Unified management solutions

This is where unified endpoint management (UEM) comes into its own. “UEM is a fairly new technology that aims to deliver a single solution to manage all endpoints within the business infrastructure,” explains Botha. “The benefits are clear. By consolidating management of all endpoints into a single unified platform, the IT department can more easily keep track of the devices within their infrastructure, irrespective of where they are located.”

In the past, businesses had to depend on separate client management tools (CMT) and endpoint management (EMM) solutions to deal with their infrastructure. Now, because CMT and EMM tools work in dramatically different ways, they usually need a whole different set of employees and training to manage each solution.

“Today, UEM unites the capabilities of CMT and EMM in one, total solution, enabling IT to simply secure and manage applications, data, and operating systems across the entire organisation,” adds Botha.

Managing all devices from a single solution makes good sense. Botha explains: “Firstly, it is more cost-effective to allocate budget to one management tool instead of several. Secondly, it boosts operational savings by lowering the number of human resources needed, as well as the training costs associated with those staff. This also means that human resources can be focus on more urgent aspects of the business.

“Moreover, you cannot guarantee user productivity and data protection unless you have consistency across management, security, and usability. Even the tiniest, unintentional differences in management or security policies can leave gaps in the organisation’s infrastructure that enable attackers to slip through the security net and plant malware on the network.”

Implementing a consistent policy makes it far easier to pinpoint, fix and keep an eye on any possible chinks in the security armour. Having consistency in terms of users being able to access the information and applications they need, regardless of where they are located, is also essential for productivity.

Citrix’s UEM solution, Citrix Endpoint Management (CEM), is the modern way for any business to secure and manage its devices. It delivers seamless and secure user access to applications and files on any device, and while giving the IT department the power it needs to manage desktops, laptops, smartphones, tablets across iOS, Android, Windows, Chrome OS, and MacOS platforms.

CEM also offers both on premise as well as cloud deployment models. “Irrespective of which model a customer chooses, Citrix works hard to ensure that its footprint and, alongside it, the total cost of ownership in its customers’ data centres, is kept to a minimum, using the fewest possible number of servers or firewall configuration changes.

This offers several benefits, including a lower cost of SSL certs, as there is no cost for Windows licences,” concludes Botha. “Remember, businesses don’t usually use UEM in isolation. Businesses tend to have one solution for managing virtual applications and desktops, and one for managing the enterprise data. This means an holistic approach, where IT can reduce the time and effort needed to provision applications, desktops and files from a single administration console, is the way forward. This is exactly what CEM offers.”




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...
Driving digital transformation in the truck industry
Siemens South Africa IT in Manufacturing
Tatra Trucks, a leading truck manufacturer in Czechia, has adopted the Siemens Xcelerator portfolio of industry software including Teamcenter software for product lifecycle management and the Mendix low code platform to help increase production volume and strengthen its ability to manufacture vehicles that meet specific customer requirements.

Read more...
Opinion piece: Digital twins in manufacturing – design, optimise and expand
Schneider Electric South Africa IT in Manufacturing
Digital twin technology can help create better products, fast. It can also transform the work of product development. This strong statement from McKinsey reinforces how far digital twins have come in manufacturing.

Read more...
Asset tracking is key to driving operational excellence and sustainable growth
Schneider Electric South Africa IT in Manufacturing
Asset tracking plays a critical role in the success of industrial businesses. By effectively managing and monitoring assets, companies can optimise their operations, ensuring that resources are used efficiently. This leads to improved productivity and reduced costs.

Read more...
Siemens democratises AI-driven PCB design for small and medium electronics teams
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software is making its AI-enhanced electronic systems design technology more accessible to small and mid-sized businesses with PADS Pro Essentials software and Xpedition Standard software.

Read more...
Predicting and preventing cyber-attacks with AI and generative AI
IT in Manufacturing
The speed at which cyber threats are evolving is unprecedented. As a result, companies need to implement state-of-the-art technology to protect their data and systems.

Read more...
Real-world lessons in digital transformation
IT in Manufacturing
Synthesis has helped businesses across multiple industries with their digital transformation by solving their unique integration challenges.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved