Modern management makes sense, and the industry is reacting. Will enterprise organizations jump on the bandwagon? Credit: Thinkstock Yesterday, VMware announced its intention to acquire E8 Security and integrate the technology into its Workspace ONE platform. This makes sense, as Workspace ONE collects, processes, and monitors data about users, applications, networks, and endpoints. Add E8 Security, and you can use this very data to fingerprint devices, build models around normal usage patterns, and identify anomalies in real time.Beyond VMware’s plans, this announcement supports a logical, albeit slowly moving trend: management tool unification into a modern management platform. Here’s the thing: Every large enterprise has management tools for mobile devices, endpoint devices, data protection, security, etc. Each of these management tools has its own agents and management consoles. Each one must be tested, deployed, and operated. Each management tool requires administrator training. Now, in my humble opinion, this model is about as legacy as you can get, rooted in the 1990s when PCs and LANs were new and innovative. Back then, it was all about technology, so this was understandable. What should be included in a modern unified management platformNow that all the baseline technology is mature, however, it shouldn’t be viewed as individual piece parts but as an end-to-end system for user productivity and business enablement. As such, this system should be managed for:High performance and resiliency. The end-to-end system must be available at all times by supporting the ability to work around problems (i.e. security problems, natural disasters, etc.). Furthermore, the system should be self-aware to maximize performance from source to destination. As part of this process, devices should be configured and administered continually to ensure performance and resiliency. User access control. The end-to-end system should enforce policies that provide secure access based upon the user’s role, device type, location, and other risk factors.Data security. Sensitive data should be safeguarded at rest and in flight. Furthermore, a central management system should know where the sensitive data resides, who has access to it, and what they are doing with it.Device security. Modern management should be instrumented to prevent, detect, and respond to cyber attacks of all kinds. This includes hardening systems and configuring them for least privilege use and communications, as well as detecting/blocking exploits and malware.Troubleshooting and remediation. Modern management must also provide intuitive analytics that help administrators find and fix any type of problem quickly.Now, I know what some of you grey hairs (like me) are thinking, “Haven’t we tried this before (i.e. CA Unicenter, HP OpenView, IBM/Tivoli, etc.)?” Yes, we did. But those efforts also happened in the 1990s, and I would argue that technology was the limiting factor. These days, we have public clouds, big data technologies, open source, artificial intelligence, etc. In other words, modern compute, network, and storage technologies should be able to overcome the challenges we faced 20 or more years ago. Clearly, VMware understands the need for management unification. Workspace ONE brings the end-to-end data together, and now E8 security will apply machine learning algorithms to the data for security purposes. Other vendors, such as Citrix, IBM, Microsoft, and Symantec, are also moving toward a unified management model through products, services, and partnerships.So, the supply side is onboard and will do its best to push modern management to customers, but will organizations be willing to transition from tactical management tools to a more holistic and unified management model? My esteemed colleague Mark Bowker is currently researching this very topic. Stay tuned, I’ll blog about Mark’s findings in a future post. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe