Want to regain control of your remote workers? You’re not alone.
Historically, remote workers have created headaches for IT admins. From the lack of ability to support them to the security risks involved, the remote worker problem has been a dirty little secret in IT.
Solutions have abounded with VPNs, expensive remote management tools, and vast amounts of manual intervention. Unfortunately, those haven’t really solved the problem. But there’s good news: A massive shift in the IT landscape and new cloud identity management platforms have IT organizations regaining control over their remote workers.
Remote Worker Management: The Old Way
Traditionally, remote workers — often sales personnel and even employees in remote offices — were connected back to the organization’s headquarters via a VPN. Users would have their machine sent out to them with all of the software configured. The machine, undoubtedly a Microsoft Windows device, would often require multiple logins for the user to even start connecting to the network and the applications they needed. If something went wrong, the user either had to be reasonably technical to understand how to fix the issue, or they would likely have to send the machine back to be repaired. In addition to this being a productivity sink for the end users, IT admins would often spend a great deal of their time supporting their remote workers.
The Evolution of the Remote Employee
As the IT landscape started to shift, so did the path of IT support for the remote worker. Cloud applications started to emerge. And for many remote workers, those web applications were the key to their workday. Google Apps gave them access to email and productivity applications. Salesforce was the tool of choice for salespeople, and because it was delivered over the web, there was no need to connect back to the mothership.
Over time, many remote workers no longer needed to connect to the network at headquarters. Even still, IT admins continued to make that happen because they wanted the ability to control that user’s device via Microsoft Active Directory (AD). If the user was managed by AD, (Read more…)