How Microsoft Intune helped Devicie reinvent end-user device security

Author: Martin McGregor, Co-founder and CEO, Devicie

There’s a big misconception we come up against when it comes to how people view Devicie and Microsoft Intune. People think we’re competing with Intune when, in reality, we have a synergistic relationship; Intune is the foundation on which Devicie is built. Intune allows us to deliver a mix of security and productivity in a way that’s never been possible before.

Intune has powerful cloud-based Mobile Device Management (MDM) and Mobile Application Management (MAM) capabilities. However, Intune is not an out-of-the-box solution. Much like ERP, it is an enabling technology where the value is gained after extensive customisation. This is a recognised challenge for many organisations, affecting small, medium and large enterprises. Intune has historically required highly qualified IT people to make it work successfully for a business. That’s where Devicie steps in.

Agent versus agentless

The problem with using an agent for remote onboarding, management and monitoring is you first need to get the agent onto the device. Installing an agent on every device on a corporate network is an expensive and difficult-to-manage process that lacks both the flexibility and scalability required by modern organisations.

Tracking which devices have agents and which don’t creates security holes. Thankfully, agentless end-user management solutions are more secure and easier to manage. Agentless is a modern endpoint solution that champions a better end-user experience that’s both flexible and scalable.

Cloud-based solutions are the way forward for virtualisation and bring-your-own-device (BYOD) policies, which is where agentless fits in. That said, cloud services have to be implemented correctly to avoid becoming a statistic like the 30 per cent of organisations in IBM Security’s Cyber Resilient Organization Report 2020 that reported inhibited cyber resilience because of poorly configured cloud services.

With Devicie, endpoint devices can become a secure barrier for organisations, rather than the most vulnerable.

Waiting for Intune

We had our eye on Microsoft Intune from its infancy. Once it was updated to allow for deployable applications, we knew we’d found the agentless foundation for Devicie. Being able to fully manage an end-user device online without having to perform an in-person deployment was a game changer.

Think of Intune as the engine and Devicie as the chassis, wheels, seats as well as the other protective, comfortable and time-saving parts of a car.

Intune is the powerful engine on which Devicie is built to deliver an organisation’s security, data and productivity tools.

Intune is the right foundational platform because it lets Devicie have native, remote and agentless management of employee devices, regardless of where that device is in the world. Devicie uses Intune to automate security access, manage corporate apps and protect data across end-user devices.

Security combo

Microsoft secures Intune to be highly compliant and Devicie secures the end-user side of the equation. Still, the security of end-user devices is really about the security of an organisation’s most vulnerable area, which requires security patches to be applied if they’re going to be effective.

Externally, the concept of applying a security update may seem simple, but at an organisational level, assessing and deploying security updates across a fleet of devices is logistically challenging. The challenge increases without up-to-date monitoring tools that show which devices are patched and which ones aren’t.

Devicie has dashboard monitoring tools that make finding and rectifying potential problems a lot faster. Spotting vulnerabilities that may have been patched months or even years ago is a lot easier, while keeping a fleet of devices up to date is a virtual and painless process. For peace of mind, Devicie applies patches in a 30-day period in line with the PCI DSS security standards.

The Devicie difference

Once you have Intune, the only other requirements are power and an internet connection to tap into an enterprise-level end-user device security management solution.

From system setup, Devicie has full management of the device via Intune without the need to install any agents. This gives your organisation 100 per cent visibility of devices and management of them, which effectively eliminates any black spots.

Devicie is compatible with Windows, macOS, iOS and Android devices via Intune, creating a single management console and reporting view for all devices across an organisation regardless of the operating system.

Intune offers greater control and better visibility over compliance concerns and security issues, simultaneously making it both easier and faster for Devicie to mitigate threats whenever they come up. The IT effort is radically removed and there are no blind spots on unmanaged machines.

Users are no longer required to configure or manage their own devices, with Devicie automatically doing this the same way every time, including up-to-date security, applications and organisational policies. Ultimately, while Devicie and Intune work in tandem, Devicie automates and plugs holes in what Intune can’t do.

To learn more about our relationship with Microsoft Intune, be sure to download our Insight Paper. Otherwise, you’re welcome to reach out directly to me.

Related resources

Why securing end-user devices is a key part of the Zero Trust journey

Moving to the future state for device security can quickly uplift organisations towards Zero Trust while also facilitating a positive end-user experience. 

Read more
devicie essential eight capabilities statement

Devicie Essential Eight: Capabilities statement

This document outlines how Devicie helps organisations to quickly implement key ASD Essential Eight controls on end-user devices.

Read more
How Devicie automates Essential Eight on end-user devices

How Devicie automates Essential Eight controls on end-user devices

Devicie automates Essential Eight controls on end-user devices, so organisations can ensure security and productivity.

Read more