PatrikThis is the final post of my series on IT as a Service. In the previous posts (part 1 and part 2), I explained how to manage services from a ‘data center out’ perspective. In this post, I will shift focus to a ‘user in’ approach centering on the person consuming IT services.

Once a service is launched, it becomes very difficult to control and secure. Why? It’s simple – users are no longer tied to a single computer behind a desk while desktops and applications are offered both physically and virtually (yes I know that virtual desktops have been around for ages through terminal services). Users are roaming. They work from home, at Starbucks, in the airport and other places of which IT cannot be aware, or control. After all, “work is not someplace people go; work is something people do.”

Controlling the usage of services is virtually impossible with traditional management solutions and securing the data center. What you need is a holistic desktop management approach that uses the context of the user (role, location, device, etc.) to determine when the services should be available and how to configure them. At RES Software, we call it Workspace Management, but some also refer to it as User Environment Management, Workspace Virtualization, profile management (small feature subset) or even ‘managing the last mile’.

Looking at the above infographic, you can see that the life curve of a service peaks when the service is operational and actively consumed. With Workspace Management, you can control every aspect of usage to ensure ease of use through profile management and just-in-time configuration. Ensure security by leveraging the context awareness to dynamically turn on and off access to services.

Workspace Management is key to any organization where users or desktops are non-static and you care about user experience. RES Workspace ManagerThe easiest way to reduce the complexity of managing access, security and usability of services in hybrid desktop environments. 

aracer.mobi