News
June 30, 2025
«Device management is not device security». Reading the title of the article published by The Hacker News we agreed that relying on traditional Mobile Device Management (MDM) provides a false sense of protection, leaving some of the most critical attack surfaces exposed. This is not the case with unified endpoint management (UEM). Looking at Gartner Peer Insights data on endpoint management platforms, most of the negative reviews from the last 12 months mention a lack of visibility on unmanaged devices.
The growth of hybrid working and BYOD has multiplied the number of devices connecting to corporate networks. According to a survey cited by Financial Times, 78% of companies that do not allow BYOD still detect access from personal devices. Without a unified approach to endpoint control, it becomes impossible to apply consistent patching, encryption, and authentication policies, leaving the door open to malicious actors and human error.
Taking up and adapting the evidence from The Hacker News, we can summarize the main gaps as follows:
QThese limitations also emerge strongly in the NIST SP 800-124 Rev. 2 study, which recommends centralised management and threat detection policies, as well as continuous checks throughout the device’s life cycle.
Unified Endpoint Management extends governance to all devices (Windows, macOS, Linux, iOS, Android, wearables, IoT) by unifying compliance and incident response policies.
In our article Do you really have control over your corporate endpoints? we explored the importance of connecting cyber strategy and operational management to reduce ownership costs by more than 30%.
Best practices for ensuring a gradual migration
| Phase | Goal | Recommended actions |
| Assessment | Map the real risk | Asset assessment, compliance scoring, patch gap analysis |
| UEM pilot project | Validate process | Involve a heterogeneous group of users (IT, field force, C-level) |
| Policy automation | Reduce manual effort | Standardize baseline configurations and automatic remediation |
| Continuous monitoring | Threat hunting on endpoints | Correlate device telemetry with SIEM/SOAR logs |
| Feedback & Training | Change management | Train users on safe and responsible use of the device |
UEM should not be limited to determining whether a device is compliant; rather, it should analyse the security posture in order to apply dynamic policies. This principle is reinforced by the most recent NIST guidelines, which emphasise the need for contextualised device trust controls.
The idea that MDM is a bed of roses is a thing of the past. Threats are evolving, devices are multiplying and the boundary between work and personal use of devices is becoming increasingly blurred. Adopting a Unified Endpoint Management strategy involves embracing a governance model that combines visibility, automation, and adaptive security. The essential prerequisite for implementing a Zero Trust approach.