WE'VE GOT YOU COVERED!

Why Advanced Search in mobile security is a must-have

by Matias Wolff 30, Jan, 2017

X-wings, B-wings, Y-wings, managing all these different kind of battle starships was not a piece of cake for the rebel alliance when they attacked the Death Star (twice!). In the same way, managing different sort of devices in a company is a challenging job because every unit has its own specifications and requirements.

xwing fleet.jpg

Now, imagine that your department has to manage 30, 50, 100 or even 500 devices. Don’t worry, you don’t have to hire an army of workers to monitor and control the usage of every single device. Current technology offers software that provide Hardware Asset Management (HAM), this is, online platforms that shows you who’s using every laptop, to which department that person belongs, what kind of software do that employee uses (in case that your company have to buy some licenses), or how old the device is.

As Techopedia says, “this begins with acquisition and continues through maintenance until the hardware's ultimate disposal. This is often handled by a HAM that must be familiar with the different hardware used by the organization and must interface with other management disciplines.”

The lifecycle of the very device is also an important factor that companies use to maintain hardware always in good shape. According to The ITAM Review, the main stages of a hardware assets lifecycle are:

  • Hardware Request
  • Procurement
  • Installation of company image/software
  • Deployment
  • Use (Any problems? Needs upgrading? Accidental damage)
  • Storage/Not in use
  • End of warranty or maintenance
  • Retirement
  • Disposal

That’s ok, as a first step. But nowadays companies need way more than that. As every industry and firm is different and have their own needs, IT management requires customizable tools to monitor and assess specific requirements in order to provide the right solution for every single need in each department.

For example, Prey for business offers better device management with Advanced Search, an option that helps you label devices according to several categories that are critical for your management. As basic features, you can filter by name, device ID, label name, user email, status or device type. But you can also create any category you need. So for example, if you work at an educational institution (high school, college or university) you can create categories like campus, faculty, department, or type of user such as academic, researcher, employee etc.

Now, if you are in a national retail company, you can filter by city, region or state, marketing, sales, logistics or any other group of your interest. At the end of the day, possibilities are endless.

The main benefits that this customized optimization brings are related to cost savings. The ITAM Review explains that these solutions help companies to reduce “the amount of money spent on hardware during its lifecycle at the organization (...) This also helps organizations to budget for the next years IT budgets in both software and hardware assets, thus giving a justification for HAM and also giving transparency to the IT stakeholders.”

Are there any other uses your IT team would like to explore with this tool? Share your ideas.

Keep your mobile devices and data safe

 

Matias Wolff
Matias Wolff

CMO at Prey. BA in Advertising with a major in Marketing from Universidad del Pacífico. Master in International Marketing at ESMA, Barcelona. 18 years’ experience in multinational companies. I am a volunteer at the Endeavor program, and teach Integrated Marketing Communications at the Masters in Innovation program, Universidad Católica de Chile.
Let's connect:   

check out our

Related Blog Posts

Asset management & advanced search: wizard's guide to label location

by Matias Wolff February 17, 2017

You’ve realized that an advanced search capacity is a must have tool to track your devices in multiple locations...

Read More

Control Zones, our geofencing feature, now available for laptops

by Matias Wolff December 20, 2016

Releasing Control Zones some time ago was a big deal for us and our users. Finally, a geofencing feature for Prey was seeing..

Read More

Improve Device Protection on Campus with Geofencing

by Matias Wolff December 19, 2016

Laptop thefts on campus are one big headache for IT guys. But what if your university has multiple campuses in town? A..

Read More

School computer theft: Jedi tricks for data recovery & device tracking

by Matias Wolff December 7, 2016

Device management in schools is no longer just about PC tracking after a computer theft. Schools who are looking for the..

Read More

Better device management with new features: advanced search and labels

by Matias Wolff November 2, 2016

So you need to keep tabs on 30, 100, 10000 different phones, laptops, and tablets? No problem. Our new advanced search and..

Read More