Back to glossary

Glossary term

Endpoint Management

The centralized management and security of all endpoint devices connected to an organization's network. It ensures devices are properly configured, updated, and protected against security threats through unified policies.

Endpoint management covers the tools and processes used to configure, monitor, update, and secure every device that connects to an organization's network: laptops, desktops, mobile phones, tablets, and increasingly, IoT devices. The core challenge it addresses: once a device leaves a controlled environment (the office, the IT team's hands), you still need visibility and control over it.

Why Endpoints Are Where Security Problems Start

Most breaches do not begin with a sophisticated attack on a server. They start with a device: one that is running an outdated OS, has an unpatched application, or was compromised through a phishing email on an unmanaged personal machine that someone used to access work systems. Endpoint management is the infrastructure that prevents these scenarios from becoming routine.

What Endpoint Management Actually Does

Configuration Management

Devices are enrolled into a management system that enforces a defined configuration: specific OS version, required applications installed, security settings like screen lock and disk encryption enabled. If a device drifts from the approved configuration, the system flags it.

Patch Management

OS updates and application patches are deployed centrally. Rather than relying on individual users to click "install update" on their own schedule, patches are pushed automatically with options to test on a subset of devices before rolling out broadly.

Inventory and Asset Tracking

Every managed endpoint is visible in the system: what it is, who is using it, what is installed, when it was last seen, and whether it is compliant with security policies. This data is useful for audits, planning, and incident response.

Remote Remediation

When something goes wrong, whether a device is behaving unexpectedly, a user is locked out, or a potential compromise is detected, IT can investigate and remediate without physically touching the device. For distributed teams, this is essential.

Access Control Enforcement

Endpoint management integrates with identity systems to enforce access rules: a device that is out of compliance (unpatched, unencrypted) can be blocked from accessing company resources until the issue is resolved.

The Shift to Remote Work Changed the Stakes

When everyone worked in an office on company-managed hardware, endpoint management was simpler. The network perimeter did a lot of the work. Now, with remote and hybrid work, devices sit outside that perimeter. Many are personally owned. The attack surface is larger, and the visibility is reduced unless the organization has an endpoint management strategy that accounts for it.

Related terms

Browse adjacent topics in the same workflow area.

Share this term

Copy a direct link for your team or documentation.

Explore more glossary terms

Keep exploring the glossary without leaving the section.