You can be on Entrepreneur’s cover!

Who Watches the Watchmen? Agentless IT technology does its job without sticking around longer than it's needed.

By Ashley Leonard

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.

Shutterstock

You might recognize this article's title as an important question posed in Alan Moore's classic graphic novel, "Watchmen." If you're unfamiliar with the novel, this line examines what happens when heroes (the Watchmen) are left unchecked. What happens when one of them goes rogue and can't stopped? It's fundamentally a call for a checks and balances approach -- one that applies to various aspects of life and business.

For a tech-focused example of the need for "watchers," consider a typical IT department's system management tool. These tools are used by IT departments of all sizes, from small start-ups to larger early-stage firms with explosive growth. These tools are similar to a hero protecting citizens, but in this case it's a company's valuable data requiring protection. But what happens if the tool itself is compromised or malfunctions? Who watches the performance of the tool when the tool itself is designed to do the watching?

Related: When It Comes to Adopting the Cloud, You've Got to Secure Company Data

This is a question many businesses face when using agent-based solutions. If the agent is compromised and backdoor access is gained through the agent, then what happens to the network? Are there measures in place to mitigate the branding disaster that could follow? For some context, an agent is software that runs on a system and sends information to a central location for use by another program or service. Agentless solutions still collect the necessary data, but use the previously installed software instead of installing and maintaining software on every machine in the network.

The problem of unauthorized access or comprised agents is not simply a theoretical scenario. Recently, Panda Security and Symantec Altiris IT Management Suite (ITMS) had emergency patches released for their agent-based endpoint management software. Both clients had vulnerabilities in the agents that enabled unauthorized access to installed networks. It gave unauthorized users the ability to access system-level privileges, effectively controlling the system management tool undetected.

Related: 3 Simple Precautions for Protecting Your Personal Data in the Cloud

So what's the solution for detecting and properly managing system management tools? Or as Alan Moore so eloquently puts it, "who watches the watchmen?"

As always, some of the responsibility falls to IT managers, but it's a tall order when you're entrusting the solution to perform a certain way and it misbehaves unexpectedly. It's this unpredictability that explains why agentless technologies are gaining traction in the market.

Here's four core benefits of an agentless cloud-based approach when applied to system management:

  1. Extreme flexibility because they allow management globally through simple Web browsers
  2. Hassle-free software distribution
  3. Controlled and safe software updates through patch management
  4. Reduced need for resources to manage or maintain an agent at various endpoints

Under an agentless model the functionality remains the same, but there is no footprint left once the assigned tasks are complete. There's nothing installed on the endpoint, which removes access points that outside elements could use to gain control. It's similar to another comic hero -- Batman. When there's a need for him he appears and cleans up crime, but when the job is done he fades away into Bruce Wayne. Agentless technologies do the same thing – they get the job done when the need arises, but don't stay longer than necessary and potentially ruin a smooth running situation.

Related: The Top 5 Cloud IT Challenges Facing Businesses in 2015

Heroes without villains are just people in costumes. Agents without active management are just extra vulnerabilities. So why not get the best of both with an agentless system management tool? A solution that does its job without sticking around longer than it's needed.
Ashley Leonard

President and CEO of Verismic Software

 Ashley Leonard is the president and CEO of Verismic Software, a global industry leader providing cloud-based IT management technology. With over 25 years of experience in enterprise software, sales, and operational leadership, Leonard founded Verismic in 2012, establishing it as the leading provider of IT endpoint management solutions delivered from the cloud. Verismic’s latest offering, Cloud Management Suite, is an agentless, cloud-based IT management software solution that is revolutionizing the way IT professionals engage in endpoint management.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Business News

Nike Responds to Criticism Over U.S. Women's Olympic Uniforms: 'Everything's Showing'

The company is the official outfitter for the U.S. Olympic track and field athletes.

Growing a Business

How to Leverage Business Awards to Foster Innovation, Build Your Brand and Retain Top Talent

Awards validate a company's efforts in innovation and corporate responsibility but also enhance its reputation, attract talent and open doors to new partnerships and customer segments.

Growing a Business

Top Brands Are Flocking to Newsletter Advertising — Here Are 11 Reasons Why You Should Do the Same.

An explanation of the current market trend of brands turning to newsletter advertising as a primary channel in their marketing campaigns.

Business News

Here's How Much Money Scottie Scheffler Just Earned After Winning the Masters

The 2024 Masters is the second time in Scheffler's career that he won the esteemed tournament.