Who Watches the Watchmen?

Agentless IT technology does its job without sticking around longer than it's needed.

learn more about Ashley Leonard

By Ashley Leonard

Shutterstock

Opinions expressed by Entrepreneur contributors are their own.

You might recognize this article's title as an important question posed in Alan Moore's classic graphic novel, "Watchmen." If you're unfamiliar with the novel, this line examines what happens when heroes (the Watchmen) are left unchecked. What happens when one of them goes rogue and can't stopped? It's fundamentally a call for a checks and balances approach -- one that applies to various aspects of life and business.

For a tech-focused example of the need for "watchers," consider a typical IT department's system management tool. These tools are used by IT departments of all sizes, from small start-ups to larger early-stage firms with explosive growth. These tools are similar to a hero protecting citizens, but in this case it's a company's valuable data requiring protection. But what happens if the tool itself is compromised or malfunctions? Who watches the performance of the tool when the tool itself is designed to do the watching?

Related: When It Comes to Adopting the Cloud, You've Got to Secure Company Data

This is a question many businesses face when using agent-based solutions. If the agent is compromised and backdoor access is gained through the agent, then what happens to the network? Are there measures in place to mitigate the branding disaster that could follow? For some context, an agent is software that runs on a system and sends information to a central location for use by another program or service. Agentless solutions still collect the necessary data, but use the previously installed software instead of installing and maintaining software on every machine in the network.

The problem of unauthorized access or comprised agents is not simply a theoretical scenario. Recently, Panda Security and Symantec Altiris IT Management Suite (ITMS) had emergency patches released for their agent-based endpoint management software. Both clients had vulnerabilities in the agents that enabled unauthorized access to installed networks. It gave unauthorized users the ability to access system-level privileges, effectively controlling the system management tool undetected.

Related: 3 Simple Precautions for Protecting Your Personal Data in the Cloud

So what's the solution for detecting and properly managing system management tools? Or as Alan Moore so eloquently puts it, "who watches the watchmen?"

As always, some of the responsibility falls to IT managers, but it's a tall order when you're entrusting the solution to perform a certain way and it misbehaves unexpectedly. It's this unpredictability that explains why agentless technologies are gaining traction in the market.

Here's four core benefits of an agentless cloud-based approach when applied to system management:

  1. Extreme flexibility because they allow management globally through simple Web browsers
  2. Hassle-free software distribution
  3. Controlled and safe software updates through patch management
  4. Reduced need for resources to manage or maintain an agent at various endpoints

Under an agentless model the functionality remains the same, but there is no footprint left once the assigned tasks are complete. There's nothing installed on the endpoint, which removes access points that outside elements could use to gain control. It's similar to another comic hero -- Batman. When there's a need for him he appears and cleans up crime, but when the job is done he fades away into Bruce Wayne. Agentless technologies do the same thing – they get the job done when the need arises, but don't stay longer than necessary and potentially ruin a smooth running situation.

Related: The Top 5 Cloud IT Challenges Facing Businesses in 2015

Heroes without villains are just people in costumes. Agents without active management are just extra vulnerabilities. So why not get the best of both with an agentless system management tool? A solution that does its job without sticking around longer than it's needed.
Ashley Leonard

President and CEO of Verismic Software

 Ashley Leonard is the president and CEO of Verismic Software, a global industry leader providing cloud-based IT management technology. With over 25 years of experience in enterprise software, sales, and operational leadership, Leonard founded Verismic in 2012, establishing it as the leading provider of IT endpoint management solutions delivered from the cloud. Verismic’s latest offering, Cloud Management Suite, is an agentless, cloud-based IT management software solution that is revolutionizing the way IT professionals engage in endpoint management.

Related Topics

Editor's Pick

Have More Responsibilities at Work, But No Pay Bump? Use This Script to Get the Raise You Deserve.
Black and Asian Founders Face Opposition at All Levels — Here's Why That Has to Change
Business News

'This Made Me Physically Recoil From My Phone': Lingerie Brand Apologizes For 'Creepy' Ad Referencing Ryan Reynolds and Bras

Online lingerie retailer Harper Wilde is under fire for a bizarre sponsored post it has since pulled from Instagram.

Business News

'Harvard Should Be Ashamed': Kim Kardashian Slammed For Giving Lecture at Harvard Business School

Kardashian visited Boston on Friday with Skims co-founder Jens Grede to talk to students about the shapewear company.

Thought Leaders

5 Small Daily Habits Self-Made Millionaires Use to Grow Their Wealth

We've all seen what self-made millionaires look like on TV, but it's a lot more subtle than that. Brian Tracy researched what small daily habits these successful entrepreneurs adopted on their journey from rags to riches.

Business News

The 90-Year-Old Owner of Ray's Candy Store Was Brutally Attacked Outside His Shop

Ray Alvarez was attacked in front of his iconic NYC candy store around 3 a.m. on Tuesday.