You can be on Entrepreneur’s cover!

Who Watches the Watchmen? Agentless IT technology does its job without sticking around longer than it's needed.

By Ashley Leonard

entrepreneur daily

Opinions expressed by Entrepreneur contributors are their own.


You might recognize this article's title as an important question posed in Alan Moore's classic graphic novel, "Watchmen." If you're unfamiliar with the novel, this line examines what happens when heroes (the Watchmen) are left unchecked. What happens when one of them goes rogue and can't stopped? It's fundamentally a call for a checks and balances approach -- one that applies to various aspects of life and business.

For a tech-focused example of the need for "watchers," consider a typical IT department's system management tool. These tools are used by IT departments of all sizes, from small start-ups to larger early-stage firms with explosive growth. These tools are similar to a hero protecting citizens, but in this case it's a company's valuable data requiring protection. But what happens if the tool itself is compromised or malfunctions? Who watches the performance of the tool when the tool itself is designed to do the watching?

Related: When It Comes to Adopting the Cloud, You've Got to Secure Company Data

This is a question many businesses face when using agent-based solutions. If the agent is compromised and backdoor access is gained through the agent, then what happens to the network? Are there measures in place to mitigate the branding disaster that could follow? For some context, an agent is software that runs on a system and sends information to a central location for use by another program or service. Agentless solutions still collect the necessary data, but use the previously installed software instead of installing and maintaining software on every machine in the network.

The problem of unauthorized access or comprised agents is not simply a theoretical scenario. Recently, Panda Security and Symantec Altiris IT Management Suite (ITMS) had emergency patches released for their agent-based endpoint management software. Both clients had vulnerabilities in the agents that enabled unauthorized access to installed networks. It gave unauthorized users the ability to access system-level privileges, effectively controlling the system management tool undetected.

Related: 3 Simple Precautions for Protecting Your Personal Data in the Cloud

So what's the solution for detecting and properly managing system management tools? Or as Alan Moore so eloquently puts it, "who watches the watchmen?"

As always, some of the responsibility falls to IT managers, but it's a tall order when you're entrusting the solution to perform a certain way and it misbehaves unexpectedly. It's this unpredictability that explains why agentless technologies are gaining traction in the market.

Here's four core benefits of an agentless cloud-based approach when applied to system management:

  1. Extreme flexibility because they allow management globally through simple Web browsers
  2. Hassle-free software distribution
  3. Controlled and safe software updates through patch management
  4. Reduced need for resources to manage or maintain an agent at various endpoints

Under an agentless model the functionality remains the same, but there is no footprint left once the assigned tasks are complete. There's nothing installed on the endpoint, which removes access points that outside elements could use to gain control. It's similar to another comic hero -- Batman. When there's a need for him he appears and cleans up crime, but when the job is done he fades away into Bruce Wayne. Agentless technologies do the same thing – they get the job done when the need arises, but don't stay longer than necessary and potentially ruin a smooth running situation.

Related: The Top 5 Cloud IT Challenges Facing Businesses in 2015

Heroes without villains are just people in costumes. Agents without active management are just extra vulnerabilities. So why not get the best of both with an agentless system management tool? A solution that does its job without sticking around longer than it's needed.
Ashley Leonard

President and CEO of Verismic Software

 Ashley Leonard is the president and CEO of Verismic Software, a global industry leader providing cloud-based IT management technology. With over 25 years of experience in enterprise software, sales, and operational leadership, Leonard founded Verismic in 2012, establishing it as the leading provider of IT endpoint management solutions delivered from the cloud. Verismic’s latest offering, Cloud Management Suite, is an agentless, cloud-based IT management software solution that is revolutionizing the way IT professionals engage in endpoint management.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Business News

James Clear Explains Why the 'Two Minute Rule' Is the Key to Long-Term Habit Building

The hardest step is usually the first one, he says. So make it short.

Side Hustle

He Took His Side Hustle Full-Time After Being Laid Off From Meta in 2023 — Now He Earns About $200,000 a Year: 'Sweet, Sweet Irony'

When Scott Goodfriend moved from Los Angeles to New York City, he became "obsessed" with the city's culinary offerings — and saw a business opportunity.


Get Your Business a One-Year Sam's Club Membership for Just $14

Shop for office essentials, lunch for the team, appliances, electronics, and more.

Business News

Microsoft's New AI Can Make Photographs Sing and Talk — and It Already Has the Mona Lisa Lip-Syncing

The VASA-1 AI model was not trained on the Mona Lisa but could animate it anyway.