Application Management In A Remote World

What has been your biggest end user support challenge over the past two months?

For some, it may be lack of technology equipment. For others, training requests. But for many: the largest challenge we face as IT administrators is enabling seamless application availability and access.

End user productivity is intrinsically tied to their ability to work with critical applications from collaboration, to payroll and expenses, to database management. In today’s world, applications are directly tied to our ability to keep our businesses running.

How does application availability and management change in the COVID-19 remote workforce environment? In our latest webinar, we discussed short and long-term solutions for ensuring your applications are secure, scalable, and manageable in our current-state. Read on for a recap of this webinar discussion, or click the link to watch.

Five Application Management Considerations

Let’s review the critical considerations for application availability and management. Your understanding of these five key areas relative to application health is critical to their short and long-term availability.

  1. Network

    What makes up the underpinnings of remote work? The network. If your enterprise WAN connectivity can’t handle the increased traffic, or if your remote users’ access can’t handle the latency requirements, you will have under-performing applications. Make sure you consider:

    • Your enterprise network: corporate bandwidth, load balancers, and connectivity for cloud based and on-premise applications and services

    • Guidelines for remote workers: work-from-home connectivity constraints, bandwidth, and latency.

  2. Security

    Where are your data services, and how do you securely access them? Ask yourself:

    • Do you know the who, what, where, and why of your data access and governance? What about data usage on unknown networks, and new devices that your employees haven’t previously used for work activities?

    • Can you manage data and device compliance remotely? Including corporate-owned endpoints, patching, and BYOD enrollment.

    • Do you have a zero trust framework in place? If yes, great; if not, now is an excellent time to leverage zero trust principles to take a comprehensive look at system vulnerabilities. (Check out our guide to the zero trust framework here.)

    • Do you have a common platform for user identification and authorization?

  3. End User Training

    How do we communicate these changes to end users? Providing the technology is only part of the solution. Technology is effective only when end users know how to use the tools. Users are one of the three critical components to Burwood’s security program framework:

    • Governance: Sets direction and goals

    • Technology: Supports objectives and enables protection

    • Users: Educate and empower to access apps and workloads securely

  4. Application Availability

    Accessing critical data through applications is essential to continued employee productivity. Consider these key questions to ensure coverage:

    • What applications are immediately available for remote workers, and can your infrastructure scale to accommodate increased remote usage?

    • What applications are not available, and how can we close the gap?

    • How do users need to connect to their applications? (VPN, VDI, SaaS: we go into all these options in the webinar recording. And, check out our previous session on scaling VPN access).

  5. Cultural Change

    Prior to today’s current environment, we were unable to proactively mange the cultural change. Our users were thrust into a new normal, whether ready or not. Now, we must rethink all aspects of our thinking and behavior about technology usage and access, including:

    • Embracing a culture of change and cloud culture

    • Re-envisioning back office processes and procedures

    • Rethinking end user engagement tools and strategies

    • Considering remote work as a long-term option for more users than previously imagined

Long-Term: Create a Application Migration Strategy

Cloud migration enables the clearest path towards long-term application availability, management, and support. When your applications live in the cloud, they can reap the benefits of unlimited flexibility, agility, and scaling.

Application Migration Framework

Application Migration Tiers.png

To get started, Burwood recommends analyzing your applications portfolio to determine ease of migration. Our four-tiered process provides a framework for organizing and prioritizing your application migration plan.

This framework includes key considerations like:

  • Expense of on-premises vs. cloud operations

  • Upcoming hardware requirements and cloud alternatives

  • Business criticality level and user dependencies

  • Legal and governmental compliance requirements

  • Custom vs. standard application recommendations

Check out the webinar for a detailed discussion of this programmatic approach.

The Path Ahead for Application Management

For more detailed discussion, we encourage you to view the webinar recording above. And as always, reach out to the Burwood team for additional help with your specific challenges.

See Burwood’s official COVID-19 Resource Page.

 

April 28, 2020

 
 
Previous
Previous

6 Reasons to Initiate a Network Assessment Now

Next
Next

Improve Employee Productivity With Virtual Desktop Infrastructure