Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

A Note to Our Fellow IT Pros

To those who have been working 24×7 to keep the networks alive, who imaged 100s of laptops, issued security tokens, and have been looking at health metrics for your environment as they inch closer to failing-over, thank you.

The last 96 hours has seen one of the most dramatic shifts of the modern-era at a scale that we have never seen before; a significant portion of the population is being asked to work remotely. The COVID-19 pandemic is a disaster but not one that is routinely documented on a disaster recovery plan; for many, we are traversing uncharted waters.

And it’s easy to forget who is making this happen. It seems easy enough to take a laptop and work from home but as anyone reading this knows, this means you need remote connectivity, bandwidth, and of course, a copious amount of security.

For the big players, like Google, Microsoft, or Amazon, scale is already built-in to their operations but for the vast majority of operations, this is putting a new type of stress on environments. This is your World Series, your Super Bowl, the test of the test, the big dance – you get the idea.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Keeping your company operational during these times is a difficult challenge and I want you to know that you are not alone. There are millions of IT Pros slugging it out through the nights to make the shared drives accessible, Active Directory authenticating, and video communications possible.

The challenges ahead are likely greater than those behind us but keep your head up, your scripts running, and know that there is a community here on Petri and around the world supporting your efforts.

If there is something you need help with, let us know and we will do our best to find the resources you need to keep your users online.


Brad Sams

Executive Editor, BWW Media Group

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: