{"id":54822,"date":"2023-12-05T16:00:00","date_gmt":"2023-12-05T16:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/"},"modified":"2023-12-05T16:00:00","modified_gmt":"2023-12-05T16:00:00","slug":"3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/","title":{"rendered":"3 reasons why now is the time to go cloud native for device management"},"content":{"rendered":"<p>Since the start of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-intune\">Microsoft Intune<\/a> in 2010, we have been working on and iterating toward simplified Windows management, in part by moving infrastructure from on-premises to the cloud. As the capabilities of our customers and Intune grew, a pure cloud or cloud-native model gradually came into sharper focus. But every customer\u2019s journey is different, so in addition to the cloud-native model, we also developed hybrid approaches for the customers that needed some cloud capabilities without making the full transition.&nbsp;&nbsp;<\/p>\n<p>We are now seeing tens of millions of endpoints managed exclusively in the cloud, and I feel like we are reaching an inflection point. We will continue to support all customers in their chosen architecture and models, but I am increasingly hearing from customers of their successful adoption of pure cloud approaches. Given the increasing evidence from customers that have already migrated and customers planning to migrate, I am convinced that now is the time to move toward this pure, native cloud management approach for Windows.&nbsp;&nbsp;<\/p>\n<p>In this blog post, I want to share three recent customer stories from a broad range of industries as evidence of what is happening. Before doing so, let me quickly define what I mean by cloud native. In this context, I am defining cloud native as:&nbsp;<\/p>\n<ol start=\"1\">\n<li>Using pure cloud-based user identity.<\/li>\n<li>Devices are cloud managed exclusively and receive apps and configurations dynamically, reset, or restored from the cloud.&nbsp;<\/li>\n<li>Using Windows Autopilot or zero-touch deployment for all your Windows devices.<\/li>\n<li>In-depth security solutions are applied at scale through cloud integrated solutions.&nbsp;<\/li>\n<\/ol>\n<div class=\"wp-block-msxcm-cta-block theme-dark\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters bg-gray-800 text-white\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\" readability=\"26.571428571429\">\n<h2>Microsoft Intune<\/h2>\n<div class=\"mb-3\" readability=\"7\">\n<p>Protect and manage endpoints in one place.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> <img fetchpriority=\"high\" width=\"1024\" height=\"683\" src=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/wp-content\/uploads\/sites\/2\/2023\/11\/CLO22_SecOps_016-3-1-1024x683.jpg\" class=\"card-img img-object-cover\" alt=\"a group of people in front of a computer screen\" decoding=\"async\" srcset=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/wp-content\/uploads\/sites\/2\/2023\/11\/CLO22_SecOps_016-3-1-1024x683.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/wp-content\/uploads\/sites\/2\/2023\/11\/CLO22_SecOps_016-3-1-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/wp-content\/uploads\/sites\/2\/2023\/11\/CLO22_SecOps_016-3-1-768x512.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\"> <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<h2 class=\"wp-block-heading\">1. Greater security and cost savings<\/h2>\n<p>Ericsson is a telecom equipment giant\u2014it employs over 100,000 workers and has customers in 180 countries. Its transition to a purely cloud model is an example of how the shift can be helpful in both technical and financial ways.&nbsp;&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote\" readability=\"12\">\n<p>\u201cWe\u2019ve gained control, security, and efficiency all while allowing us to remove costly on-premises infrastructure. Rapid policy deployment, enhanced application management, and remote device control have reduced risks and boosted productivity. This transformation has led to substantial cost reduction and streamlined operations.\u201d&nbsp;<\/p>\n<p><cite>\u2014Nickolaj Andersen, Senior Architect End User Computing at Ericsson<\/cite><\/p><\/blockquote>\n<p>Ericsson raised cost savings as a key benefit for managing their user computing estate purely in the cloud, and now is certainly a time when more of our customers are looking to \u201cdo more with less.\u201d The financial benefits often highlight the reduction in on-premises hardware\u2014the overhead cost to keep edge servers running Microsoft Configuration Manager\u2014but there are two other parts to the business case to highlight.&nbsp;&nbsp;<\/p>\n<p>First, pure cloud endpoint management lowers the chance of a security breach and the costs associated with that. Because it enabled having patches and policies delivered in a timelier manner to employee devices, lowering the length of time a device may be vulnerable. It also allows our customers to utilize the full scope and scale of Microsoft\u2019s cloud to detect threat signals from ever more sophisticated attackers and react accordingly.&nbsp;&nbsp;<\/p>\n<p>The other part of the business case is reducing support costs for legacy on-premises solutions. These solutions require more staff, especially difficult in short-staffed areas such as security. And the best employees will want to work on forward-facing technologies that keep their skills current. By moving out of a tactical mindset, you can elevate your team from firefighting to setting the world alight.&nbsp;&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">2. Transformation with cloud native endpoint management<\/h2>\n<p>The second customer story I want to share with you is from <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1703164174877441905-hewlett-packard-enterprise-microsoft-intune-united-states\" target=\"_blank\" rel=\"noreferrer noopener\">Hewlett Packard Enterprise (HPE)<\/a>. HPE has more than 87,000 employees and contractors, using more than 70,000 mobile devices, and 115,000 Windows laptop PCs. Their legacy on-premises solution relied on manual IT interventions and suffered increased exposure to security breaches due to slower device updates than when using the cloud. Kregg Nelson, End User Compute Manager at HPE, explains. \u201cWe realized that a cloud-based solution would not only make us more efficient but also open up new ways of integrating with other HPE workstreams, like security operations and human resources.\u201d<\/p>\n<p>HPE recently implemented Microsoft Intune for Mobile Application Management without enrollment, Windows mobile device management, Windows Autopilot, and used Windows Update to help ensure up-to-date devices during its ongoing Windows 11 migration.&nbsp;<\/p>\n<p>Using the fully cloud-based solution, HPE has enjoyed many benefits, including a 60% reduction in endpoint patch adoption time and the ability for existing IT staff to focus on more strategic issues than before. Windows Autopilot has also helped reduce device set up time for newly hired employees. <\/p>\n<blockquote class=\"wp-block-quote blockquote\" readability=\"11\">\n<p>\u201cYou really want to help new employees feel productive right away, and getting them through first-time setup in 35 minutes or less is a great way to achieve that\u2014it used to take two hours or more. Windows Autopilot has been critical for achieving this. We\u2019ve had 4,500-plus people try it the new way since April, and customer satisfaction scores are at 98 percent\u2014an all-time high.\u201d<\/p>\n<p><cite>\u2014Kregg Nelson, End User Compute Manager at Hewlett Packard Enterprise<\/cite><\/p><\/blockquote>\n<h2 class=\"wp-block-heading\">3. The broader upside from being ready for future innovation<\/h2>\n<p>In addition to immediate cost savings and benefits from <a href=\"https:\/\/www.microsoft.com\/windows\/windows-11\" target=\"_blank\" rel=\"noreferrer noopener\">Windows 11<\/a>, there is one additional consideration for a cloud only approach: providing a better foundation for future innovation. Whether it is deeper insights and analysis from AI, or simply being ready for whatever the next wave is, adopting a pure cloud, native model will put your organization on the right footing.&nbsp;&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote\" readability=\"8.8175675675676\">\n<p>\u201c[Implementing Microsoft Intune Suite] is part of a broader initiative to move away from a traditional on-premises solution toward [a] cloud solution. Whether that is managing the endpoint or our email and collaboration tools, \u2026 that change has had a demonstrable positive impact on our organization.\u201d<\/p>\n<p><cite>\u2014A lead architect in workplace services at a financial services organization (who was interviewed by <a href=\"https:\/\/aka.ms\/IntuneSuite_ForresterTEI\" target=\"_blank\" rel=\"noreferrer noopener\">Forrester<\/a> on behalf of Microsoft)<\/cite><\/p><\/blockquote>\n<p>Part of that broader positive impact is unlocking new AI scenarios. To do this, customers are centralizing enterprise data to break down silos, and unlock potential insights from running AI over combined data sets. With a cloud-native model, centralizing this data becomes easier. Centralized data sources that share a fabric that will allow for AI driven ways to synthesize data in a way that is not possible if dispersed. AI models operating on centralized cloud data could help identify future security threats by bringing together insights from across the organization (and outside the organization) and joining the dots. We cannot perfectly predict the future, but companies that manage their user computing estate exclusively in the cloud are closer to being ready for watever is next.&nbsp;&nbsp;<\/p>\n<h2 class=\"wp-block-heading\">Next steps<\/h2>\n<p>I hope these customer stories help provide perspective to our updated guidance to adopt an exclusively cloud-native model if you have not already. We will, of course, continue to support our customers at whatever stage of the cloud journey they are on, but I also hope that these customer examples have shown the benefits of a purely cloud-native model. Customers are increasingly telling me that the economic benefits, the benefits from Windows 11, and getting ready for what is next with AI are all key drivers in moving them towards a renewed C-suite conversation about the timing of moving all your endpoint management operations to the cloud.&nbsp;&nbsp;<\/p>\n<p>Now is the time. Please look out for a future blog early in 2024 with more of our learnings on how best to implement this new approach.&nbsp;&nbsp;<\/p>\n<p>In the meantime, learn more about <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-intune-blog\/bg-p\/MicrosoftEndpointManagerBlog\">Microsoft Intune<\/a>.&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2023\/12\/05\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover these three recent customer stories to better understand the full value of becoming cloud native.<br \/>\nThe post 3 reasons why now is the time to go cloud native for device management appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54823,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-54822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 reasons why now is the time to go cloud native for device management 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 reasons why now is the time to go cloud native for device management 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/wp-content\/uploads\/sites\/2\/2023\/11\/CLO22_SecOps_016-3-1-1024x683.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"3 reasons why now is the time to go cloud native for device management\",\"datePublished\":\"2023-12-05T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/\"},\"wordCount\":1264,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management.jpg\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/\",\"name\":\"3 reasons why now is the time to go cloud native for device management 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management.jpg\",\"datePublished\":\"2023-12-05T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management.jpg\",\"width\":1024,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 reasons why now is the time to go cloud native for device management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 reasons why now is the time to go cloud native for device management 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/","og_locale":"en_US","og_type":"article","og_title":"3 reasons why now is the time to go cloud native for device management 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-12-05T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/wp-content\/uploads\/sites\/2\/2023\/11\/CLO22_SecOps_016-3-1-1024x683.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"3 reasons why now is the time to go cloud native for device management","datePublished":"2023-12-05T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/"},"wordCount":1264,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management.jpg","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/","url":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/","name":"3 reasons why now is the time to go cloud native for device management 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management.jpg","datePublished":"2023-12-05T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/12\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management.jpg","width":1024,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/3-reasons-why-now-is-the-time-to-go-cloud-native-for-device-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"3 reasons why now is the time to go cloud native for device management"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54822"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54822\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54823"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}