What Is Device Management And Why Does It Matter?
Device management is the practical work of knowing which devices the business relies on, who uses them, whether they meet the agreed baseline, and what happens when they change hands.
Quick answer
Device management means keeping business devices visible, assigned, configured, updated, protected, and recoverable. In Kindura packages, one primary laptop or desktop is included per named user; extra laptops, shared devices, mobiles, servers, and network devices need separate scope or add-on pricing.
Key takeaways
- You cannot support or secure devices you cannot identify.
- A useful inventory includes ownership, configuration, update status, and recovery status.
- Tooling should follow the operating need; do not assume every endpoint capability is included by default.
What device management covers
- Device name, serial number, purchase or warranty notes, and assigned user.
- Operating system, supported status, and update position.
- Encryption, screen lock, and baseline configuration status where applicable.
- Endpoint protection or malware protection status where it is part of the environment.
- Installed core applications and management tooling where used.
- Lost, returned, wiped, reissued, retired, or missing status.
What Kindura includes
| Device type | How it is handled | Pricing note |
|---|---|---|
| Primary laptop or desktop | Included for each named user in Secure Device, Secure Support, and Secure Complete | Covered by the named-user package price |
| Extra laptop or desktop | Managed separately when a user has more than one business computer | £8/device/month |
| Shared or kiosk computer | Scoped separately because ownership, usage, and support patterns differ | £12/device/month |
| Mobile, server, or network device | Treated as an add-on or quoted remote project depending on the device and control needed | Separate add-on or proposal |
Why it matters for SMEs
Support is faster
A support provider can diagnose recurring issues more quickly when device details are already known.
Patching is visible
A device inventory gives patching a target list and helps identify devices that have stopped checking in.
Leavers are cleaner
Offboarding is easier when the business knows which devices and accessories need recovery or wiping.
Security evidence is easier
Secure Complete readiness work is more manageable when devices, users, operating systems, endpoint protection, firewall position, and update status are already recorded.
Device management and personal devices
Many small businesses use a mix of company-owned and personal devices. That does not mean every device needs the same treatment, but it does mean the business should decide what access is allowed, what data can be stored locally, and what happens when someone leaves.
For personal devices, policy and platform controls need to be handled carefully. The right approach depends on the systems used, data sensitivity, employment context, and available tooling.
Questions for an IT provider
- Which device is treated as each user's included primary laptop or desktop?
- Which extra laptops, shared devices, mobiles, servers, or network devices need separate pricing?
- How is the device inventory maintained?
- Which operating systems and device types are supported?
- What patch, encryption, and endpoint protection information is reported?
- What happens when a device is lost, replaced, returned, or retired?
- Which capabilities depend on extra licensing or separate tooling?
- Which activities are remote-only and which physical tasks remain the business's responsibility?
Sources and further reading
Related resources
Checklist
The SME IT Operations Checklist
A practical monthly checklist for keeping devices, access, updates, support, reporting, and supplier ownership visible in a growing SME.
Checklist
Employee Offboarding Checklist
A calm checklist for removing access, recovering devices, transferring ownership, and keeping a completion record when someone leaves.
Guide
Cyber Essentials For SMEs
A practical SME guide to Cyber Essentials, the five technical control areas, preparation evidence, and where managed IT can help without promising certification outcomes.