Resources
People, Devices & Access7 min read

What Is Device Management And Why Does It Matter?

Device management is the practical work of knowing which devices the business relies on, who uses them, whether they meet the agreed baseline, and what happens when they change hands.

Quick answer

Device management means keeping business devices visible, assigned, configured, updated, protected, and recoverable. In Kindura packages, one primary laptop or desktop is included per named user; extra laptops, shared devices, mobiles, servers, and network devices need separate scope or add-on pricing.

Key takeaways

  • You cannot support or secure devices you cannot identify.
  • A useful inventory includes ownership, configuration, update status, and recovery status.
  • Tooling should follow the operating need; do not assume every endpoint capability is included by default.

What device management covers

  • Device name, serial number, purchase or warranty notes, and assigned user.
  • Operating system, supported status, and update position.
  • Encryption, screen lock, and baseline configuration status where applicable.
  • Endpoint protection or malware protection status where it is part of the environment.
  • Installed core applications and management tooling where used.
  • Lost, returned, wiped, reissued, retired, or missing status.

What Kindura includes

Device typeHow it is handledPricing note
Primary laptop or desktopIncluded for each named user in Secure Device, Secure Support, and Secure CompleteCovered by the named-user package price
Extra laptop or desktopManaged separately when a user has more than one business computer£8/device/month
Shared or kiosk computerScoped separately because ownership, usage, and support patterns differ£12/device/month
Mobile, server, or network deviceTreated as an add-on or quoted remote project depending on the device and control neededSeparate add-on or proposal

Why it matters for SMEs

Support is faster

A support provider can diagnose recurring issues more quickly when device details are already known.

Patching is visible

A device inventory gives patching a target list and helps identify devices that have stopped checking in.

Leavers are cleaner

Offboarding is easier when the business knows which devices and accessories need recovery or wiping.

Security evidence is easier

Secure Complete readiness work is more manageable when devices, users, operating systems, endpoint protection, firewall position, and update status are already recorded.

Device management and personal devices

Many small businesses use a mix of company-owned and personal devices. That does not mean every device needs the same treatment, but it does mean the business should decide what access is allowed, what data can be stored locally, and what happens when someone leaves.

For personal devices, policy and platform controls need to be handled carefully. The right approach depends on the systems used, data sensitivity, employment context, and available tooling.

Questions for an IT provider

  • Which device is treated as each user's included primary laptop or desktop?
  • Which extra laptops, shared devices, mobiles, servers, or network devices need separate pricing?
  • How is the device inventory maintained?
  • Which operating systems and device types are supported?
  • What patch, encryption, and endpoint protection information is reported?
  • What happens when a device is lost, replaced, returned, or retired?
  • Which capabilities depend on extra licensing or separate tooling?
  • Which activities are remote-only and which physical tasks remain the business's responsibility?

Sources and further reading

Related resources