Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
  1. All
  2. Engineering
  3. Systems Management

You're managing system accessibility and data security. How can you predict end-users' needs effectively?

Dive into the future of tech with your insights: how do you anticipate the needs of system users while ensuring security?

Systems Management Systems Management

Systems Management

+ Follow
  1. All
  2. Engineering
  3. Systems Management

You're managing system accessibility and data security. How can you predict end-users' needs effectively?

Dive into the future of tech with your insights: how do you anticipate the needs of system users while ensuring security?

Add your perspective
Help others by sharing more (125 characters min.)
2 answers
  • Contributor profile photo
    Contributor profile photo
    Ivo Murris

    Product Manager - Virtual Workspace Services | Desktop as a Service | Business Intelligence

    • Report contribution

    IMO: You need to be careful to support your users so they can do their job efficiently, while ensuring corporate data and apps are kept where they should be. I would: - Ensure your users are identified by using MFA/2FA; - Determine the 'posture' of the user at the time of accessing anything. How much do you trust the user by looking at the device they are using (corporate laptop, home tablet), the network (Starbucks or office), anti-virus, etc. - Have RBAC on all applications and data (job description, AD groups, tags like data sensitivity) - Posture fine-tunes RBAC. E.g. the CFO has access to financial reports, but using an unsecured tablet can only view, not change or download. Use UEM tooling to make this easy 😉

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Elenice Karina Santos

    Recognized as a TOP 10 IT Leader in Brazil - 2023 | IT Director | Executive IT Manager | Innovation | Artificial Intelligence | M&A | Digital Transformation | Strategic Business and Career Mentoring"

    • Report contribution

    To effectively predict end-users' needs in system accessibility and data security, you need both proactive and reactive strategies: User Behavior Analytics (UBA): Analyze how users interact with the system to identify access trends and challenges. Feedback Loops: Gather regular feedback to stay aligned with evolving user needs. Adaptive Systems: Use AI to adjust systems based on user behavior while maintaining security. Security by Design: Prioritize both ease of access and security, ensuring compliance with regulations like GDPR and CCPA.

    Like
Systems Management Systems Management

Systems Management

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Systems Management

No more previous content
  • You're facing critical system upgrades. How do you maintain seamless communication with vendors?

  • Your team is facing high-stress periods due to system failures. How can you keep morale and motivation high?

  • You're tasked with driving innovation in your systems. How do you keep them stable?

  • You're overseeing multiple vendors on interconnected systems. How do you ensure seamless collaboration?

  • You're balancing security and accessibility in system configurations. How can you find the right priorities?

  • You need to enforce strict security protocols. How can you keep network access user-friendly?

  • You're facing a major technology upgrade for your clients. How do you manage their expectations?

  • Critical system upgrades are looming. How do you manage stakeholder expectations?

No more next content
See all

More relevant reading

  • Computer Maintenance
    What are the risks of skipping disk cleanup and defrag for a long time?
  • Transmission Control Protocol (TCP)
    How do TCP SYN and FIN flags interact with other TCP flags and options?
  • 3GPP
    How do you implement and verify 3GPP NAS and MM security features and algorithms?
  • Encryption
    How do you measure the bias and the probability of linear and differential characteristics for a cipher?

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)
  • Cloud Computing

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
2 Contributions