diff --git a/website/assets/images/device-management-icon-step-by-step-48x48@2x.png b/website/assets/images/device-management-icon-step-by-step-48x48@2x.png new file mode 100644 index 0000000000..c589929e49 Binary files /dev/null and b/website/assets/images/device-management-icon-step-by-step-48x48@2x.png differ diff --git a/website/views/pages/device-management.ejs b/website/views/pages/device-management.ejs index 5b0ae337c4..ca12dc815a 100644 --- a/website/views/pages/device-management.ejs +++ b/website/views/pages/device-management.ejs @@ -13,10 +13,10 @@
Even if you've never done an MDM migration, you've probably heard it's hard. Fleet makes it easy to get your data in and get it out.
- Simplify your tools -Deploy a modern Mac-first MDM that’s purpose-built to manage your Apple, Windows, and Linux computers.
- Implement “zero trust” faster -Use Fleet to enforce conditional access checking at login. (It's pretty easy to customize whatever you need.)
+ Tidy up your tools +Deploy a modern Mac-first MDM purpose-built for IT engineers and cross-training. Use principles from DevOps to manage Apple, Windows, and Linux computers declaratively.
+ “Zero” trust, fewer tickets +You can use Fleet’s API to customize every aspect of conditional access – even the stuff your CISO hasn’t thought of yet.
Deploy a modern Mac-first MDM that’s purpose-built to manage your Apple, Windows, and Linux computers.
+Deploy a modern Mac-first MDM purpose-built for IT engineers and cross-training. Use principles from DevOps to manage Apple, Windows, and Linux computers declaratively.
Manage your IT infrastructure in any browser or use git to make infrastructure changes as code. You can use the CLI or API to automate the deployment, configuration, and monitoring of your devices.
+
+
@@ -113,21 +123,12 @@
Manage your IT infrastructure in any browser or use git to make infrastructure changes as code. You can use the CLI or API to automate the deployment, configuration, and monitoring of your devices.
-
- Use Fleet to enforce conditional access checking at login. (It's pretty easy to customize whatever you need.)
+You can use Fleet’s API to customize every aspect of conditional access – even the stuff your CISO hasn’t thought of yet.
Ensure that only healthy, up-to-date devices can log in and access company data and resources with conditional access.
+Use common device trust policies from industry peers, or create your own threshold with low-level access to system data and events.
Find vulnerable software, track progress for security remediation project deadlines, and enforce due dates with automations and tickets.
+Show resolution steps or use custom HTML to show employees what they need to do to restore their access without waiting on a ticket. Then give it back automatically, as soon as the problems are fixes.
Use common health checks from industry peers, or easily create your own with low-level access to system data and events.
+Give people a way to get back to work quickly and minimize downtime. Fleet’s live query API instantly re-checks the OS version and other device state so users don’t get locked out.