DevOps

MDM

How to Go From Proactive Device Management to Continuous Resilience

Continuous resilience in device management principles and definition, and how it compares to proactive device management for the enterprise edge.

David Ruddock
April 8, 2026

April 9, 2026

In 2026, no team can operate hundreds or thousands of kiosks, POS systems, and handhelds without at least some hands-off device management workflows. Everyone understands the importance of alerting and automated remediation for common failure modes like app hangs or peripheral disconnects (if only because no one wants to spend their days fixing these issues over and over).

That’s why we posit that the challenge for enterprises working with scaled device fleets is not in building a culture of automation or in emphasizing proactive response. IT and ops teams understand and appreciate these needs intuitively; it’s like explaining the importance of line cooking to a chef. Nobody wants to go slower and do more work manually than is absolutely necessary. That’s obvious. 

The challenge facing enterprises is in enabling teams to build the systems and structures that allow device management to take a generational leap forward. To go beyond the band-aids of basic scripting and “click-to-fix” solutions. This leap is the next iteration of proactive device management principles into what we call continuous device resilience.

What is Proactive Device Management?

First, let’s talk about what reactive versus proactive device management workflows look like, and how proactive device management teams can lean in even further to continuous device resilience.

Reactive device management 

Exactly what it sounds like: Fixing issues as they arise. Whether that’s getting flagged in a management dashboard about an outage or via an email from an on-site employee, this is the standard triaging workflow IT teams use for managing systems like general-purpose laptops and smartphones. 

It’s the worst way to manage dedicated enterprise devices, because it requires the most amount of time and active attention from human personnel. Its shortfalls are as obvious as they are numerous.

Understanding proactive device management 

As you’d expect, proactive device management requires the ability to remediate issues with devices before they escalate to an outage or a user hand-raising in the field because a device failure is impacting operations. Simple proactive measures could be tools like online status checks (with offline alerts going to an email inbox), daily app content syncs (with alerts when syncs fail), or on-device alerts to let staff know a peripheral has disconnected or a battery is low when they clock on for the day (and before customers start arriving). 

Being more proactive is a natural outgrowth of scale, because you aggregate data on common failure modes and can build simple workflows to correct them before they cause problems. 

Proactive device management exists on a huge maturity scale — everywhere from daily configuration script runs and basic status alerts to real-time device monitoring with AI-powered self-healing routines. But fundamentally, it lives and breathes inside existing device management processes and organizations.

Continuous Device Resilience Explained 

Continuous Device Resilience is about building systems and processes to manage device configuration, content, connectivity, health, and software / OS versioning as a unified state. That state is continuously assessed by both the device and the infrastructure managing it, and both are capable of taking action to remediate issues automatically. But it doesn’t end there.

The fundamental difference between Continuous Device Resilience and proactive device management is that the former treats devices like critical digital infrastructure (more akin to, say, a cloud compute backend like EC2), while the latter treats them like mechanical assets in the field, as liabilities subject to breakdown and maintenance (like a fleet of literal trucks).

To adopt Continuous Device Resilience, you need to architect your device management strategy on five principles:

  1. Deploy devices like infrastructure objects
  2. Manage devices by exception and kill alert fatigue
  3. Maintain desired device state continuously with automated drift control
  4. Flow device content and updates with DevOps principles
  5. Unify device management across platforms

We’ll go through each of those principles below.

Five Principles of Continuous Device Resilience

1. Deploy devices like infrastructure objects

Perhaps one of the greatest shifts underway in the enterprise device management space is in deployment methodology. Getting new devices in the field went from a steadily scaling operational challenge to a truly make-or-break transformation across industries in the past decade. Mistakes were made, lessons were learned.

It’s now clear what the ideal deployment flow looks like:

  1. Define and freeze device deployment state in the lab
  2. Preconfigure site variables at the OEM / firmware level (WAP credentials, security keys, language)
  3. Dropship hardware straight from the distribution node to the site (“zero kitting” deployment)
  4. Plug in device on site, allow it to self-configure
  5. Update configuration, SW versions, and content from cloud

In a fully mature device deployment process, this means procurement for new sites can be entirely self-service for the local operations stakeholders. Nothing is left to chance, because the device goes through the exact same factory-to-power-on flow every time. No pages of kitting manuals, no 3P vendors, no misspelled WiFi passwords.

This ensures that devices set themselves up in the field in a known-good state, every time. To many organizations, this sounds like a fantasy. But like many of the principles of Continuous Device Resilience, it's not a binary state — you can graduate step by step into the device-as-infrastructure-object deployment model. Often, the first step is to eliminate most manual provisioning procedures by building clear configuration blueprints and using a zero-touch provisioning process. (It’s easier than it sounds, we promise.)

Download: The State of Device Management >

2. Manage devices by exception and kill alert fatigue

Device management alert fatigue is one of the greatest challenges facing IT and ops teams managing scaled device fleets. The sheer amount of alerting coming from devices in the field can result in situational blindness, leading individual operators to adopt high time-cost practices like manually combing lists and constantly refreshing dashboards instead of allowing automation to do its thing.

The road to managing by exception does require discipline and silo demolition — real institutional willpower is necessary — but management features like multi-OS management, configuration management, and support custom alerting and remediation workflows are critical too. There’s no bandaid for that stuff.

  1. Clearly define desired / known good state of devices (based on type, OS, role, etc.) and automate continuous deployment of that state.
  2. Cull unnecessary alerts ruthlessly — if a signal is not a reliable problem indicator, it’s wasting your time.
  3. For known alert conditions, automate remediation with tools like rollback and drift control (the third principle).
  4. Do not escalate issues to alerts unless remediation fails, multiple times! Allow automation to take the wheel until it’s clear rolling back or other methods don’t resolve the issue.

Too often, teams are unable to adopt a proper manage by exception posture not for a lack of willpower, but because their tooling simply doesn’t have the flexibility, customization, and “scale first” structure necessary to get there. Some gaps can’t be bridged without the right equipment, and while culture and process are crucial to execution here, they aren’t enough on their own.

3. Maintain desired device state continuously with automated drift control

When you’re dealing with hundreds of thousands of distributed devices in the field, managing by exception is only possible with the infrastructure to automate remediation at a massive scale — and in real time. That takes real drift control, and there’s no substitute for it.

Here are a couple examples of the way device management with drift control can enforce desired state on highly scaled fleets.

  • A single site or region fails to deploy a POS system configuration update because of a network outage — automated drift control detects this as soon as they come back online and pushes the new configuration down overnight during non-business or off-peak hours.
  • A customer at a particular location tampers with a self-service kiosk’s settings to the point that it’s no longer usable. Automated drift control redeploys the entire configuration blueprint to that device within minutes — not waiting weeks or months for an employee to flag it — and runs an automated test suite to validate it’s working as intended.

Automated drift control truly allows your teams to move beyond the reactive-proactive spectrum and into a qualitatively different management posture. As more failure modes and exceptions are identified, more remediations can be built. But crucially, desired state management with automated drift control means the overwhelming majority of failure modes are accounted for simply by keeping devices in the correct configuration state.

In turn, a robust device state and drift control management posture means that the number of exceptions you encounter in the field plummets dramatically. Your signal-to-noise ratio improves by multiple orders of magnitude, and the alerts that do escalate actually start to mean something.

4. Flow device content and updates with DevOps principles

When you deploy devices like critical digital infrastructure, you can start deploying content and updates to them that way, too. Instead of babysitting updates (or worse, manually remoting in and installing them yourself because you don’t trust your tools), you can start focusing on the big picture: dramatically less lag time between code commits and driving business impact in the field.

Flowing device content and updates with DevOps principles can manifest in a number of ways.

  • Define lab and test groups for updates to hit as soon as they’re compiled and uploaded to your cloud — true CI/CD integration.
  • Automated testing that flags updates as ready for production deployment.
  • Staged rollouts that deploy updates to batches of devices, flagging issues early, or automatically widening rollouts when they succeed.
  • Automated rollback when deployments are aborted — devices can revert to the last known good version without further intervention.

Crucially, these kinds of automated deployment and rollback workflows build tremendous organizational confidence. The confidence to deploy earlier, more often, and with fewer operational resources. This means far greater capacity for A/B testing, shorter time to results, and better responsiveness to customer feedback (both perceived and actual).

And while of course devices that stay updated with content and innovation can lead to business outcomes and competitive differentiation, let’s not forget about the flipside of that coin. Your security updates and firmware OTAs can be flowed in exactly the same way. That means better compliance, less downtime, and reduced support load, leading to better fleet health overall.

5. Unify device management across platforms

Working from a common source of truth is the most surefire way to break down organizational silos. Too many enterprises are working across massive toolchain sprawl glued together with popsicle sticks and duct tape to manage their devices. When you’re dealing with multiple operating systems, OEMs, and form factors, it can feel like there’s no way forward.

Years of institutional knowledge and organizational inertia keep these systems running, but that knowledge is often kept by individuals inside your teams who have no real need to share it — and colleagues with no real desire to learn it. All of this leads to incredibly poor visibility, little to no incentive to build cross-team awareness, and highly inefficient and duplicative workflows and documentation. No one wins.

The truth is, there are very few platforms capable of managing Android, iOS, Windows, and Linux devices under a single pane of glass. Let alone tools designed for dedicated enterprise device use cases (we can really only think of one). But if you don’t have a path to unifying your device management tooling, even one that may take years to fully realize, you’ll never achieve Continuous Device Resilience. Your fleet will have “dead ends” that take up outsize time and resources and sap the spirit of your teams.

The only alternative to unifying your device management across platforms is to unify on a single platform — which some organizations do choose to do. This comes with resultant limitations, and definitely doesn’t guarantee you’ll have tools to mature your CDR strategy. But it’s a fundamental choice every enterprise has to make: Live with the fragmented toolchain and the ever-growing overhead, or start down a meaningful path to consolidation.

Why Continuous Device Resilience is Worth Fighting For

The motivations for making the leap to a Continuous Device Resilience strategy should be abundantly clear to you at this point. But if you want an easily digestible breakdown:

  • Regularize and accelerate new hardware deployments and site openings
  • Lower deployment costs
  • Reduce IT/ops alert fatigue
  • Reduce downtime
  • Accelerate time to market for SW/HW innovations
  • Respond to customer feedback with greater agility
  • Enhance your device security and compliance posture
  • Decrease toolchain sprawl
  • Break down organizational siloes

The first step to adopting a CDR strategy is in understanding where your current device management toolchain’s functional gaps exist — and how a more integrated solution can bridge them.

Learn More

Keep Exploring

Learn More

Learn More

David Ruddock

David's tech experience runs deep. His tech agnostic approach and general love for technology fueled the 14 years he spent as a technology journalist, where David worked with major brands like Google, Samsung, Qualcomm, NVIDIA, Verizon, and Amazon, reviewed hundreds of products, and broke dozens of exclusive stories. Now he lends that same passion and expertise to Esper's marketing team.

Learn More

7 min read