How your organisation is losing devices
- without even noticing

Most organisations rely on platforms like Intune, SCCM or similar tools to monitor and manage their devices.
These systems are designed to provide visibility, control, and confidence in the IT environment.

But studies show that over time, 8–22% of devices quietly disappear from these systems - without anyone noticing.
(Source: Forrester / Absolute - Total Economic Impact Report)

And these devices aren’t necessarily stolen or misplaced.
In most cases, they simply slip out of view due to ordinary, low-friction IT situations:

  • A colleague goes on leave, and their laptop remains offline for months
  • A device is reset or reimaged without the company’s standard setup
  • A new device ID is generated during reinstallation, creating confusion or duplicates
  • The management agent fails silently and stops reporting
  • A company laptop ends up in private use - unintentionally, but outside of IT’s control

Individually, these cases seem harmless. But collectively, they represent a systematic loss of visibility and control.

close-up-hand-typing-laptop-wooden-kitchen-counter-with-coffee-cup (1)
freepik_assistant_1768484409708

Devices may still be in use - but without protection

Back, business woman and computer for planning, data analysis or internet technology in office. Female worker typing on desktop monitor for seo research, website network or company strategy analytics.

Devices that have dropped out of management may still be running - but:

  • They're not receiving updates
  • They may not be encrypted
  • They can store sensitive data
  • And they are no longer visible to IT
  • In the system, they’re marked as offline.

In reality, they may be fully operational - and fully unprotected.

Multiple industry reports confirm the scale of the problem:

%

cannot identify more than 75% of the devices on their own network
(Source: Cybersecurity Insiders – Endpoint Security Report)

%

of CFOs plan for permanent remote or hybrid work, increasing device decentralisation
(Source: Gartner CFO Survey, 2020)

%

of CISOs say the pandemic permanently changed how they assess endpoint risk
(Source: CSO Online / IDG Research)

%

of endpoint management tools are considered “highly effective” by security teams
(Source: Ponemon Institute – State of Endpoint Security Risk Report)

Why it matters

When you lose sight of your devices, you lose control over:

  • Data security

  • Regulatory compliance (e.g. NIS2, DORA, CIS18)

  • Operational continuity

  • ESG and CSRD reporting accuracy

  • Trust and governance

It’s not just about IT hygiene.
It’s about risk across the entire organisation.

black-apple-iphone-sits-black-apple-iphone

Visibility is the foundation for resilience

Complete, continuous device visibility ensures:

  • Every device is known, accounted for, and protected

  • Compliance posture is accurate and provable

  • No asset falls between the cracks - regardless of reset, reimage or offline time

  • IT and security teams can make confident decisions based on live data

Want to know how Echo can give you 100% device visibility - even when devices are offline, reset, or repurposed?

 

 

 

Explore more insights