July 26, 2018 By John Harrington Jr. 3 min read

Over the past decade, mobile security platforms have existed under a variety of classifications. First came mobile device management (MDM), followed by enterprise mobility management (EMM), and today we’ve arrived at an entirely new term: unified endpoint management (UEM).

In its 2018 Magic Quadrant for Unified Endpoint Management Tools, Gartner has evaluated UEM vendors across a variety of criteria, including:

  • EMM capabilities, spanning from provisioning and reporting to data protection;
  • Modern management of PCs and Macs;
  • Client- and agent-based management techniques, such as imaging and patching; and
  • Proven ability to manage Internet of Things (IoT) devices and gateways.

To learn more, read the report: 2018 Magic Quadrant for Unified Endpoint Management Tools

MDM and EMM in the Rearview — Why the Sudden Change?

For years, IT and security leaders have needed a way to enroll, manage and enforce compliance on smartphones and tablets, which MDM was able to accomplish. These needs were just the beginning — the devices became more capable, and their apps, content and data became integral to everyday business operations. Hence the need for EMM solutions, which enabled a more holistic management approach.

Over time, the variety and differentiation across device types — smartphones, tablets, laptops, desktops, wearables and IoT — has increased, as have their everyday applications and use cases. Traditional MDM and EMM tools that organizations have relied upon to manage these endpoints do not provide consistent workflows for management, nor do they enable an over-the-air, out-of-the-box experience for all devices.

UEM accounts for vast industry-specific innovations that have taken place and supports modern-day use cases for endpoint and mobile, including:

  • One window and consistent workflows for securing disparate devices;
  • Migration from legacy laptop platforms to Microsoft Windows 10;
  • Identity and access management (IAM) for mobile devices; and
  • Low-touch, no-touch deployments for PC and Mac.

Laptop Management Meets Modern-Day APIs

With the introduction of Windows 10, everything changed. Unlike its laptop ancestors, this particular laptop operating system (OS) was not reliant on an agent to administer enterprise-grade management and security. Much like its iPhone and Android cousins, it could be managed using MDM application programming interfaces (APIs), as can macOS.

In the past, organizations were reliant on MDM and EMM separate from client management tools (CMTs). Now, this can be accomplished through UEM. For the first time, a single tool can manage laptops alongside mobile devices.

With the end of life (EOL) of Windows 7 scheduled for 2020, organizations are setting their sights on deploying the latest laptop platforms throughout the enterprise, primarily macOS and Windows 10. The most effective way to accomplish this is not through the traditional approach with one solution for PCs, Macs and servers and a separate solution for mobile devices.

Now that modern PCs and Macs can be managed alongside iPhones, iPads and Androids, IT teams are prioritizing consolidation to reduce costs and improve IT efficiency. As modern platforms, such as Chrome OS, become more prevalent in the enterprise, the ability to manage endpoints with APIs will become an even higher area of focus and importance.

Expanding Into Wearables and IoT

What else is UEM doing, aside from incorporating laptops into the mix? As organizations have increased their dependency on endpoints and mobile devices to transform their operations, the complexity of their use cases has increased.

Mixed-reality devices, such as Microsoft HaloLens, offer a great example of how unique device types are coming into the fold — and need to be managed just like any other device. As IT and security leaders broaden their deployments of IoT devices and sensors, the need to blanket the management of every “thing” will only continue to expand.

IBM Named a Leader in Unified Endpoint Management

IBM was named a Leader in the 2018 Gartner Magic Quadrant for Unified Endpoint Management Tools due to its completeness of vision and ability to execute.

Unlike all other vendors featured on the Magic Quadrant for UEM, we believe IBM MaaS360 is the only solution that offers artificial intelligence (AI) capabilities delivered by Watson, helping IT and security leaders make informed decisions about their end users and endpoints, in addition to their apps, content and data. Aiming to provide the best possible outcomes for administrators and users, MaaS360 is committed to making AI a native component of the UEM experience.

To learn more, read the report: 2018 Magic Quadrant for Unified Endpoint Management Tools

To learn more about MaaS360 and Gartner’s assessment of the UEM industry, download your complimentary copy of the 2018 Gartner Magic Quadrant for Unified Endpoint Management Tools.

Disclaimer: Gartner Magic Quadrant for Unified Endpoint Management Tools, Chris Silva, Rich Doheny, Bryan Taylor, Rob Smith and Manjunath Bhat, 23 July 2018. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today