Over the past decade, mobile security platforms have existed under a variety of classifications. First came mobile device management (MDM), followed by enterprise mobility management (EMM), and today we’ve arrived at an entirely new term: unified endpoint management (UEM).

In its 2018 Magic Quadrant for Unified Endpoint Management Tools, Gartner has evaluated UEM vendors across a variety of criteria, including:

  • EMM capabilities, spanning from provisioning and reporting to data protection;
  • Modern management of PCs and Macs;
  • Client- and agent-based management techniques, such as imaging and patching; and
  • Proven ability to manage Internet of Things (IoT) devices and gateways.

To learn more, read the report: 2018 Magic Quadrant for Unified Endpoint Management Tools

MDM and EMM in the Rearview — Why the Sudden Change?

For years, IT and security leaders have needed a way to enroll, manage and enforce compliance on smartphones and tablets, which MDM was able to accomplish. These needs were just the beginning — the devices became more capable, and their apps, content and data became integral to everyday business operations. Hence the need for EMM solutions, which enabled a more holistic management approach.

Over time, the variety and differentiation across device types — smartphones, tablets, laptops, desktops, wearables and IoT — has increased, as have their everyday applications and use cases. Traditional MDM and EMM tools that organizations have relied upon to manage these endpoints do not provide consistent workflows for management, nor do they enable an over-the-air, out-of-the-box experience for all devices.

UEM accounts for vast industry-specific innovations that have taken place and supports modern-day use cases for endpoint and mobile, including:

  • One window and consistent workflows for securing disparate devices;
  • Migration from legacy laptop platforms to Microsoft Windows 10;
  • Identity and access management (IAM) for mobile devices; and
  • Low-touch, no-touch deployments for PC and Mac.

Laptop Management Meets Modern-Day APIs

With the introduction of Windows 10, everything changed. Unlike its laptop ancestors, this particular laptop operating system (OS) was not reliant on an agent to administer enterprise-grade management and security. Much like its iPhone and Android cousins, it could be managed using MDM application programming interfaces (APIs), as can macOS.

In the past, organizations were reliant on MDM and EMM separate from client management tools (CMTs). Now, this can be accomplished through UEM. For the first time, a single tool can manage laptops alongside mobile devices.

With the end of life (EOL) of Windows 7 scheduled for 2020, organizations are setting their sights on deploying the latest laptop platforms throughout the enterprise, primarily macOS and Windows 10. The most effective way to accomplish this is not through the traditional approach with one solution for PCs, Macs and servers and a separate solution for mobile devices.

Now that modern PCs and Macs can be managed alongside iPhones, iPads and Androids, IT teams are prioritizing consolidation to reduce costs and improve IT efficiency. As modern platforms, such as Chrome OS, become more prevalent in the enterprise, the ability to manage endpoints with APIs will become an even higher area of focus and importance.

Expanding Into Wearables and IoT

What else is UEM doing, aside from incorporating laptops into the mix? As organizations have increased their dependency on endpoints and mobile devices to transform their operations, the complexity of their use cases has increased.

Mixed-reality devices, such as Microsoft HaloLens, offer a great example of how unique device types are coming into the fold — and need to be managed just like any other device. As IT and security leaders broaden their deployments of IoT devices and sensors, the need to blanket the management of every “thing” will only continue to expand.

IBM Named a Leader in Unified Endpoint Management

IBM was named a Leader in the 2018 Gartner Magic Quadrant for Unified Endpoint Management Tools due to its completeness of vision and ability to execute.

Unlike all other vendors featured on the Magic Quadrant for UEM, we believe IBM MaaS360 is the only solution that offers artificial intelligence (AI) capabilities delivered by Watson, helping IT and security leaders make informed decisions about their end users and endpoints, in addition to their apps, content and data. Aiming to provide the best possible outcomes for administrators and users, MaaS360 is committed to making AI a native component of the UEM experience.

To learn more, read the report: 2018 Magic Quadrant for Unified Endpoint Management Tools

To learn more about MaaS360 and Gartner’s assessment of the UEM industry, download your complimentary copy of the 2018 Gartner Magic Quadrant for Unified Endpoint Management Tools.

Disclaimer: Gartner Magic Quadrant for Unified Endpoint Management Tools, Chris Silva, Rich Doheny, Bryan Taylor, Rob Smith and Manjunath Bhat, 23 July 2018. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Endpoint

Combining EPP and EDR tools can boost your endpoint security

6 min read - Endpoint protection platform (EPP) and endpoint detection and response (EDR) tools are two security products commonly used to protect endpoint systems from threats. EPP is a comprehensive security solution that provides a range of features to detect and prevent threats to endpoint devices. At the same time, EDR is specifically designed to monitor, detect and respond to endpoint threats in real-time. EPP and EDR have some similarities, as they both aim to protect endpoints from threats, but they also have…

The needs of a modernized SOC for hybrid cloud

5 min read - Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire classes of threats. Now we are seeing the emergence of technologies such as attack surface management (ASM), which are starting to help organisations get more proactive and focus their efforts for maximum…

X-Force identifies vulnerability in IoT platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

X-Force prevents zero day from going anywhere

8 min read - This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…