It’s official. IBM was designated a Wave Leader in the Q4 2017 Forrester Wave Report for enterprise mobility management (EMM). The analyst firm scored MaaS360 among the top two in the Current Offering and top three in the Strategy categories.

A Breakdown of the 2017 Wave

In its 2017 report, Forrester outlined a continued need for infrastructure and operations (I&O) professionals to cater to the wants and needs of their employees to preserve the best possible employee experience with devices, apps and content. These measures have a consequential positive impact on customer happiness and revenue growth.

Download “The Forrester Wave: Enterprise Mobility Management, Q4 2017”

In delivering a better experience, however, Forrester noted that the management and security of endpoint and mobile devices cannot fall by the wayside. The growing number of devices, operating systems, apps and use cases — all amid an increasingly complex threat landscape — have heightened the need to prioritize protecting sensitive corporate data.

Hence, the need to maintain a delicate balance between end-user productivity and security is still relevant — and an ongoing pursuit to maintain this balance has unceasingly heightened the demand for best-in-class EMM solutions.

EMM Vendor Scoring and Differentiation

In this year’s report, Forrester closely examined 13 EMM vendors — assessing each on a wide range of criteria under the following categories:

  • Current offering: The breadth and depth of its EMM capabilities;
  • Strategy: Including tactics, investments and partnerships; and
  • Market presence: Respective to install base and revenue.

In its assessment, the firm identified five common areas of differentiation exhibited by leading vendors: strong unified endpoint management (UEM), additional security and management controls, contextual identity and access management (IAM), mobile threat detection and application risk, and Microsoft Office 365 support.

Moving forward, continued advancement in these areas will become increasingly important to meet the needs of I&O professionals and remain competitive in the market.

Forrester noted that MaaS360 acquired 4,000 new customers in 2016, in addition to adding significant capabilities in the areas of cognitive analytics, unified endpoint management and mobile security.

How MaaS360 Differentiates in EMM

Unrivaled in Cognitive and AI

Having added Watson functionality to its platform, MaaS360 offers its administrators the industry’s first and only cognitive approach to UEM. Pulling from structured and unstructured data sources, MaaS360 Advisor brings contextually relevant risks, opportunities and information front and center, giving IT the ability to understand what happened, what can happen and what should be done — all with respect to their individual environment.

MaaS360 Excels at Unified Endpoint Management

Stemming beyond its cognitive capabilities, MaaS360 also stood out from the pack for its unique approach to delivering UEM via a blend of mobile device management (MDM) application program interface (API) and traditional client management. This converged tool set affords organizations the broadest range of flexibility when migrating legacy Microsoft platforms, such as Windows XP and Windows 7, over to the more modern Windows 10. Without MaaS360, organizations must rely on disparate tools to achieve their migration, taking up time, increasing costs and expending valuable team resources.

A Native Approach to Advanced Mobile Security

Unlike competitors, MaaS360 does not rely heavily on third-party vendors to provide core functionality such as mobile threat detection and remediation and identity management. This saves customers from having to purchase additional and separate systems to manage and maintain. It also reduces the number of vendors to rely on and trust from many to one.

Download the Forrester Wave Report Now!

Make sure to download your complimentary copy of this year’s report for further reading, and to learn more about why MaaS360 was recognized as a leader.

Download “The Forrester Wave: Enterprise Mobility Management, Q4 2017”

More from Endpoint

The Needs of a Modernized SOC for Hybrid Cloud

5 min read - Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire classes of threats. Now we are seeing the emergence of technologies such as attack surface management (ASM), which are starting to help organisations get more proactive and focus their efforts for maximum…

5 min read

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

X-Force Prevents Zero Day from Going Anywhere

8 min read - This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…

8 min read

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

12 min read - ‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

12 min read