What Is the Future of Endpoint Management in the Enterprise?

Play the latest episode
Oct 11, 2018
22 minutes


Listen to the Security Intelligence Podcast wherever you get your podcasts.

What Is the Future of Endpoint Management in the Enterprise?
October 11, 2018
| |
2 min read

Listen to this podcast on iTunes, Soundcloud or wherever you find your favorite audio content.

From end users to endpoints and everything in between, today’s podcast focuses on the rapidly growing unified endpoint management (UEM) market. We’re joined by Forrester analyst and UEM expert Andrew Hewitt to unpack the current state of endpoint management and its future in the enterprise.

What’s Driving the Rise of UEM?

The central tenant of UEM is managing mobile, desktop and laptop devices across your network from a single console. As Hewitt notes, UEM builds on previous processes such as mobile device management (MDM), mobile application management (MAM), mobile content management (MCM) and, finally, enterprise mobility management (EMM). UEM builds on EMM by adding not just Windows PCs and Macs but also wearables and the Internet of Things (IoT) to the equation.

So what’s driving the adoption of UEM solutions? Hewitt points to increasingly mobile employees who use more than one device, coupled with a change in PC management as Microsoft more closely aligns Windows deployments with mobile technologies by allowing greater customization and control, including the use of application programming interface (API) calls.

Hewitt notes that Apple devices typically support UEM thanks to similarities between iOS and macOS, while companies are now beginning to ask for ChromeOS and Chromebook support via UEM. Companies like IBM are capable of delivering advanced UEM solutions across multiple devices and operating system (OS) types.

Listen to the podcast

Why Identity and Threat Management Are Essential

Mobile threat prevention (MTP) is a critical component of an effective UEM solution. Recent Forrester data cited by Hewitt shows many device attacks are targeted, not random, meaning companies now require active threat management to stay ahead of potential compromise.

Identity management is also essential — cutting-edge UEM systems examine both the devices themselves, and also how users interact with those devices. For example, are they downloading massive file volumes? Are they logging in from unexpected locations? For Hewitt, the future of identity management goes much deeper than behavior, such as analyzing how users hold their smartphones or exactly how much pressure they put on keyboards to help verify identity.

What’s Next for UEM in the Enterprise?

Hewitt argues that integrating the IoT, wearables and peripherals is UEM’s next step. He notes that UEM has great value for manned IoT devices, such as wearables, and offers value for unmanned devices under the right conditions. Ultimately, companies have to identify a use case that makes sense for UEM and recognize that improved employee experience — even more than the cost benefit — helps drive the return on investment (ROI) for unified endpoint management.

Forrester Report: Mobile Vision 2020

If you enjoyed listening, don’t forget to subscribe so you never miss a new episode. Please also consider rating the podcast or leaving your feedback on iTunes or wherever you listen.

Security Intelligence Staff
Security Intelligence Staff

Security Intelligence strives to be the leading site for technical and business-focused security content. Security is an essential factor for every business,...
read more

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today
Press play to continue listening
00:00 00:00