May 24, 2018 By Dan Cheuvront 2 min read

Virtual reality (VR) use cases have expanded — and innovation continues to drive adoption beyond just the video game industry. In fact, recent advancements have paved the way for the creation of a new, hybrid technology: mixed reality (MR).

With MR, users wear a headset that displays interactive holograms within the environment around them in real time. This technology allows them to physically engage in unique experiences in many popular industries, such as entertainment, education and health.

Developers are taking notice of the possibilities of MR — and are also exploring how it can add value to leisure and workplace productivity.

Bringing Mixed Reality Into the Enterprise

Nearly every industry can utilize MR to gain insights and expand communication in ways never experienced before. Industries can also save time and money by facilitating faster, more efficient collaboration.

Here are examples of how some industries are using MR:

  • Architects at construction companies can see their AutoCAD blueprints in full 3D, interact with the space to make changes and achieve a better sense of how their building looks before construction even begins.
  • Medical students can use holograms of human anatomy to gain a better understanding of how the body works. This form of interactive education is already in use at Case Western Reserve University, and these applications of MR can be life-saving.
  • Technicians who need assistance repairing critical pieces of equipment can use MR to show their colleagues what they’re seeing — and get step-by-step visual guidance on adequately facilitating necessary repairs.
  • Companies in all industries can also build highly engaging applications for quicker onboarding of new employees and interaction with customers.

Mixed Reality Meets Unified Endpoint Management

There are dozens of companies working on MR applications to further advance the technology and its capabilities. Some specialize in a single industry, while others target the market with specific devices.

One of the more easily recognized names is Microsoft, which has developed an MR headset dubbed the HoloLens. The device sits on the users’ heads — much like a crown. The display is built into a tinted visor that resembles a motorcycle helmet visor. The HoloLens gained notoriety as the first MR device that runs on the Microsoft Windows 10 operating system. This allows developers to create MR applications for the HoloLens and utilize Windows application programming interfaces to work with other products.

IBM MaaS360 with Watson announced the ability to support and manage Microsoft HoloLens devices in May 2018. Just like any Windows 10 device, HoloLens follows the same security commands, policies and compliance rules, which can be applied using MaaS360.

As MR gains a more significant presence in the workforce, IT security leaders are going to need to manage these devices. Unified endpoint management (UEM) combines the capabilities of multiple solutions into one. By addressing the security concerns of managing MR devices, IT and security leaders can manage mobile devices, laptops, mobile applications, mobile content, user identity and access and more.

From designing buildings to saving lives, MR’s potential is vast — and it will only expand. Having the right tools in place will help your company stay ahead of security concerns and move forward with confidence.

Try IBM MaaS360 Free for 30 Days — sign up now

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today