June 4, 2018 By John Harrington Jr. 4 min read

What did information technology (IT) and security leaders do when they needed a simple, effective means to manage and secure their mobile devices — and provide secure access to enterprise data? They devised and implemented mobile device management (MDM) and enterprise mobility management (EMM) solutions.

But modern IT teams are responsible for accommodating a vast range of endpoints and enterprise use cases. They now need a platform that offers total visibility and control over their entire endpoint and mobile environment.

Fortunately, a unified endpoint management (UEM) solution delivers on the promise of bringing it all together under one management console: smartphones, tablets, laptops, desktops, wearables and the Internet of Things (IoT).

Watch the on-demand webinar: Announcing IBM MaaS360 with Watson — Business Dashboards for Apps & Cognitive Policy Recommendation Engine

UEM: Spot Your App Gap

With UEM’s all-encompassing support considered, it might seem to cover all the bases on the surface. However, there are two significant gaps that, if ignored, can hold organizations back from capturing its true benefits: inadequate visibility into the app deployment life cycle and lack of insight into real-world security policy recommendations.

It remains a challenge to discern which enterprise apps are being used and whether they are delivering a return on investment (ROI). For example, IT teams would love the answers to these common questions:

  • Which apps do mobile workers find useful?
  • How many individuals open the apps?
  • How long are apps being used?
  • Is an app update causing crashes?

With this sizable knowledge gap, IT teams are forgoing making informed decisions. They may be investing in all the apps equally — but, in actuality, one app may need more investment and resources while another may need to be decommissioned. These are the types of decisions that can be made when the right data is available to IT teams.

Configuration Confidence Goes a Long Way

Policy management is yet another fundamental component of a UEM solution where adequate guidance is lacking, and a large gap exists. If your IT team is like most, it relies heavily on internal collaboration to decide what goes into its security policy configurations.

There may be templates at your disposal, but they may be step-by-step, one-size-fits-all guides that aren’t geared toward your organization and its individual needs. There’s no clear-cut way to know what your peers are doing — or whether there are better methods and approaches you should be following.

Ideally, your UEM would give you an easy way to understand how to configure common policies, including:

  • Best practices you should consider when creating a passcode policy
  • How others in your industry have configured their secure corporate container
  • Various restrictions that a company of your size and within your region should enforce

Imagine a way to configure your policies with guidance that is dynamically presented every step of the way, catered to your organization and the size of your deployment. Whether you’re new to the game — or have been managing policies for years — a little confidence in your configurations goes a long way.

Overcoming UEM App and Policy Gaps

As both examples demonstrate, UEM does not offer a clear indication of whether your configurations are netting a positive impact — nor does it show whether they’re in alignment with best practices.

Luckily, innovation in the UEM market is helping to narrow the gaping gaps that exist in UEM. IBM MaaS360 with Watson, for example, has announced the availability of two new features that take these challenges head-on: Business Dashboards for Apps and Policy Recommendation Engine.

Graphs for Your Apps

With Business Dashboards for Apps, IBM MaaS360 UEM administrators gain robust app intelligence and reporting capabilities, which helps them understand the full assortment of enterprise apps deployed and a means to determine which ones need attention and prioritization.

Enterprise app analytics available via the MaaS360 UEM portal.

The dashboards are organized to help you get a full understanding of your enterprise app deployments across several key categories, including:

  • Installs: By platform, manufacturer and ownership
  • Usage: Installs, popularity and session length
  • Performance: Crashes, network requests and data usage
  • Trends: Six-month trends across usage and performance data

You can also apply filters across data sets to identify gaps and subscribe to reports that allow you to analyze data across specific apps or collections of apps.

Get It, Don’t Guess It

The Policy Recommendation Engine eliminates the guessing game that IT teams normally play when configuring their security policies with real-time cognitive templates based on industry, region and deployment size. As policies are being configured, recommendations will be dynamically displayed that clearly indicate how current inputs match up to peers. If administrators choose to apply the recommendations, they can do so with the simple click of a button.

Example of a Cognitive Recommendation displayed during MaaS360 passcode policy configuration process.

Watch the on-demand IBM Security webinar, “Announcing IBM MaaS360 with Watson: Business Dashboards for Apps & Cognitive Policy Recommendation Engine,” to see IBM MaaS360 experts demonstrate each of these new features. Experience a better way to manage your endpoints and mobile devices, and gain a better understanding about your app deployments, which could help you take an informed approach to policy management.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today