What did information technology (IT) and security leaders do when they needed a simple, effective means to manage and secure their mobile devices — and provide secure access to enterprise data? They devised and implemented mobile device management (MDM) and enterprise mobility management (EMM) solutions.

But modern IT teams are responsible for accommodating a vast range of endpoints and enterprise use cases. They now need a platform that offers total visibility and control over their entire endpoint and mobile environment.

Fortunately, a unified endpoint management (UEM) solution delivers on the promise of bringing it all together under one management console: smartphones, tablets, laptops, desktops, wearables and the Internet of Things (IoT).

Watch the on-demand webinar: Announcing IBM MaaS360 with Watson — Business Dashboards for Apps & Cognitive Policy Recommendation Engine

UEM: Spot Your App Gap

With UEM’s all-encompassing support considered, it might seem to cover all the bases on the surface. However, there are two significant gaps that, if ignored, can hold organizations back from capturing its true benefits: inadequate visibility into the app deployment life cycle and lack of insight into real-world security policy recommendations.

It remains a challenge to discern which enterprise apps are being used and whether they are delivering a return on investment (ROI). For example, IT teams would love the answers to these common questions:

  • Which apps do mobile workers find useful?
  • How many individuals open the apps?
  • How long are apps being used?
  • Is an app update causing crashes?

With this sizable knowledge gap, IT teams are forgoing making informed decisions. They may be investing in all the apps equally — but, in actuality, one app may need more investment and resources while another may need to be decommissioned. These are the types of decisions that can be made when the right data is available to IT teams.

Configuration Confidence Goes a Long Way

Policy management is yet another fundamental component of a UEM solution where adequate guidance is lacking, and a large gap exists. If your IT team is like most, it relies heavily on internal collaboration to decide what goes into its security policy configurations.

There may be templates at your disposal, but they may be step-by-step, one-size-fits-all guides that aren’t geared toward your organization and its individual needs. There’s no clear-cut way to know what your peers are doing — or whether there are better methods and approaches you should be following.

Ideally, your UEM would give you an easy way to understand how to configure common policies, including:

  • Best practices you should consider when creating a passcode policy
  • How others in your industry have configured their secure corporate container
  • Various restrictions that a company of your size and within your region should enforce

Imagine a way to configure your policies with guidance that is dynamically presented every step of the way, catered to your organization and the size of your deployment. Whether you’re new to the game — or have been managing policies for years — a little confidence in your configurations goes a long way.

Overcoming UEM App and Policy Gaps

As both examples demonstrate, UEM does not offer a clear indication of whether your configurations are netting a positive impact — nor does it show whether they’re in alignment with best practices.

Luckily, innovation in the UEM market is helping to narrow the gaping gaps that exist in UEM. IBM MaaS360 with Watson, for example, has announced the availability of two new features that take these challenges head-on: Business Dashboards for Apps and Policy Recommendation Engine.

Graphs for Your Apps

With Business Dashboards for Apps, IBM MaaS360 UEM administrators gain robust app intelligence and reporting capabilities, which helps them understand the full assortment of enterprise apps deployed and a means to determine which ones need attention and prioritization.

Enterprise app analytics available via the MaaS360 UEM portal.

The dashboards are organized to help you get a full understanding of your enterprise app deployments across several key categories, including:

  • Installs: By platform, manufacturer and ownership
  • Usage: Installs, popularity and session length
  • Performance: Crashes, network requests and data usage
  • Trends: Six-month trends across usage and performance data

You can also apply filters across data sets to identify gaps and subscribe to reports that allow you to analyze data across specific apps or collections of apps.

Get It, Don’t Guess It

The Policy Recommendation Engine eliminates the guessing game that IT teams normally play when configuring their security policies with real-time cognitive templates based on industry, region and deployment size. As policies are being configured, recommendations will be dynamically displayed that clearly indicate how current inputs match up to peers. If administrators choose to apply the recommendations, they can do so with the simple click of a button.

Example of a Cognitive Recommendation displayed during MaaS360 passcode policy configuration process.

Watch the on-demand IBM Security webinar, “Announcing IBM MaaS360 with Watson: Business Dashboards for Apps & Cognitive Policy Recommendation Engine,” to see IBM MaaS360 experts demonstrate each of these new features. Experience a better way to manage your endpoints and mobile devices, and gain a better understanding about your app deployments, which could help you take an informed approach to policy management.

More from Endpoint

Deploying Security Automation to Your Endpoints

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more pressing issue. This enormous influx of data will invariably affect security teams. Faced with an enormous amount of data to sift through, analysts are feeling the crunch. Subsequently, alert fatigue is already a problem for analysts overwhelmed with security tasks. With the continued shortage of qualified staff, organizations are looking for automation to…

Threat Management and Unified Endpoint Management

The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years of disruption. Air travel is a mess. And all businesses have seen a spike in cyberattacks. Cyber threats increased by 81% while COVID-19 was at its peak, with 79% of all organizations experiencing a loss of business operations during that time. The risk of cyberattacks increased so much that the…

3 Ways EDR Can Stop Ransomware Attacks

Ransomware attacks are on the rise. While these activities are low-risk and high-reward for criminal groups, their consequences can devastate their target organizations. According to the 2022 Cost of a Data Breach report, the average cost of a ransomware attack is $4.54 million, without including the cost of the ransom itself. Ransomware breaches also took 49 days longer than the data breach average to identify and contain. Worse, criminals will often target the victim again, even after the ransom is…

How EDR Security Supports Defenders in a Data Breach

The cost of a data breach has reached an all-time high. It averaged $4.35 million in 2022, according to the newly published IBM Cost of a Data Breach Report. What’s more, 83% of organizations have faced more than one data breach, with just 17% saying this was their first data breach. What can organizations do about this? One solution is endpoint detection and response (EDR) software. Take a look at how an effective EDR solution can help your security teams. …